WhatsApp at (+91-9098855509) Support
ijprems Logo
  • Home
  • About Us
    • Editor Vision
    • Editorial Board
    • Privacy Policy
    • Terms & Conditions
    • Publication Ethics
    • Peer Review Process
  • For Authors
    • Publication Process(up)
    • Submit Paper Online
    • Pay Publication Fee
    • Track Paper
    • Copyright Form
    • Paper Format
    • Topics
  • Fees
  • Indexing
  • Conference
  • Contact
  • Archieves
    • Current Issue
    • Past Issue
  • More
    • FAQs
    • Join As Reviewer
  • Submit Paper

Recent Papers

Dedicated to advancing knowledge through rigorous research and scholarly publication

  1. Home
  2. Recent Papers

Design and Development of Intrusion Detection System on Application Level DDOS Attack

M.A.Ajai raju raju

Download Paper

Paper Contents

Abstract

When you store your photos online instead of on your home computer, or use webmail or a social networking site, you are using a cloud computing service. If you are an organization, and you want to use, for example, an online invoicing service instead of updating the in-house one you have been using for many years, that online invoicing service is a cloud computing service. Cloud computing refers to the delivery of computing resources over the Internet. Instead of keeping data on your own hard drive or updating applications for your needs, you use a service over the Internet, at another location, to store your information or use its applications. Doing so may give rise to certain privacy implications. Internet of Things (IoT) is increasingly becoming very popular in everyday life as it can connect the physical phenomena called as things with virtual world, i.e. the Internet. Not only new-age smart devices, wearables, cameras, smart lightings but also household appliances like washers, refrigerators, and house doors are being connected to the Internet, making a rich IoT ecosystem. Since the last decade, proliferation of sensor technologies has helped the rapid growth and mass adoption of the things. It is expected that by 2018, 11.8 billion things will be connected to the Internet. IoT has also opened up huge commercial and industrial opportunities in areas such as intelligent transportation, industrial automation. With this phenomenal growth of IoT, it is becoming critically important to protect these devices against cyber attacks. Otherwise, malicious users or attackers will take control of the devices and critical things will be at stake apart from privacy violation. Another problem is that these IoT devices have either no or little security features at device level. So, providing security at device level for a large number of heterogeneous IoT devices may not be feasible.

Copyright

Copyright © 2023 M.A.Ajai raju. This is an open access article distributed under the Creative Commons Attribution License.

Paper Details
Paper ID: IJPREMS30400002163
ISSN: 2321-9653
Publisher: ijprems
Page Navigation
  • Abstract
  • Copyright
About IJPREMS

The International Journal of Progressive Research in Engineering, Management and Science is a peer-reviewed, open access journal that publishes original research articles in engineering, management, and applied sciences.

Quick Links
  • Home
  • About Our Journal
  • Editorial Board
  • Publication Ethics
Contact Us
  • IJPREMS - International Journal of Progressive Research in Engineering Management and Science, motinagar, ujjain, Madhya Pradesh., india
  • Chat with us on WhatsApp: +91 909-885-5509
  • Email us: editor@ijprems.com
  • Mon-Fri: 9:00 AM - 5:00 PM

© 2025 International Journal of Progressive Research in Engineering, Management and Science.Designed and Developed by EVG Software Solutions All Rights Reserved.

Terms & Conditions | Privacy Policy | Publication Ethics | Peer Review Process | Contact Us