Ayanseun S. Ayanboye, John E. Efiong, G. E. Alilu, Adedoyin I. Oyebade, B. Akinyemi
{"title":"虚拟环境中拒绝服务攻击的安全技术评估","authors":"Ayanseun S. Ayanboye, John E. Efiong, G. E. Alilu, Adedoyin I. Oyebade, B. Akinyemi","doi":"10.1109/ITED56637.2022.10051209","DOIUrl":null,"url":null,"abstract":"By establishing various simulated environments or specialized resources, a virtual environment enables users to interact with both the computing environment and the work of other users. Although these programs were created to limit attack vectors, the development of attack tools has made them great targets for cyberattacks. The Denial of Service (DoS) assault is the main consequence of successful attacks on the environment. In this study, the various security techniques for DoS attack in virtualized systems are evaluated, and the current state of intrusion detection, its processes, and potential future directions are covered.","PeriodicalId":246041,"journal":{"name":"2022 5th Information Technology for Education and Development (ITED)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2022-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"An Assessment of Security Techniques for Denial of Service Attack in Virtualized Environments\",\"authors\":\"Ayanseun S. Ayanboye, John E. Efiong, G. E. Alilu, Adedoyin I. Oyebade, B. Akinyemi\",\"doi\":\"10.1109/ITED56637.2022.10051209\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"By establishing various simulated environments or specialized resources, a virtual environment enables users to interact with both the computing environment and the work of other users. Although these programs were created to limit attack vectors, the development of attack tools has made them great targets for cyberattacks. The Denial of Service (DoS) assault is the main consequence of successful attacks on the environment. In this study, the various security techniques for DoS attack in virtualized systems are evaluated, and the current state of intrusion detection, its processes, and potential future directions are covered.\",\"PeriodicalId\":246041,\"journal\":{\"name\":\"2022 5th Information Technology for Education and Development (ITED)\",\"volume\":\"20 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2022-11-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2022 5th Information Technology for Education and Development (ITED)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ITED56637.2022.10051209\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2022 5th Information Technology for Education and Development (ITED)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ITED56637.2022.10051209","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
An Assessment of Security Techniques for Denial of Service Attack in Virtualized Environments
By establishing various simulated environments or specialized resources, a virtual environment enables users to interact with both the computing environment and the work of other users. Although these programs were created to limit attack vectors, the development of attack tools has made them great targets for cyberattacks. The Denial of Service (DoS) assault is the main consequence of successful attacks on the environment. In this study, the various security techniques for DoS attack in virtualized systems are evaluated, and the current state of intrusion detection, its processes, and potential future directions are covered.