Please use this identifier to cite or link to this item: http://dspace.hebron.edu:8080/xmlui/handle/123456789/1210
Full metadata record
DC FieldValueLanguage
dc.contributor.authorSalah, Saeed-
dc.contributor.authorAmro, Belal-
dc.date.accessioned2022-08-18T09:43:25Z-
dc.date.available2022-08-18T09:43:25Z-
dc.date.issued2023-
dc.identifier.urihttp://dspace.hebron.edu:80/xmlui/handle/123456789/1210-
dc.description.abstractDistributed denial-of-service (DDoS) attacks are among the toughest security issues nowadays. These attacks are launched at any time and can impact any part of a network’s operations or IT resources. Because of the seriousness of these attacks, many countermeasures have been developed by both the private sector and the research community. Despite the availability of many research efforts that suggested DDoS attacks classifications, the multitude, diversity, and variety of both the attacks and their countermeasures have the consequence that no standard taxonomy exists. In this paper, we introduce an updated and structured taxonomy of both DDoS attacks and their countermeasures. The novelty of this work stems from the fact that it covers different dimensions of tackling DDoS attacks in the four main technology areas: systems and network, cloud computing, SCADA, and IoT, with the main aim of providing an all-in-one comprehensive reference for ongoing and future security research.en_US
dc.language.isoenen_US
dc.publisherInderscienceen_US
dc.subjectdistributed denial-of-service; DDoS; internet of things; IoT; supervisory control and data acquisition; SCADA; systems; network; cloud computing.en_US
dc.titleBig picture: analysis of DDoS attacks map - systems and network, cloud computing, SCADA systems, and IoTen_US
dc.typeArticleen_US
Appears in Collections:Journals

Files in This Item:
File Description SizeFormat 
big picture.png94.72 kBimage/pngView/Open


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.