A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2022; you can also visit the original URL.
The file type is application/pdf
.
Filters
A Distributed Cloud Honeypot Architecture
2021
2021 IEEE 45th Annual Computers, Software, and Applications Conference (COMPSAC)
This research aims to propose a new collaborated active defense framework between Honeypot and cloud platform to detect and defend future DDoS attacks in the context of the IoT with the instantaneous malicious ...
Furthermore, DDoS attacks using Bonnets result more destructive effects. ...
The second stage will use virtual technology to build multiple platforms to simulate each function of Honeypot and integrate multiple platforms to build a cloud Honeypot. ...
doi:10.1109/compsac51774.2021.00162
fatcat:27elc5qdhfa6dm5xfnw2khm7v4
CoFence: A collaborative DDoS defence using network function virtualization
2016
2016 12th International Conference on Network and Service Management (CNSM)
In this work, we propose CoFence − a DDoS defense mechanism which facilitates a collaboration framework among NFV-based peer domain networks. ...
The emerging of Network Function Virtualization (NFV) technology introduces new opportunities for low-cost and flexible DDoS defense solutions. ...
In this paper, we introduce a novel approach for DDoS mitigation using collaborative networks and Network Function Virtualization (NFV) technology. ...
doi:10.1109/cnsm.2016.7818412
dblp:conf/cnsm/RashidiF16
fatcat:fuecsv464zabbe6zalwruvocoy
Distributed Denial of Service Attacks in Cloud Computing
2020
International Journal of Advanced Computer Science and Applications
This paper will investigate most of the method used in detecting and preventing and then recover from the DDoS in the cloud computing environment. ...
There many techniques to defend the DDOS attack in the regular networks, while in the cloud computing this task is more complicated regarding the various characteristics of the cloud that make the defending ...
" lists a comparison of DDOS attacks defence mechanisms using SDN [16] . ...
doi:10.14569/ijacsa.2020.0110621
fatcat:u4ihedsjw5a2fnwxr6sl2xom4e
Detection of DDOS attacks in distributed peer to peer networks
2018
International Journal of Engineering & Technology
A Simulation study has been made using NS2 and the experimental results reveal the significance of the proposed framework in defending P2P network and target hosts from high risk DDoS attacks. ...
Since these networks spread across the globe with large scale deployment of nodes, adversaries use them as a vehicle to launch DDoS attacks. ...
Zargar et al. [7] made a survey on the DDoS flooding attacks and their defence mechanisms. And they found the need for distributed and collaborated defence mechanisms against such attacks. ...
doi:10.14419/ijet.v7i2.7.12227
fatcat:ky4m3jijpjfprnaexwylnbjj2i
Defence for Distributed Denial of Service Attacks in Cloud Computing
2015
Procedia Computer Science
A critical review of most recent intrusion detection and prevention systems to mitigate potential DDoS attacks is presented. ...
This investigates the exploitation of compromised virtual machines to execute large-scale Distributed Denial-of-Service (DDoS) attacks. ...
[28] investigate the use of Hadoop for DDoS defence. Hadoop uses the MapReduce framework for processing large volumes of data. ...
doi:10.1016/j.procs.2015.12.037
fatcat:guto4fntjvgz7et5k4v756eoqa
Denial of Service Attacks: Tools and Categories
2020
International Journal of Engineering Research and
Issues in Internet security provide the hackers with ways to attack network systems. These attacks can be performed using many tools and techniques. ...
This kind of attacks try to prevent legitimate users from using their rights to online services by bringing down servers. ...
To allow flexible and dynamic network function implementation, NFV is virtualizing network functions within virtual machines on servers. ...
doi:10.17577/ijertv9is030289
fatcat:l4afr3hdnvbbxpltq675o6yeoi
Edge Based Network Attack Detection Using Pulsar
2020
International Journal of Innovative Science and Research Technology
Research shows that there cannot be a better example to show how prevalent internet use is nowadays. ...
This research has focused on exploring ways of integrating the Software Defined Networking with the pub-sub messaging system in order to show a collaborative approach of defense to these attacks. ...
NIDS
Network Intrusion Detection System
CIDS
Collaborative Intrusion Detection System
IP
Internet Protocol
TCP
Transmission Control Protocol
NFV
Network Function Virtualization
DDoS
Distributed ...
doi:10.38124/ijisrt20aug624
fatcat:vei7tqbbizce3gumjt46up7upm
Impregnable Defence Architecture using Dynamic Correlation-based Graded Intrusion Detection System for Cloud
2017
Defence Science Journal
It is a defensive formation of collaborative IDPS components with dynamically revolving alert data placed in multiple tiers of virtual local area networks (VLANs). ...
