Security is one of the ever-rising provinces in about every field of society and computers are no freak. The system on the network can be attacked if it is easy to break its security or it is vulnerable. Security issues that exist in connection to a machine on network are system security and application security. For ensuring security of personal computer regular security audits of the system needs to be done. One main objective of auditing is to ensure that systems are safe or not. Digital auditing can be manual or automated. Systems audit leads to check that the vulnerability of system to different attacks that can be done on it. Similarly, a website running on the system can also be exploited for any vulnerability in it. This work investigates the methods of system and application auditing to identify the weakness at system and application level.
DDoS assaults are one of the most serious issues that the Internet has to deal with. Various defense strategies have been offered to remove this form of assault, the number of which has risen over the research period. However, no detection method capable of entirely thwarting the assaults has yet been discovered. As a result, computer security experts must be vigilant in detecting and defending against DDoS assaults. This study gives a comprehensive assessment of the scholarly literature on DDoS attack detection strategies. The key components of detection have been defined based on the literature. Methods, variables, tools-kits, positioning site, point in time, and detection precision were recognized as four factors for examination in this inquiry. It was discovered that each strategy for detecting assaults takes use of certain aspects of network load, user requirements, and specialized kits. Finally, it was able to pinpoint the mechanisms with the greatest impact. The datasets they utilize, for example, can affect detection accuracy. It's been determined that a thorough examination of the aforementioned components of DDoS attack detection underwrite the development of an adequate approach for Defending against the attacks. These approaches bank on better router functionality or fluctuations to present protocols. The pros and cons of current research approaches in this issue are also describe.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.
customersupport@researchsolutions.com
10624 S. Eastern Ave., Ste. A-614
Henderson, NV 89052, USA
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.
Copyright © 2025 scite LLC. All rights reserved.
Made with 💙 for researchers
Part of the Research Solutions Family.