An Adaptive Approach to Mitigate DDoS Attacks in Cloud

Distributed Denial of Service (DDoS) attack constitutes one of the prominent cyber threats and among the hardest security problems in modern cyber world. This paper is to review the DDoS detection techniques and developing a numeric stable theoretical framework used for detecting various DDoS attacks in cloud. This paper is devoted to review and analysis of algorithms used for detection of DDoS attacks. The framework theorized here deals with the variability calculation method in conjunction with sampling, searching methods to find a current state of a particular parameter under observation for detecting DDoS attacks.

Spotlight

Iris Networks Limited

Iris Networks are a NETSCOUT Platinum Partner specialising in providing best of breed solutions in: - Network Analysis, Performance, Troubleshooting and Monitoring - End to End Wireless Solutions - Network Security Working with customers of all sizes, we use our experience and knowledge to help increase productivity, boost performance, reduce network downtime, reduce operational costs and deliver new network projects on time. Also partners with: Ixia, Arbor Networks, VSS Monitoring, Bluecoat, Symantec, Tenable, Darktrace, 7signal, Mist Systems, Cisco and Meraki.

OTHER WHITEPAPERS
news image

File Upload Security: The Missing Category for a Comprehensive Security Posture

whitePaper | December 15, 2022

Applications are the backbone of modern business and must be protected. Yet, most organizations have an underserved attack vector — malicious files uploaded to their custom business applications. If internal, external, or third-party files contain malware, they pose a large risk as they traverse through an organization and are stored in local or cloud repositories. Public file sharing platforms are another area where malicious file uploads can cause widespread damage.

Read More
news image

MEC security; Status of standards support and future evolutions

whitePaper | September 28, 2022

The present White Paper will focus on MEC (Multi-access Edge Computing) technologies and intends to explore security-related use cases and requirements with the aim of identifying aspects of security where the nature of edge computing results in insufficient industry approaches to cloud security. Edge computing environments are by nature characterized by a complex multi-vendor, multi-supplier, multi-stakeholder ecosystem of equipment including both HW and SW devices. Given this overall level of system heterogeneity, the areas of security, trust, and privacy are key topics for the edge environments. Finally, the advent of edge cloud federations and the presence of (far) edge devices, e.g., in Internet-ofThings environments, requires tackling MEC security with an end-to-end (E2E) approach by leveraging existing standards relevant in the area, as carefully selected to be applicable in edge computing systems.

Read More
news image

Who Owns Security in the Cloud?

whitePaper | September 27, 2022

Businesses once doubted the long-term benefits of moving their traditional, on-premises workloads to the cloud. But those doubts didn’t last long. The ROI of cloud migration was realized quickly and decisively. Businesses eagerly shifted their workloads to the cloud and realized the financial benefits of doing so. However, in the rush to the cloud, clarity on security — and who is responsible for it — is often lost.

Read More
news image

Adobe Operational Security Overview

whitePaper | December 30, 2022

With a cloud footprint that includes public and private clouds across different providers, the Adobe® multi-cloud strategy requires consistent and repeatable guardrails that are readily available to our product and service teams. To that end, our dedicated operational security team focuses on securing cloud resources at scale and helping ensure the safety and security of customer applications and data within our continually evolving cloud infrastructure operations.

Read More
news image

Setting Security Baselines in Microsoft 365

whitePaper | December 28, 2022

One of the greatest risks you will face in your Microsoft environment is Business Email Compromise. This attack costs organizations around the world millions in losses each year, with no signs of slowing down.

Read More
news image

2020 Cyber Security Predictions

whitePaper | January 28, 2020

This year there are some common themes that endure, so we’ll highlight these as “work in progress”. Transformations often take longer than 12 months to be identifi ed as necessary, to be executed and to become established. However, there are other themes emerging through a combination of drivers from audit, compliance security and governance that are now showing signs of infl uencing the way that cyber risks are managed in a much shorter timescale.

Read More

Spotlight

Iris Networks Limited

Iris Networks are a NETSCOUT Platinum Partner specialising in providing best of breed solutions in: - Network Analysis, Performance, Troubleshooting and Monitoring - End to End Wireless Solutions - Network Security Working with customers of all sizes, we use our experience and knowledge to help increase productivity, boost performance, reduce network downtime, reduce operational costs and deliver new network projects on time. Also partners with: Ixia, Arbor Networks, VSS Monitoring, Bluecoat, Symantec, Tenable, Darktrace, 7signal, Mist Systems, Cisco and Meraki.

Events