An Adaptive Approach to Mitigate DDoS Attacks in Cloud

Distributed Denial of Service (DDoS) attack constitutes one of the prominent cyber threats and among the hardest security problems in modern cyber world. This paper is to review the DDoS detection techniques and developing a numeric stable theoretical framework used for detecting various DDoS attacks in cloud. This paper is devoted to review and analysis of algorithms used for detection of DDoS attacks. The framework theorized here deals with the variability calculation method in conjunction with sampling, searching methods to find a current state of a particular parameter under observation for detecting DDoS attacks.

Spotlight

ZeroFOX

ZeroFOX protects the world’s social media ecosystem and the people and organizations that rely upon it. In an age of constant connectivity and social sharing, users have become the primary target for the adversary. ZeroFOX protects your people where they are most vulnerable by continuously monitoring social platforms for cyber attacks, sensitive information loss, social engineering campaigns, account compromise and fraud. Leveraging cutting edge technology and proven security practices, ZeroFOX provides both targeted protection and global insights into the world of social media threats.

OTHER WHITEPAPERS
news image

Post-Covid-19: Digital Transformation and OT Cyber Security in Asia

whitePaper | November 2, 2022

Digital transformation has been dramatically accelerated by the Covid-19 pandemic, requiring businesses and operations to quickly set up infrastructures to maintain business continuity. And no part of the network has been impacted more than the OT environment. New systems allow employees to operate from home and for equipment vendors to connect remotely to the network to maintain production. And as we emerge from the pandemic, organisations are now more cognisant of the advantages of scaling their business and operations beyond their traditional network perimeters than ever before.

Read More
news image

ZTE Cybersecurity White Paper 2021

whitePaper | October 29, 2021

Telecommunications equipment and systems, as critical infrastructure for a nation, have been widely valued by governments, operators, and users worldwide. Currently, the deployment of 5G has begun. Featuring faster speed, greater network capacity, and ultra-low latency, 5G will redefine the operation of critical infrastructure from the factory floor to the cloud. Its new technologies including Software-Defined Networking (SDN), Network Function Virtualization (NFV), Multi-access Edge Computing (MEC), and network slicing are paving the way for smart cities, remote surgery, autonomous vehicles, and large-scale Internet of Things (IoT) connectivity.

Read More
news image

Securing Water Utilities with AWS

whitePaper | March 3, 2023

Today, many U.S. water utilities want to implement cloud-based information technology (IT) and operational technology (OT) solutions to realize the operational and security benefits of the cloud. This whitepaper discusses the business drivers associated with cloud adoption in the U.S. Water Sector, cyber security trends, and outlines best practices for implementing cyber security controls at a water utility.

Read More
news image

Cybersecurity Services

whitePaper | October 17, 2022

Our approach to cybersecurity includes a holistic set of services spanning Risk Assessments, Security Patching, Advisory Services and Managed Detection and, Response (MDR).

Read More
news image

Dashlane - Security White Paper August 2022

whitePaper | August 30, 2022

Access to the user’s data requires using the User Master Password which is only known by the user. It is used to generate the symmetric Advanced Encryption Standard(AES) 256-bit key for encryption and decryption of the user’s personal data on the user’s device. We useWebcrypto API for most browser based cryptography and the native libraries for IOS and Android.

Read More
news image

ScienceLogic Global Security

whitePaper | September 30, 2022

As organizations become more digital in nature, securing the data becomes a top-of-mind priority given the cybersecurity challenges. ScienceLogic is committed to making the necessary investments in security and providing the transparency to gain the trust of our customer and partners.

Read More

Spotlight

ZeroFOX

ZeroFOX protects the world’s social media ecosystem and the people and organizations that rely upon it. In an age of constant connectivity and social sharing, users have become the primary target for the adversary. ZeroFOX protects your people where they are most vulnerable by continuously monitoring social platforms for cyber attacks, sensitive information loss, social engineering campaigns, account compromise and fraud. Leveraging cutting edge technology and proven security practices, ZeroFOX provides both targeted protection and global insights into the world of social media threats.

Events