To search, Click below search items.

 

All Published Papers Search Service

Title

Distributed Denial of Service Defense on Cloud Computing Based on Network Intrusion Detection System: Survey

Author

Esraa Samkari and Hatim Alsuwat

Citation

Vol. 22  No. 6  pp. 67-74

Abstract

One type of network security breach is the availability breach, which deprives legitimate users of their right to access services. The Denial of Service (DoS) attack is one way to have this breach, whereas using the Intrusion Detection System (IDS) is the trending way to detect a DoS attack. However, building IDS has two challenges: reducing the false alert and picking up the right dataset to train the IDS model. The survey concluded, in the end, that using a real dataset such as MAWILab or some tools like ID2T that give the researcher the ability to create a custom dataset may enhance the IDS model to handle the network threats, including DoS attacks. In addition to minimizing the rate of the false alert.

Keywords

DDoS, DoS, cloud computing attack, network intrusion detection, system detection.

URL

http://paper.ijcsns.org/07_book/202206/20220612.pdf