Reference Hub1
Stochastic Intrusion Detection Game-Based Arrangement Using Controlled Markov Chain for Prevention of DoS and DDoS Attacks in Cloud

Stochastic Intrusion Detection Game-Based Arrangement Using Controlled Markov Chain for Prevention of DoS and DDoS Attacks in Cloud

Priti Narwal, Deepak Kumar, Shailendra Narayan Singh, Peeyush Tewari
Copyright: © 2021 |Volume: 14 |Issue: 4 |Pages: 13
ISSN: 1938-7857|EISSN: 1938-7865|EISBN13: 9781799860037|DOI: 10.4018/JITR.2021100104
Cite Article Cite Article

MLA

Narwal, Priti, et al. "Stochastic Intrusion Detection Game-Based Arrangement Using Controlled Markov Chain for Prevention of DoS and DDoS Attacks in Cloud." JITR vol.14, no.4 2021: pp.45-57. http://doi.org/10.4018/JITR.2021100104

APA

Narwal, P., Kumar, D., Singh, S. N., & Tewari, P. (2021). Stochastic Intrusion Detection Game-Based Arrangement Using Controlled Markov Chain for Prevention of DoS and DDoS Attacks in Cloud. Journal of Information Technology Research (JITR), 14(4), 45-57. http://doi.org/10.4018/JITR.2021100104

Chicago

Narwal, Priti, et al. "Stochastic Intrusion Detection Game-Based Arrangement Using Controlled Markov Chain for Prevention of DoS and DDoS Attacks in Cloud," Journal of Information Technology Research (JITR) 14, no.4: 45-57. http://doi.org/10.4018/JITR.2021100104

Export Reference

Mendeley
Favorite Full-Issue Download

Abstract

DoS (denial of service) assault is the most prevalent assault these days. It imposes a major risk to cybersecurity. At the point when this assault is propelled by numerous conveyed machines on a solitary server machine, it is called as a DDoS (distributed denial of service) assault. Additionally, DoS bypass on DHCP (dynamic host configuration protocol) server assault is a rising and famous assault in a system. The authors have proposed a stochastic intrusion detection game-based arrangement utilizing controlled Markov chain that figures the transition probabilities starting with one state then onto the next in a state transition diagram. At first, the authors have conjectured these assaults, and after that, they proposed a methodology that uses the idea of master and slave IPS (intrusion prevention system). This approach works well when mapped to these estimated assaults and accordingly helps in the recognition and counteractive action of these assaults in a cloud domain.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.