{"title":"基于Cisco Cloudlock解决方案的云环境网络安全保障技术","authors":"M. I. Opanasenko","doi":"10.31673/2409-7292.2023.010010","DOIUrl":null,"url":null,"abstract":"The article examines Denial of Service (DDoS) attacks that occur at the network layer of IoT systems and their impact on various aspects of network operation. DDoS attack scenarios using network bandwidth and using system resources are briefly discussed. Botnet detection methods in the IoT network are analyzed.","PeriodicalId":107068,"journal":{"name":"Modern information security","volume":"428 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"The technology of ensuring cyber security of the cloud environment based on the Cisco Cloudlock solution\",\"authors\":\"M. I. Opanasenko\",\"doi\":\"10.31673/2409-7292.2023.010010\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The article examines Denial of Service (DDoS) attacks that occur at the network layer of IoT systems and their impact on various aspects of network operation. DDoS attack scenarios using network bandwidth and using system resources are briefly discussed. Botnet detection methods in the IoT network are analyzed.\",\"PeriodicalId\":107068,\"journal\":{\"name\":\"Modern information security\",\"volume\":\"428 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"1900-01-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Modern information security\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.31673/2409-7292.2023.010010\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Modern information security","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.31673/2409-7292.2023.010010","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
The technology of ensuring cyber security of the cloud environment based on the Cisco Cloudlock solution
The article examines Denial of Service (DDoS) attacks that occur at the network layer of IoT systems and their impact on various aspects of network operation. DDoS attack scenarios using network bandwidth and using system resources are briefly discussed. Botnet detection methods in the IoT network are analyzed.