Intercept the cloud network from brute force and ddos attacks via intrusion detection and prevention system

42Citations
Citations of this article
60Readers
Mendeley users who have this article in their library.

This article is free to access.

Abstract

Cloud computing is considered to be the best technique for storing data online instead of using a hard drive. It includes three different types of computing services that are provided to remote users via the Internet. Cloud computing offers its end users a variety of options, such as cost savings, access to online resources and performance, but as the number of users in cloud computing grows, so does the likelihood of an attack. Various researchers have researched and provided many solutions to prevent these attacks. One of the best ways to detect an attack is through an Intrusion Detection System. This article will develop an efficient framework in which will use and discuss various security solutions for a network. Every device on the network will be attacked and the attack rate of the entire network will be monitored. After that, various solutions will be provided to protect the cloud server from attacks. Different principles will be used at the end of the article to test the accuracy of the results and from each conclusion it will be concluded to what extent the results of this paper are better than others.

Cite

CITATION STYLE

APA

Nadeem, M., Arshad, A., Riaz, S., Band, S. S., & Mosavi, A. (2021). Intercept the cloud network from brute force and ddos attacks via intrusion detection and prevention system. IEEE Access, 9, 152300–152309. https://doi.org/10.1109/ACCESS.2021.3126535

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free