Design and Development of Intrusion Detection System on Application Level DDOS Attack
M.A.Ajai raju raju
Paper Contents
Abstract
When you store your photos online instead of on your home computer, or use webmail or a social networking site, you are using a cloud computing service. If you are an organization, and you want to use, for example, an online invoicing service instead of updating the in-house one you have been using for many years, that online invoicing service is a cloud computing service. Cloud computing refers to the delivery of computing resources over the Internet. Instead of keeping data on your own hard drive or updating applications for your needs, you use a service over the Internet, at another location, to store your information or use its applications. Doing so may give rise to certain privacy implications. Internet of Things (IoT) is increasingly becoming very popular in everyday life as it can connect the physical phenomena called as things with virtual world, i.e. the Internet. Not only new-age smart devices, wearables, cameras, smart lightings but also household appliances like washers, refrigerators, and house doors are being connected to the Internet, making a rich IoT ecosystem. Since the last decade, proliferation of sensor technologies has helped the rapid growth and mass adoption of the things. It is expected that by 2018, 11.8 billion things will be connected to the Internet. IoT has also opened up huge commercial and industrial opportunities in areas such as intelligent transportation, industrial automation. With this phenomenal growth of IoT, it is becoming critically important to protect these devices against cyber attacks. Otherwise, malicious users or attackers will take control of the devices and critical things will be at stake apart from privacy violation. Another problem is that these IoT devices have either no or little security features at device level. So, providing security at device level for a large number of heterogeneous IoT devices may not be feasible.
Copyright
Copyright © 2023 M.A.Ajai raju. This is an open access article distributed under the Creative Commons Attribution License.