Mostrar el registro sencillo del ítem

dc.contributor.authorSaidi, Abdelali
dc.contributor.authorBendriss, Elmehdi
dc.contributor.authorKartit, Ali
dc.contributor.authorEl Marraki, Mohamed
dc.date2017-03
dc.date.accessioned2021-08-25T11:28:39Z
dc.date.available2021-08-25T11:28:39Z
dc.identifier.issn1989-1660
dc.identifier.urihttps://reunir.unir.net/handle/123456789/11735
dc.description.abstractSecurity in cloud computing is the ultimate question that every potential user studies before adopting it. Among the important points that the provider must ensure is that the Cloud will be available anytime the consumer tries to access it. Generally, the Cloud is accessible via the Internet, what makes it subject to a large variety of attacks. Today, the most striking cyber-attacks are the flooding DoS and its variant DDoS. This type of attacks aims to break down the availability of a service to its legitimate clients. In this paper, we underline the most used techniques to stand up against DoS flooading attacks in the Cloud.es_ES
dc.language.isoenges_ES
dc.publisherInternational Journal of Interactive Multimedia and Artificial Intelligence (IJIMAI)es_ES
dc.relation.ispartofseries;vol. 4, nº 3
dc.relation.urihttps://ijimai.org/journal/bibcite/reference/2571es_ES
dc.rightsopenAccesses_ES
dc.subjectagentses_ES
dc.subjectcloud computinges_ES
dc.subjectattackes_ES
dc.subjectIJIMAIes_ES
dc.titleTechniques to Detect DoS and DDoS Attacks and an Introduction of a Mobile Agent System to Enhance it in Cloud Computinges_ES
dc.typearticlees_ES
reunir.tag~IJIMAIes_ES
dc.identifier.doihttp://doi.org/10.9781/ijimai.2017.4312


Ficheros en el ítem

Thumbnail

Este ítem aparece en la(s) siguiente(s) colección(ones)

Mostrar el registro sencillo del ítem