ADVANCED TECHNIQUES IN DDOS ATTACK MITIGATION: THE ROLE OF MULTIPLE DISCRIMINANT DATA ANALYSIS

Authors

  • Emre Haluk Aydin Computer Engineering, Bolu Abant Izzet Baysal University, Turkey
  • Leyla Ceren Kaya Computer Engineering, Bolu Abant Izzet Baysal University, Turkey

Keywords:

security, data security, confidentiality, integrity, availability, cyber threats, DDoS attacks, network operations, authorization, authentication, vulnerabilities.

Abstract

Security is a paramount concern in both business and public affairs, especially in an era where cyber threats pose significant challenges to organizations. Among these threats, Distributed Denial of Service (DDoS) attacks, targeting both application and network layers, have become increasingly prevalent. This article sheds light on various vulnerabilities that empower attackers to circumvent authorization and authentication mechanisms, consequently hampering network operations. This article emphasizes the importance of data security with a focus on three fundamental components: confidentiality, integrity, and availability. Confidentiality entails safeguarding data from illicit access, encompassing measures like inspection, controlled sharing, and information classification. Highly sensitive information is categorized as "secret" and must be treated with utmost exclusivity. Integrity is centered on ensuring the authenticity of data, preventing unauthorized alterations, and verifying the source's legitimacy. Lastly, availability signifies that data remains accessible to authorized users.

Downloads

Published

2024-05-02

How to Cite

Aydin, E. H., & Kaya , L. C. (2024). ADVANCED TECHNIQUES IN DDOS ATTACK MITIGATION: THE ROLE OF MULTIPLE DISCRIMINANT DATA ANALYSIS . Ayden Journal of Intelligent System and Computing, 11(2), 27–38. Retrieved from https://aydenjournals.com/index.php/AJISC/article/view/534

Issue

Section

Articles