DDoS Correspondence Index for Evaluating Performance Management

نویسندگان

  • Hyungwon Kim
  • Nam-Yong Lee
  • Jong-Bae Kim
چکیده

The damages from DDoS attacks are increasing as DDoS attacks are taking various forms. This has resulted not only in decreased reliability of organizations and corporations but also in the threat of national security. Organizations and corporations are making significant efforts in developing a system through which they can appropriately correspond to DDoS attacks. However, the studies on objective index for evaluating the performance of DDoS correspondence are lacking. The majority of the existing studies have been on the information protection & management system on a large scale. Accordingly, the scope of this thesis will be limited to DDoS correspondence to propose correspondence index for quantitatively measuring and managing them. The statistical techniques such as SMART technique and factor analysis will be utilized accordingly.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A Hybrid Model for Evaluating Leagile Supply Chain Performance in Industry

Supply chain management (SCM) is one of the most important of the areas that have recently generated a great deal of interest in both industry and academia. SCM is considered an integrating philosophy to manage the total flows of materials, products and information from suppliers to the ultimate customers. The changing conditions of competition, for organizations to become more responsive and a...

متن کامل

F-STONE: A Fast Real-Time DDOS Attack Detection Method Using an Improved Historical Memory Management

Distributed Denial of Service (DDoS) is a common attack in recent years that can deplete the bandwidth of victim nodes by flooding packets. Based on the type and quantity of traffic used for the attack and the exploited vulnerability of the target, DDoS attacks are grouped into three categories as Volumetric attacks, Protocol attacks and Application attacks. The volumetric attack, which the pro...

متن کامل

Development of a method for evaluating the environmental performance of ports based on the fuzzy analytic hierarchy process (FAHP)

Background: Evaluating ports' environmental performance as one of the two main parts of the maritime transport system is of great importance. This study was designed and conducted to develop a method for evaluating ports' environmental performance based on the fuzzy analytical hierarchical process. Method: The present study was conducted in 2020 with the participation of 22 experts in the field...

متن کامل

Designing a model for evaluating the financial performance of petrochemical companies based on Grounded theory

The purpose of this study was to develop a model for evaluating the financial performance of  petrochemical companies. The methodology of the research was exploratory in terms of purpose and mixed (quantitative-qualitative) in terms of data collection method. 200 experts and engineers working in petrochemical companies were available by sampling method. To achieve the objectives of the research...

متن کامل

Neural Network Based Protection of Software Defined Network Controller against Distributed Denial of Service Attacks

Software Defined Network (SDN) is a new architecture for network management and its main concept is centralizing network management in the network control level that has an overview of the network and determines the forwarding rules for switches and routers (the data level). Although this centralized control is the main advantage of SDN, it is also a single point of failure. If this main contro...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • J. Inform. and Commun. Convergence Engineering

دوره 8  شماره 

صفحات  -

تاریخ انتشار 2010