Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Filters








583 Hits in 4.4 sec

A Distributed Cloud Honeypot Architecture

Jason Xiaojun Huang, Shikun Zhou, Nick Savage, Weicong Zhang
2021 2021 IEEE 45th Annual Computers, Software, and Applications Conference (COMPSAC)  
This research aims to propose a new collaborated active defense framework between Honeypot and cloud platform to detect and defend future DDoS attacks in the context of the IoT with the instantaneous malicious  ...  Furthermore, DDoS attacks using Bonnets result more destructive effects.  ...  The second stage will use virtual technology to build multiple platforms to simulate each function of Honeypot and integrate multiple platforms to build a cloud Honeypot.  ... 
doi:10.1109/compsac51774.2021.00162 fatcat:27elc5qdhfa6dm5xfnw2khm7v4

CoFence: A collaborative DDoS defence using network function virtualization

Bahman Rashidi, Carol Fung
2016 2016 12th International Conference on Network and Service Management (CNSM)  
In this work, we propose CoFence − a DDoS defense mechanism which facilitates a collaboration framework among NFV-based peer domain networks.  ...  The emerging of Network Function Virtualization (NFV) technology introduces new opportunities for low-cost and flexible DDoS defense solutions.  ...  In this paper, we introduce a novel approach for DDoS mitigation using collaborative networks and Network Function Virtualization (NFV) technology.  ... 
doi:10.1109/cnsm.2016.7818412 dblp:conf/cnsm/RashidiF16 fatcat:fuecsv464zabbe6zalwruvocoy

Distributed Denial of Service Attacks in Cloud Computing

Hesham Abusaimeh
2020 International Journal of Advanced Computer Science and Applications  
This paper will investigate most of the method used in detecting and preventing and then recover from the DDoS in the cloud computing environment.  ...  There many techniques to defend the DDOS attack in the regular networks, while in the cloud computing this task is more complicated regarding the various characteristics of the cloud that make the defending  ...  " lists a comparison of DDOS attacks defence mechanisms using SDN [16] .  ... 
doi:10.14569/ijacsa.2020.0110621 fatcat:u4ihedsjw5a2fnwxr6sl2xom4e

Detection of DDOS attacks in distributed peer to peer networks

Gera Jaideep, Bhanu Prakash Battula
2018 International Journal of Engineering & Technology  
A Simulation study has been made using NS2 and the experimental results reveal the significance of the proposed framework in defending P2P network and target hosts from high risk DDoS attacks.  ...  Since these networks spread across the globe with large scale deployment of nodes, adversaries use them as a vehicle to launch DDoS attacks.  ...  Zargar et al. [7] made a survey on the DDoS flooding attacks and their defence mechanisms. And they found the need for distributed and collaborated defence mechanisms against such attacks.  ... 
doi:10.14419/ijet.v7i2.7.12227 fatcat:ky4m3jijpjfprnaexwylnbjj2i

Defence for Distributed Denial of Service Attacks in Cloud Computing

Andrew Carlin, Mohammad Hammoudeh, Omar Aldabbas
2015 Procedia Computer Science  
A critical review of most recent intrusion detection and prevention systems to mitigate potential DDoS attacks is presented.  ...  This investigates the exploitation of compromised virtual machines to execute large-scale Distributed Denial-of-Service (DDoS) attacks.  ...  [28] investigate the use of Hadoop for DDoS defence. Hadoop uses the MapReduce framework for processing large volumes of data.  ... 
doi:10.1016/j.procs.2015.12.037 fatcat:guto4fntjvgz7et5k4v756eoqa

Denial of Service Attacks: Tools and Categories

Hadeel S. Obaid, The University of Information Technology and Communications
2020 International Journal of Engineering Research and  
Issues in Internet security provide the hackers with ways to attack network systems. These attacks can be performed using many tools and techniques.  ...  This kind of attacks try to prevent legitimate users from using their rights to online services by bringing down servers.  ...  To allow flexible and dynamic network function implementation, NFV is virtualizing network functions within virtual machines on servers.  ... 
doi:10.17577/ijertv9is030289 fatcat:l4afr3hdnvbbxpltq675o6yeoi

Edge Based Network Attack Detection Using Pulsar

Sheetal Dash
2020 International Journal of Innovative Science and Research Technology  
Research shows that there cannot be a better example to show how prevalent internet use is nowadays.  ...  This research has focused on exploring ways of integrating the Software Defined Networking with the pub-sub messaging system in order to show a collaborative approach of defense to these attacks.  ...  NIDS Network Intrusion Detection System CIDS Collaborative Intrusion Detection System IP Internet Protocol TCP Transmission Control Protocol NFV Network Function Virtualization DDoS Distributed  ... 
doi:10.38124/ijisrt20aug624 fatcat:vei7tqbbizce3gumjt46up7upm

Impregnable Defence Architecture using Dynamic Correlation-based Graded Intrusion Detection System for Cloud

