2020
DOI: 10.32604/cmc.2020.012475
|View full text |Cite
|
Sign up to set email alerts
|

Multilayer Self-defense System to Protect Enterprise Cloud

Abstract: A data breach can seriously impact organizational intellectual property, resources, time, and product value. The risk of system intrusion is augmented by the intrinsic openness of commonly utilized technologies like TCP/IP protocols. As TCP relies on IP addresses, an attacker may easily trace the IP address of the organization. Given that many organizations run the risk of data breach and cyber-attacks at a certain point, a repeatable and well-developed incident response framework is critical to shield them. E… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
11
0
1

Year Published

2022
2022
2024
2024

Publication Types

Select...
6
1

Relationship

3
4

Authors

Journals

citations
Cited by 8 publications
(12 citation statements)
references
References 37 publications
0
11
0
1
Order By: Relevance
“…Machine learning (ML) approaches are used for intrusion detection and mitigation to protect cloud-based enterprise solutions [22]. Using machine learning algorithms to predict, and distinguish the DDoS attack from normal traffic prediction, detection, and mitigation are fast and effective.…”
Section: Related Workmentioning
confidence: 99%
“…Machine learning (ML) approaches are used for intrusion detection and mitigation to protect cloud-based enterprise solutions [22]. Using machine learning algorithms to predict, and distinguish the DDoS attack from normal traffic prediction, detection, and mitigation are fast and effective.…”
Section: Related Workmentioning
confidence: 99%
“…Similar to white box testing, black box testing can be done either manually or with tools. In [13], the authors explain a system that automatically detects and mitigates the attacks. Web applications are inefficient in checking the correctness of the data request.…”
Section: Related Workmentioning
confidence: 99%
“…SVM has been used for a very simple but obvious reason, which is the fact that it has its development mechanism when it comes to algorithms, and its static prediction techniques lift it above most frameworks, not to mention how quickly and intelligently it can train and learn algorithms in both linear and nonlinear capacities. SVM is popular among all other techniques because it can very quickly separate the linear space from the supposedly nonlinear space [5].…”
Section: Introductionmentioning
confidence: 99%
“…The distributed denial-of-service (DDoS) detection rates are reported in [5][6][7][8] using the SVM algorithm are in the range of 93% to 98%. Therefore, the high efficiency of DDOS attacks and their ability to disrupt normal network functions is the main motivation for starting this research using SVM.…”
Section: Introductionmentioning
confidence: 99%