Installation of integrated intellectual information security systems in open corporate networks – DDoS attack

Main Article Content

Kifayat Mammadova
Rahim Aslanov

Abstract

Securing information security in open corporate networks is crucial, and building defense systems against potential threats is a critical step towards ensuring the availability, completeness, and confidentiality of system clients. Integrated information security systems play a pivotal role in safeguarding an organization's assets by identifying and mitigating security vulnerabilities. Therefore, it is essential to be aware of the various types of attacks that may be directed towards an information system and analyze them to prevent and mitigate the impact of such attacks. By taking proactive measures to protect against DDoS attacks and other types of cyber-attacks, organizations can minimize the risk of downtime, data breaches, and financial loss, ensuring the integrity, availability, and confidentiality of their systems and clients.


Google Scholar

CrossRef

OUCI

Scilit

WorldCat

Index Copernicus

Semantic Scholar

Article Details


How to Cite
Mammadova, K., & Aslanov, R. (2023). Installation of integrated intellectual information security systems in open corporate networks – DDoS attack. Scientific Collection «InterConf+», (32(151), 643–651. https://doi.org/10.51582/interconf.19-20.04.2023.069

References

Budka, K., Deshpande, J. and Thottan, M. "Network Security." Communication Networks for Smart Grids. Springer London, 2014. 209-225. DOI: https://doi.org/10.1007/978-1-4471-6302-2_8

Case Study of Stroock & Stroock & Lavan LLP. “Case Study of Stroock & Stroock & Lavan LLP”. Cisco. 2016. Web. 2017.

Eslahi, M., Naseri, M., Hashim, H., Tahir, N. and Saad, E. "BYOD: Current state and security challenges." Computer Applications and Industrial Electronics (ISCAIE), 2014 IEEE Symposium on. IEEE, 2014. 123-134. DOI: https://doi.org/10.1109/ISCAIE.2014.7010235

Narmeen Zakaria Bawany, Jawwad A. Shamsi, Khaled Salah, “DDoS Attack Detection and Mitigation Using SDN Methods, Practices, and Solutions”, Arabian Journal for Science and Engineering, February 2017, Volume 42, Issue 2, pp 425–441 DOI: https://doi.org/10.1007/s13369-017-2414-5

Braga, R.; Mota, E.; Passito, A, “Lightweight DDoS flooding attack detection using NOX/OpenFlow”, In: LCN ’17 Proceedings of the 2017 IEEE 35th Conference on Local Computer Networks, pp. 408–415. IEEE, Washington (2017)

Dillon, C.; Berkelaar, M., “OpenFlow (D) DoS Mitigation”, Technical Report (Feb 2018). http://www.delaat.net/rp/2013-2014/p42/ report.pdf (2018)

http://www.hping.org/hping3.html

https://javapipe.com/DDoS/blog/DDoS-types

https://securelist.com/DDoS-attacks-in-q1-2017/78285