Ayanseun S. Ayanboye, John E. Efiong, G. E. Alilu, Adedoyin I. Oyebade, B. Akinyemi
{"title":"An Assessment of Security Techniques for Denial of Service Attack in Virtualized Environments","authors":"Ayanseun S. Ayanboye, John E. Efiong, G. E. Alilu, Adedoyin I. Oyebade, B. Akinyemi","doi":"10.1109/ITED56637.2022.10051209","DOIUrl":null,"url":null,"abstract":"By establishing various simulated environments or specialized resources, a virtual environment enables users to interact with both the computing environment and the work of other users. Although these programs were created to limit attack vectors, the development of attack tools has made them great targets for cyberattacks. The Denial of Service (DoS) assault is the main consequence of successful attacks on the environment. In this study, the various security techniques for DoS attack in virtualized systems are evaluated, and the current state of intrusion detection, its processes, and potential future directions are covered.","PeriodicalId":246041,"journal":{"name":"2022 5th Information Technology for Education and Development (ITED)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2022-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2022 5th Information Technology for Education and Development (ITED)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ITED56637.2022.10051209","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
By establishing various simulated environments or specialized resources, a virtual environment enables users to interact with both the computing environment and the work of other users. Although these programs were created to limit attack vectors, the development of attack tools has made them great targets for cyberattacks. The Denial of Service (DoS) assault is the main consequence of successful attacks on the environment. In this study, the various security techniques for DoS attack in virtualized systems are evaluated, and the current state of intrusion detection, its processes, and potential future directions are covered.