American International Journal of Computer Science and Information Technology (AIJCSIT)

DATA-DRIVEN DEFENSE: ANALYZING DDOS ATTACKS WITH MULTIPLE DISCRIMINANT DATA ANALYSIS

Authors

  • Mehmet Ali Yılmaz Computer Engineering, Bolu Abant Izzet Baysal University, Turkey

Abstract

Ensuring security remains a paramount concern in both business and public spheres. Among the myriad threats faced, hacking attacks, particularly Distributed Denial of Service (DDoS) attacks at the application and network layers, loom large. Identified vulnerabilities often grant attackers unauthorized access, allowing them to compromise web services and impede network functionality.

The foundation of data security rests on three fundamental tenets: confidentiality, integrity, and availability. Confidentiality entails safeguarding data from illicit use, involving scrutiny, restricted sharing, and controlled dissemination. Information categorized as highly sensitive is deemed secret and necessitates stringent, exclusive protection. Integrity guarantees the unaltered veracity of data, affirming its origin and authenticity. Availability ensures data accessibility to authorized users, underpinning its utility and relevance.

Keywords:

Security, Distributed Denial of Service (DDoS),, Confidentiality, Integrity, Availability

Published

2023-11-02

How to Cite

Yılmaz, M. A. (2023). DATA-DRIVEN DEFENSE: ANALYZING DDOS ATTACKS WITH MULTIPLE DISCRIMINANT DATA ANALYSIS. American International Journal of Computer Science and Information Technology (AIJCSIT), 8(1), 31–41. Retrieved from https://zapjournals.com/Journals/index.php/aijcsit/article/view/1465