A PHP Error was encountered

Severity: Warning

Message: file_get_contents(https://...@gmail.com&api_key=61f08fa0b96a73de8c900d749fcb997acc09&a=1): Failed to open stream: HTTP request failed! HTTP/1.1 429 Too Many Requests

Filename: helpers/my_audit_helper.php

Line Number: 176

Backtrace:

File: /var/www/html/application/helpers/my_audit_helper.php
Line: 176
Function: file_get_contents

File: /var/www/html/application/helpers/my_audit_helper.php
Line: 250
Function: simplexml_load_file_from_url

File: /var/www/html/application/helpers/my_audit_helper.php
Line: 3122
Function: getPubMedXML

File: /var/www/html/application/controllers/Detail.php
Line: 575
Function: pubMedSearch_Global

File: /var/www/html/application/controllers/Detail.php
Line: 489
Function: pubMedGetRelatedKeyword

File: /var/www/html/index.php
Line: 316
Function: require_once

Improving network resilience against DDoS attacks: A fuzzy TOPSIS-based quantitative assessment approach. | LitMetric

Improving network resilience against DDoS attacks: A fuzzy TOPSIS-based quantitative assessment approach.

Heliyon

Department of Cybersecurity, College of Computing, Umm Al-Qura University, Makkah 24211, Saudi Arabia.

Published: November 2024

AI Article Synopsis

  • The explosive growth of the internet and digital platforms has led to increasing challenges in data transmission security, highlighting the need for robust network security measures to protect sensitive information.
  • This research uses a Multi-Criteria Decision Making (MCDM) approach, focusing on a fuzzy TOPSIS method, to evaluate and enhance resilience against DDoS attacks by assessing various security attributes and vulnerabilities.
  • The findings reveal that network N6 is the most secure against DDoS attacks, providing strategic recommendations for organizations to strengthen cybersecurity and better protect their operations and sensitive data from evolving cyber threats.

Article Abstract

Security in data transmission is becoming problematic due to the internet's explosive growth as well as the spread of social media and digital advertising platforms, which have produced enormous volumes of data every day. In order to safeguard sensitive data, network security is becoming more and more important as technology is adopted. Effective information security measures are needed to protect against a variety of dangers, given the expanding number of users. A key factor in improving security is network security attributes, which include message encryption, password breaking, safeguarding wireless networks, and finding security holes. This paper adopts the Multi-Criteria Decision Making (MCDM) approach, utilising a fuzzy TOPSIS-based method, with the objective of systematically evaluating resilience in network security, especially against DDoS attacks. The research assesses different security attributes and vulnerabilities to offer actionable insights on how best to strengthen organizational cybersecurity frameworks. The methodology encompasses conducting network security audits to identify vulnerabilities that could compromise commercial operations or expose sensitive data. The findings provide critical insights that can inform targeted actions to address these vulnerabilities and enhance resource protection. The results indicate that network N6 is the most secure under DDoS attacks, followed by networks N1, N5, N3, N4, and N2. This research is significant as it aids strategic decision-making, strengthens network defenses, and enhances overall cybersecurity resilience in an era of evolving cyber threats. By addressing the complexities of network security assessments, this study makes a crucial contribution to the ongoing efforts of organisations to safeguard their data, employees, and customer information from sophisticated cyber threats.

Download full-text PDF

Source
http://www.ncbi.nlm.nih.gov/pmc/articles/PMC11617140PMC
http://dx.doi.org/10.1016/j.heliyon.2024.e40413DOI Listing

Publication Analysis

Top Keywords

network security
20
ddos attacks
12
security
10
fuzzy topsis-based
8
sensitive data
8
security attributes
8
cyber threats
8
network
7
data
5
improving network
4

Similar Publications

Want AI Summaries of new PubMed Abstracts delivered to your In-box?

Enter search terms and have AI summaries delivered each week - change queries or unsubscribe any time!