Installation of integrated intellectual information security systems in open corporate networks – DDoS attack
Main Article Content
Abstract
Securing information security in open corporate networks is crucial, and building defense systems against potential threats is a critical step towards ensuring the availability, completeness, and confidentiality of system clients. Integrated information security systems play a pivotal role in safeguarding an organization's assets by identifying and mitigating security vulnerabilities. Therefore, it is essential to be aware of the various types of attacks that may be directed towards an information system and analyze them to prevent and mitigate the impact of such attacks. By taking proactive measures to protect against DDoS attacks and other types of cyber-attacks, organizations can minimize the risk of downtime, data breaches, and financial loss, ensuring the integrity, availability, and confidentiality of their systems and clients.
Article Details
References
Budka, K., Deshpande, J. and Thottan, M. "Network Security." Communication Networks for Smart Grids. Springer London, 2014. 209-225. DOI: https://doi.org/10.1007/978-1-4471-6302-2_8
Case Study of Stroock & Stroock & Lavan LLP. “Case Study of Stroock & Stroock & Lavan LLP”. Cisco. 2016. Web. 2017.
Eslahi, M., Naseri, M., Hashim, H., Tahir, N. and Saad, E. "BYOD: Current state and security challenges." Computer Applications and Industrial Electronics (ISCAIE), 2014 IEEE Symposium on. IEEE, 2014. 123-134. DOI: https://doi.org/10.1109/ISCAIE.2014.7010235
Narmeen Zakaria Bawany, Jawwad A. Shamsi, Khaled Salah, “DDoS Attack Detection and Mitigation Using SDN Methods, Practices, and Solutions”, Arabian Journal for Science and Engineering, February 2017, Volume 42, Issue 2, pp 425–441 DOI: https://doi.org/10.1007/s13369-017-2414-5
Braga, R.; Mota, E.; Passito, A, “Lightweight DDoS flooding attack detection using NOX/OpenFlow”, In: LCN ’17 Proceedings of the 2017 IEEE 35th Conference on Local Computer Networks, pp. 408–415. IEEE, Washington (2017)
Dillon, C.; Berkelaar, M., “OpenFlow (D) DoS Mitigation”, Technical Report (Feb 2018). http://www.delaat.net/rp/2013-2014/p42/ report.pdf (2018)
http://www.hping.org/hping3.html