In this paper, novel security architecture for the cloud environment designed with intrusion detection and prevention system (IDPS) components as a graded multi-tier defense framework. ...
The setup was a collaboration of IDPS components located in various cloud provider networks. ...
doi:10.14429/dsj.67.11118
fatcat:jfhf3jwnlvce7lt3u5apsd6vy4
Moving Target Defense Strategy for Mitigating Denial of Service Attack in the Public Cloud Environment
2019
International Journal of Engineering and Advanced Technology
Internet is a network of interconnected systems which works collaboratively and services the users without any disruption. ...
Moving Target Defence (MTD) is one such prominent emerging solution which aims to avoid the DDoS attacks in the cloud environment. ...
Abstract: Internet is a network of interconnected systems which works collaboratively and services the users without any disruption. ...
doi:10.35940/ijeat.f8077.088619
fatcat:e5l3lzfxfresfafrci2wwhtm5u
Intrusion Detection and Countermeasure of Virtual Cloud Systems - State of the Art and Current Challenges
2015
International Journal of Advanced Computer Science and Applications
Clouds are distributed Internet-based platforms that provide highly resilient and scalable environments to be used by enterprises in a multitude of ways. ...
This is followed by classification of intrusion detection and prevention mechanisms that can be part of an overall strategy to help understand identify and mitigate potential DDoS attacks on business networks ...
[48] investigates the use of the open-source tool Hadoop in providing a DDoS defence. ...
doi:10.14569/ijacsa.2015.060601
fatcat:4qci2ag4sngjjdkgh36uhboxde
Comparison of Classification Model for the Detection of Cyber-attack using Ensemble Learning Models
2022
EAI Endorsed Transactions on Scalable Information Systems
It is possible to predict the future by using machine learning. A cyber-attack detection system is depicted in this study using machine learning models. ...
An intrusion detection system can identify both external and internal anomalies in the network. There are a variety of threats out there, both active and passive. ...
DDoS assaults on numerous networks are detected more accurately using a new collaborative source-side DDoS attack detection method that considers the detecting performance in different time zones. ...
doi:10.4108/eai.1-2-2022.173293
fatcat:gcw7ujjdfjccxhb7s4feovpwye
C2DF: High Rate DDOS filtering method in Cloud Computing
2014
International Journal of Computer Network and Information Security
In this paper we offered a data mining and neural network technique, trained to detect and filter DDOS attacks. For the simulation experiments we used KDD Cup dataset and our lab datasets. ...
A DDOS attack can make large scale of damages to resources and access of the resources to genuine cloud users. ...
Cloud Confidence DDOS Filtering (C 2 DF) can be used in a network structure such as LAN or grid network. ...
doi:10.5815/ijcnis.2014.09.06
fatcat:xhxvmeiwhzcohfu5vgr77iyyve
Tennison: A Distributed SDN Framework for Scalable Network Security
2018
IEEE Journal on Selected Areas in Communications
SDN's global view provides a means of monitoring and defence across the entire network. ...
We note the work by the IETF Interface to Network Security Functions (I2NSF) working group [5] , which describes a framework and reference model for the integration of network security functions. ...
doi:10.1109/jsac.2018.2871313
fatcat:izkqlt5dznb7bctah3ic2ddffu
Analysis of Various Intrusion Detection Systems with a Model for Improving Snort Performance
2017
Indian Journal of Science and Technology
Being an Open Source Software, Snort gives the flexibility to improve its functionality. ...
Methods: Analytical approach was used to survey various research papers in this field of research. ...
Web Based Network Approach In this paper 12 , authors discussed about the IDSto detect attacker's activities using a proactive defence technique called Honeypot. ...
doi:10.17485/ijst/2017/v10i20/108940
fatcat:edw3x5esa5byfkhjzsab7ttm24
SDN based Intrusion Detection and Prevention Systems using Manufacturer Usage Description: A Survey
2020
International Journal of Advanced Computer Science and Applications
In traditional networks, detection of malicious traffic and classification of a network attack is achieved using predefined rules and specifications which are limited to address new kinds of attacks. ...
MUD is a developing concept to define IoT device behaviour for network communication [4] . ...
In this study, Bohatei [116] the author leverages the strength of network function virtualization (NFV) along with SDN to detect the DDoS attacks. ...
doi:10.14569/ijacsa.2020.0111283
fatcat:xhnac6wchnbxdfztz2b666l4ra
« Previous
Showing results 1 — 15 out of 583 results