Search the World's Largest Database of Information Science & Technology Terms & Definitions
InfInfoScipedia LogoScipedia
A Free Service of IGI Global Publishing House
Below please find a list of definitions for the term that
you selected from multiple scholarly research resources.

What is DMZ

Handbook of Research on Cyber Crime and Information Privacy
A zone that provides physical or logical isolation between two networks, applying different firewall rules.
Published in Chapter:
Prediction, Detection, and Mitigation of DDoS Attacks Using HPCs: Design for a Safer Adaptive Infrastructure
Pablo Pessoa Do Nascimento (Universidade Federal de Pernambuco, Brazil), Isac F. A. F. Colares (Universidade Federal de Pernambuco, Brazil), Ronierison Maciel (Universidade Federal de Pernambuco, Brazil), Humberto Caetano Da Silva (Universidade Federal de Pernambuco, Brazil), and Paulo Maciel (Universidade Federal de Pernambuco, Brazil)
Copyright: © 2021 |Pages: 16
DOI: 10.4018/978-1-7998-5728-0.ch025
Abstract
Web service interruptions caused by DDoS (distributed denial of service) attacks have increased considerably over the years, and intrusion detection systems (IDS) are not enough to detect threats on the network, even when used together with intrusion prevention systems (IPS), taking into account the increase of assets in the traffic path, where it creates unique points of failure in the system, and also taking into account the use of data that contains information about normal traffic situations and attacks, where this comparison and analysis can cost a significant amount of host resources, to try to guarantee the prediction, detection, and mitigation of attacks in real-time or in time between detection and mitigation, being crucial in harm reduction. This chapter presents an adaptive architecture that combines techniques, methods, and tools from different segments to improve detection accuracy as well as the prediction and mitigation of these threats and to show that it is capable of implementing a powerful architecture against this type of threat, DDoS attacks.
Full Text Chapter Download: US $37.50 Add to Cart
More Results
Security and Privacy Issues of Big Data
A Demilitarized Zone, also known as perimeter network, used to create a physical or logical separation between the organization internal and external-facing services to a public network, for instance, the Internet. An outside network device can only get access to the services on the organization DMZ.
Full Text Chapter Download: US $37.50 Add to Cart
eContent Pro Discount Banner
InfoSci OnDemandECP Editorial ServicesAGOSR