K. Umamaheswari, S. Sujatha
2017 Defence Science Journal  
It is a defensive formation of collaborative IDPS components with dynamically revolving alert data placed in multiple tiers of virtual local area networks (VLANs).  ...  In this paper, novel security architecture for the cloud environment designed with intrusion detection and prevention system (IDPS) components as a graded multi-tier defense framework.  ...  The setup was a collaboration of IDPS components located in various cloud provider networks.  ... 
doi:10.14429/dsj.67.11118 fatcat:jfhf3jwnlvce7lt3u5apsd6vy4

Moving Target Defense Strategy for Mitigating Denial of Service Attack in the Public Cloud Environment

2019 International Journal of Engineering and Advanced Technology  
Internet is a network of interconnected systems which works collaboratively and services the users without any disruption.  ...  Moving Target Defence (MTD) is one such prominent emerging solution which aims to avoid the DDoS attacks in the cloud environment.  ...   Abstract: Internet is a network of interconnected systems which works collaboratively and services the users without any disruption.  ... 
doi:10.35940/ijeat.f8077.088619 fatcat:e5l3lzfxfresfafrci2wwhtm5u

Intrusion Detection and Countermeasure of Virtual Cloud Systems - State of the Art and Current Challenges

Andrew Carlin, Mohammad Hammoudeh, Omar Aldabbas
2015 International Journal of Advanced Computer Science and Applications  
Clouds are distributed Internet-based platforms that provide highly resilient and scalable environments to be used by enterprises in a multitude of ways.  ...  This is followed by classification of intrusion detection and prevention mechanisms that can be part of an overall strategy to help understand identify and mitigate potential DDoS attacks on business networks  ...  [48] investigates the use of the open-source tool Hadoop in providing a DDoS defence.  ... 
doi:10.14569/ijacsa.2015.060601 fatcat:4qci2ag4sngjjdkgh36uhboxde

Comparison of Classification Model for the Detection of Cyber-attack using Ensemble Learning Models

Muhammad Akhtar, Tao Feng
2022 EAI Endorsed Transactions on Scalable Information Systems  
It is possible to predict the future by using machine learning. A cyber-attack detection system is depicted in this study using machine learning models.  ...  An intrusion detection system can identify both external and internal anomalies in the network. There are a variety of threats out there, both active and passive.  ...  DDoS assaults on numerous networks are detected more accurately using a new collaborative source-side DDoS attack detection method that considers the detecting performance in different time zones.  ... 
doi:10.4108/eai.1-2-2022.173293 fatcat:gcw7ujjdfjccxhb7s4feovpwye

C2DF: High Rate DDOS filtering method in Cloud Computing

Pourya Shamsolmoali, M.Afshar Alam, Ranjit Biswas
2014 International Journal of Computer Network and Information Security  
In this paper we offered a data mining and neural network technique, trained to detect and filter DDOS attacks. For the simulation experiments we used KDD Cup dataset and our lab datasets.  ...  A DDOS attack can make large scale of damages to resources and access of the resources to genuine cloud users.  ...  Cloud Confidence DDOS Filtering (C 2 DF) can be used in a network structure such as LAN or grid network.  ... 
doi:10.5815/ijcnis.2014.09.06 fatcat:xhxvmeiwhzcohfu5vgr77iyyve

Tennison: A Distributed SDN Framework for Scalable Network Security

Lyndon Fawcett, Sandra Scott-Hayward, Matthew Broadbent, Andrew Wright, Nicholas Race
2018 IEEE Journal on Selected Areas in Communications  
SDN's global view provides a means of monitoring and defence across the entire network.  ...  We note the work by the IETF Interface to Network Security Functions (I2NSF) working group [5] , which describes a framework and reference model for the integration of network security functions.  ... 
doi:10.1109/jsac.2018.2871313 fatcat:izkqlt5dznb7bctah3ic2ddffu

Analysis of Various Intrusion Detection Systems with a Model for Improving Snort Performance

Ravi Teja Gaddam, M. Nandhini
2017 Indian Journal of Science and Technology  
Being an Open Source Software, Snort gives the flexibility to improve its functionality.  ...  Methods: Analytical approach was used to survey various research papers in this field of research.  ...  Web Based Network Approach In this paper 12 , authors discussed about the IDSto detect attacker's activities using a proactive defence technique called Honeypot.  ... 
doi:10.17485/ijst/2017/v10i20/108940 fatcat:edw3x5esa5byfkhjzsab7ttm24

SDN based Intrusion Detection and Prevention Systems using Manufacturer Usage Description: A Survey

Noman Mazhar, Rosli Salleh, Mohammad Asif, Muhammad Zeeshan
2020 International Journal of Advanced Computer Science and Applications  
In traditional networks, detection of malicious traffic and classification of a network attack is achieved using predefined rules and specifications which are limited to address new kinds of attacks.  ...  MUD is a developing concept to define IoT device behaviour for network communication [4] .  ...  In this study, Bohatei [116] the author leverages the strength of network function virtualization (NFV) along with SDN to detect the DDoS attacks.  ... 
doi:10.14569/ijacsa.2020.0111283 fatcat:xhnac6wchnbxdfztz2b666l4ra
« Previous Showing results 1 — 15 out of 583 results