2022
DOI: 10.1007/978-981-19-0095-2_12
|View full text |Cite
|
Sign up to set email alerts
|

Cyber-Attack in ICT Cloud Computing System

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
0
0

Year Published

2023
2023
2023
2023

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(1 citation statement)
references
References 6 publications
0
0
0
Order By: Relevance
“…One of the most difficult aspects of protecting cloud systems is detecting and mitigating cyber-attacks that try to compromise the confidentiality, integrity, or availability of cloud services and data. Cyber-attacks can take several forms and have diverse objectives, as well as damage distinct levels of the cloud stack, such as infrastructure, platform, or software [3], [4]. DDoS assaults, data breaches, ransomware, malware injection, cross-site scripting (XSS), SQL injection, and man-inthe-middle (MITM) attacks are some examples of common cyber-attacks against cloud systems [5].…”
Section: Introductionmentioning
confidence: 99%
“…One of the most difficult aspects of protecting cloud systems is detecting and mitigating cyber-attacks that try to compromise the confidentiality, integrity, or availability of cloud services and data. Cyber-attacks can take several forms and have diverse objectives, as well as damage distinct levels of the cloud stack, such as infrastructure, platform, or software [3], [4]. DDoS assaults, data breaches, ransomware, malware injection, cross-site scripting (XSS), SQL injection, and man-inthe-middle (MITM) attacks are some examples of common cyber-attacks against cloud systems [5].…”
Section: Introductionmentioning
confidence: 99%