Intercept the Cloud Network From Brute Force and DDoS Attacks via Intrusion Detection and Prevention System

Cloud computing is considered to be the best technique for storing data online instead of using a hard drive. It includes three different types of computing services that are provided to remote users via the Internet. Cloud computing offers its end users a variety of options, such as cost savings, a...

Descripción completa

Guardado en:
Detalles Bibliográficos
Autores principales: Muhammad Nadeem, Ali Arshad, Saman Riaz, Shahab S. Band, Amir Mosavi
Formato: article
Lenguaje:EN
Publicado: IEEE 2021
Materias:
Bot
Acceso en línea:https://doaj.org/article/f6c254d0e3dc4032b8a96023826b7fd4
Etiquetas: Agregar Etiqueta
Sin Etiquetas, Sea el primero en etiquetar este registro!
id oai:doaj.org-article:f6c254d0e3dc4032b8a96023826b7fd4
record_format dspace
spelling oai:doaj.org-article:f6c254d0e3dc4032b8a96023826b7fd42021-11-20T00:02:32ZIntercept the Cloud Network From Brute Force and DDoS Attacks via Intrusion Detection and Prevention System2169-353610.1109/ACCESS.2021.3126535https://doaj.org/article/f6c254d0e3dc4032b8a96023826b7fd42021-01-01T00:00:00Zhttps://ieeexplore.ieee.org/document/9606751/https://doaj.org/toc/2169-3536Cloud computing is considered to be the best technique for storing data online instead of using a hard drive. It includes three different types of computing services that are provided to remote users via the Internet. Cloud computing offers its end users a variety of options, such as cost savings, access to online resources and performance, but as the number of users in cloud computing grows, so does the likelihood of an attack. Various researchers have researched and provided many solutions to prevent these attacks. One of the best ways to detect an attack is through an Intrusion Detection System. This article will develop an efficient framework in which will use and discuss various security solutions for a network. Every device on the network will be attacked and the attack rate of the entire network will be monitored. After that, various solutions will be provided to protect the cloud server from attacks. Different principles will be used at the end of the article to test the accuracy of the results and from each conclusion it will be concluded to what extent the results of this paper are better than others.Muhammad NadeemAli ArshadSaman RiazShahab S. BandAmir MosaviIEEEarticleIntrusion detection systemnetwork based intrusion detection systemhost based intrusion detection systemspamDDoSBotElectrical engineering. Electronics. Nuclear engineeringTK1-9971ENIEEE Access, Vol 9, Pp 152300-152309 (2021)
institution DOAJ
collection DOAJ
language EN
topic Intrusion detection system
network based intrusion detection system
host based intrusion detection system
spam
DDoS
Bot
Electrical engineering. Electronics. Nuclear engineering
TK1-9971
spellingShingle Intrusion detection system
network based intrusion detection system
host based intrusion detection system
spam
DDoS
Bot
Electrical engineering. Electronics. Nuclear engineering
TK1-9971
Muhammad Nadeem
Ali Arshad
Saman Riaz
Shahab S. Band
Amir Mosavi
Intercept the Cloud Network From Brute Force and DDoS Attacks via Intrusion Detection and Prevention System
description Cloud computing is considered to be the best technique for storing data online instead of using a hard drive. It includes three different types of computing services that are provided to remote users via the Internet. Cloud computing offers its end users a variety of options, such as cost savings, access to online resources and performance, but as the number of users in cloud computing grows, so does the likelihood of an attack. Various researchers have researched and provided many solutions to prevent these attacks. One of the best ways to detect an attack is through an Intrusion Detection System. This article will develop an efficient framework in which will use and discuss various security solutions for a network. Every device on the network will be attacked and the attack rate of the entire network will be monitored. After that, various solutions will be provided to protect the cloud server from attacks. Different principles will be used at the end of the article to test the accuracy of the results and from each conclusion it will be concluded to what extent the results of this paper are better than others.
format article
author Muhammad Nadeem
Ali Arshad
Saman Riaz
Shahab S. Band
Amir Mosavi
author_facet Muhammad Nadeem
Ali Arshad
Saman Riaz
Shahab S. Band
Amir Mosavi
author_sort Muhammad Nadeem
title Intercept the Cloud Network From Brute Force and DDoS Attacks via Intrusion Detection and Prevention System
title_short Intercept the Cloud Network From Brute Force and DDoS Attacks via Intrusion Detection and Prevention System
title_full Intercept the Cloud Network From Brute Force and DDoS Attacks via Intrusion Detection and Prevention System
title_fullStr Intercept the Cloud Network From Brute Force and DDoS Attacks via Intrusion Detection and Prevention System
title_full_unstemmed Intercept the Cloud Network From Brute Force and DDoS Attacks via Intrusion Detection and Prevention System
title_sort intercept the cloud network from brute force and ddos attacks via intrusion detection and prevention system
publisher IEEE
publishDate 2021
url https://doaj.org/article/f6c254d0e3dc4032b8a96023826b7fd4
work_keys_str_mv AT muhammadnadeem interceptthecloudnetworkfrombruteforceandddosattacksviaintrusiondetectionandpreventionsystem
AT aliarshad interceptthecloudnetworkfrombruteforceandddosattacksviaintrusiondetectionandpreventionsystem
AT samanriaz interceptthecloudnetworkfrombruteforceandddosattacksviaintrusiondetectionandpreventionsystem
AT shahabsband interceptthecloudnetworkfrombruteforceandddosattacksviaintrusiondetectionandpreventionsystem
AT amirmosavi interceptthecloudnetworkfrombruteforceandddosattacksviaintrusiondetectionandpreventionsystem
_version_ 1718419873913110528