Fig 4 - uploaded by Engr Khaleeq Un Nisa
Content may be subject to copyright.
Normal Traffic vs Day1 DDoS Attacks Fig. 5. Normal Traffic vs Day2 DDoS Attacks Fig. 6. Normal Traffics vs Day3 DDoS Attacks

Normal Traffic vs Day1 DDoS Attacks Fig. 5. Normal Traffic vs Day2 DDoS Attacks Fig. 6. Normal Traffics vs Day3 DDoS Attacks

Source publication
Conference Paper
Full-text available
During the last decade, attackers have compromised reputable systems to launch massive Distributed Denial of Services (DDoS) attacks against banking services, corporate websites, and e-commerce business. Such attacks cause enormous reputation and financial losses which ruined their services to authorized users. Conventionally, diverse solutions hav...

Similar publications

Article
Full-text available
Terms such as security and privacy are significant when discussing big data topics. Security for big data can be defined as the tools and techniques needed to protect both data and analytical operations. The primary goal behind big data security is to protect valuable data from attacks, stolen data, and other destructive actions. For cloud-based bu...

Citations

Preprint
Full-text available
Within the Cyber realm, technological advances and connected devices have changed the world. The boom of smart devices (real-time objects) has provided users, businesses and organizations with an opportunity to central usability concepts with modernized operations. Today, the Internet of Things (IoT) is superseded by the Internet of Everything (IoE). The connected devices with sensors, for communication with other smart devices, users and Information Systems (IS) via the Internet pave way for hackers and attackers. The malicious users have a myriad of opportunities to compromise and conduct advanced attacks using smart devices, systems, and wireless sensors. It is an upheaval task to secure connections between systems, data, processes, and products in IoE. The research will be focused on security risks in IoE, implementation of security measures and authentication schemes to protect IoE.