Bimonthly    Since 1986
ISSN 1004-9037
Publication Details
Edited by: Editorial Board of Journal of Data Acquisition and Processing
P.O. Box 2704, Beijing 100190, P.R. China
Sponsored by: Institute of Computing Technology, CAS & China Computer Federation
Undertaken by: Institute of Computing Technology, CAS
Published by: SCIENCE PRESS, BEIJING, CHINA
Distributed by:
China: All Local Post Offices
 
   
      Volume 37 Issue 5, 2022   
    Article

    EFFECTIVE DEFENSE STRATEGIES FOR PREVENTING CATASTROPHIC CYBER ATTACKS IN CLOUD COMPUTING
    Girjesh Tiwari, Thaksen Parvat
    Journal of Data Acquisition and Processing, 2022, 37 (5): 2480-2487 . 

    Abstract

    Cloud computing has become a popular technology for providing scalable and cost-effective computing services. However, the security of cloud computing systems is a major concern, as they are vulnerable to various cyber-attacks, including distributed denial-of-service (DDoS) attacks, data breaches, and malware infections. These attacks can have catastrophic consequences, including data loss, financial losses, and damage to reputation. Therefore, effective defense strategies are needed to prevent and mitigate the impact of cyber-attacks in cloud computing. In this paper, we propose effective defense strategies for preventing catastrophic cyber-attacks in cloud computing. Our proposed strategies leverage a combination of proactive and reactive measures, including network segmentation, intrusion detection and prevention, and incident response planning. We also propose the use of machine learning algorithms for detecting and preventing cyber-attacks in real-time. To evaluate the effectiveness of our proposed defense strategies, we conduct simulations using the OPNET and evaluate the performance of our strategies in terms of security, scalability, and efficiency. Our experimental results demonstrate that our proposed defense strategies are effective in preventing and mitigating the impact of cyber-attacks in cloud computing. The use of machine learning algorithms enables our system to adapt to new and emerging threats, making it a practical solution for protecting cloud computing systems against cyber-attacks.

    Keyword

    #


    PDF Download (click here)

SCImago Journal & Country Rank

ISSN 1004-9037

         

Home
Editorial Board
Author Guidelines
Subscription
Journal of Data Acquisition and Processing
Institute of Computing Technology, Chinese Academy of Sciences
P.O. Box 2704, Beijing 100190 P.R. China
E-mail: info@sjcjycl.cn
 
  Copyright ©2015 JCST, All Rights Reserved