• Mi Re-Unir
    Búsqueda Avanzada
    JavaScript is disabled for your browser. Some features of this site may not work without it.
    Ver ítem 
    •   Inicio
    • UNIR REVISTAS
    • Revista IJIMAI
    • 2017
    • vol. 4, nº 3, march 2017
    • Ver ítem
    •   Inicio
    • UNIR REVISTAS
    • Revista IJIMAI
    • 2017
    • vol. 4, nº 3, march 2017
    • Ver ítem

    Techniques to Detect DoS and DDoS Attacks and an Introduction of a Mobile Agent System to Enhance it in Cloud Computing

    Autor: 
    Saidi, Abdelali
    ;
    Bendriss, Elmehdi
    ;
    Kartit, Ali
    ;
    El Marraki, Mohamed
    Fecha: 
    03/2017
    Palabra clave: 
    agents; cloud computing; attack; IJIMAI
    Tipo de Ítem: 
    article
    URI: 
    https://reunir.unir.net/handle/123456789/11735
    DOI: 
    http://doi.org/10.9781/ijimai.2017.4312
    Dirección web: 
    https://ijimai.org/journal/bibcite/reference/2571
    Open Access
    Resumen:
    Security in cloud computing is the ultimate question that every potential user studies before adopting it. Among the important points that the provider must ensure is that the Cloud will be available anytime the consumer tries to access it. Generally, the Cloud is accessible via the Internet, what makes it subject to a large variety of attacks. Today, the most striking cyber-attacks are the flooding DoS and its variant DDoS. This type of attacks aims to break down the availability of a service to its legitimate clients. In this paper, we underline the most used techniques to stand up against DoS flooading attacks in the Cloud.
    Mostrar el registro completo del ítem
    Ficheros en el ítem
    icon
    Nombre: ijimai20174_3_12_pdf_18434.pdf
    Tamaño: 414.7Kb
    Formato: application/pdf
    Ver/Abrir
    Este ítem aparece en la(s) siguiente(s) colección(es)
    • vol. 4, nº 3, march 2017

    Estadísticas de uso

    Año
    2012
    2013
    2014
    2015
    2016
    2017
    2018
    2019
    2020
    2021
    2022
    Vistas
    0
    0
    0
    0
    0
    0
    0
    0
    0
    29
    17
    Descargas
    0
    0
    0
    0
    0
    0
    0
    0
    0
    21
    92

    Ítems relacionados

    Mostrando ítems relacionados por Título, autor o materia.

    • MSA for Optimal Reconfiguration and Capacitor Allocation in Radial/Ring Distribution Networks 

      Mohamed, Emad; Mohamed, Al-Attar Ali; Mitani, Yasunori (International Journal of Interactive Multimedia and Artificial Intelligence (IJIMAI), 06/2018)
      This work presents a hybrid heuristic search algorithm called Moth Swarm Algorithm (MSA) in the context of power loss minimization of radial distribution networks (RDN) through optimal allocation and rating of shunt ...
    • Genetic-Moth Swarm Algorithm for Optimal Placement and Capacity of Renewable DG Sources in Distribution Systems 

      Mohamed, Emad; Mohamed, Al-Attar Ali; Mitani, Yasunori (International Journal of Interactive Multimedia and Artificial Intelligence (IJIMAI), 12/2019)
      This paper presents a hybrid approach based on the Genetic Algorithm (GA) and Moth Swarm Algorithm (MSA), namely Genetic Moth Swarm Algorithm (GMSA), for determining the optimal location and sizing of renewable distributed ...
    • mlCAF: Multi-Level Cross-Domain Semantic Context Fusioning for Behavior Identification 

      Asif Razzaq, Muhammad; Villalonga, Claudia (1); Sungyoung, Lee; Akhtar, Usman; Ali, Maqbool; Kim, Eun-Soo; Masood Khattak, Asad; Seung, Hyonwoo; Hur, Taeho; Bang, Jaehun; Kim, Dohyeong; Ali Khan, Wajahat (Sensors, 10/2017)
      The emerging research on automatic identification of user’s contexts from the cross-domain environment in ubiquitous and pervasive computing systems has proved to be successful. Monitoring the diversified user’s contexts ...

    Mi cuenta

    AccederRegistrar

    ¿necesitas ayuda?

    Manual de UsuarioAutorización TFG-M

    Listar

    todo Re-UnirComunidades y coleccionesPor fecha de publicaciónAutoresTítulosPalabras claveTipo documentoTipo de accesoEsta colecciónPor fecha de publicaciónAutoresTítulosPalabras claveTipo documentoTipo de acceso






    Aviso Legal Política de Privacidad Política de Cookies Cláusulas legales RGPD
    © UNIR - Universidad Internacional de La Rioja
     
    Aviso Legal Política de Privacidad Política de Cookies Cláusulas legales RGPD
    © UNIR - Universidad Internacional de La Rioja