Please use this identifier to cite or link to this item: http://ir.futminna.edu.ng:8080/jspui/handle/123456789/9780
Full metadata record
DC FieldValueLanguage
dc.contributor.authorIsmaila, Idris-
dc.contributor.authorOgidiagba, Jones Tobi-
dc.contributor.authorVictor, O. Waziri-
dc.contributor.authorJohn, K. Alhassan-
dc.contributor.authorOjeniyi, Joseph-
dc.date.accessioned2021-07-15T23:25:16Z-
dc.date.available2021-07-15T23:25:16Z-
dc.date.issued2017-
dc.identifier.issn2305-0012-
dc.identifier.urihttp://repository.futminna.edu.ng:8080/jspui/handle/123456789/9780-
dc.description.abstractNowadays, Internet is the main standard for communication which is being used by quantity of users through the world. At the same time, its profitable nature is producing increasing exposure to heighten cyber-attacks and there has been a massive escalation in the amount of DDOS (distributed denial of service attack) especially the HTTP Flood attacks on web application servers over the years. Network assets such as web servers, ftp servers, email servers, network bandwidth and network assets are frequently the targets of DoS attacks. In this research we focus on the HTTP Flood DoS attack, its characteristics, and the propose approach to mitigate by creating a model which we used in analysing http packets and we came up with appropriate results.en_US
dc.language.isoenen_US
dc.publisherInternational Journal of Cyber-Security and Digital Forensics (IJCSDF)en_US
dc.relation.ispartofseries;14-22-
dc.subjectDDOS attack; Mitigationen_US
dc.titleHTTP Flood Mitigation Using Gateway Inspection and Second Chance Approachen_US
dc.typeArticleen_US
Appears in Collections:Cyber Security Science

Files in This Item:
File Description SizeFormat 
HTTP FLOOD MITIGATION.pdfHTTP FLOOD MITIGATION USING GATEWAY INSPECTION AND SECOND CHANCE APPROACH711.07 kBAdobe PDFView/Open


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.