Search the World's Largest Database of Information Science & Technology Terms & Definitions
InfInfoScipedia LogoScipedia
A Free Service of IGI Global Publishing House
Below please find a list of definitions for the term that
you selected from multiple scholarly research resources.

What is Distributed Denial of Service Attack (DDoD)

Contemporary Challenges for Cyber Security and Data Privacy
It refers to tools and techniques used to detect attacks on the network, systems, applications and others that can exhaust the system by flooding it with different methods, leaving the system unavailable for legitimate services and requests.
Published in Chapter:
Exploratory Research of Cyber Security Dimensions: Selected Use Cases Analysis
Abhishek Vaish (Indian Institute of Information Technology, Prayagraj, India), Vatsala Upadhyay (Indian Institute of Information Technology, Prayagraj, India), Samo Bobek (Faculty of Economics and Business, University of Maribor, Slovenia), and Simona Sternad Zabukovsek (Faculty of Economics and Business, University of Maribor, Slovenia)
Copyright: © 2023 |Pages: 32
DOI: 10.4018/979-8-3693-1528-6.ch010
Abstract
Cybersecurity research is gaining a lot of importance in recent times. Bibliometric analysis of cyber security research showed major areas and their overlapping. Due to overlapping research areas with allied areas like system engineering, networking, computer science, information technology, management science, etc., the impact of cyber security research is often hard to gauge. This chapter aims to present the research dimension of cyber security as a number of use cases and an attempt to connect the researcher to understand research areas of cyber security and its complexities through use cases to make them visualize the problem better. In this chapter, the following use cases are presented and analyzed: the role of social media in cyber security issues, how traditional network-based attacks influence the IoT environment, the dynamics of malware and its impact on AI-based detection systems, and security in embedded systems.
Full Text Chapter Download: US $37.50 Add to Cart
eContent Pro Discount Banner
InfoSci OnDemandECP Editorial ServicesAGOSR