Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Filters








498 Hits in 8.1 sec

DDoS Attacks with Randomized Traffic Innovation: Botnet Identification Challenges and Strategies [article]

Vincenzo Matta, Mario Di Mauro, Maurizio Longo
2016 arXiv   pre-print
Distributed Denial-of-Service (DDoS) attacks are usually launched through the botnet, an "army" of compromised nodes hidden in the network.  ...  in the network; and iii) we verify the validity of the proposed inferential strategy over real network traces.  ...  The main challenge is instead ascertaining whether the anomaly is caused by a DDoS attack, and, if so, performing a correct/early identification of the botnet hidden in the network.  ... 
arXiv:1606.03986v2 fatcat:6vjpw5ylwjgxta6tr7mgvgwa74

Detection and defense mechanisms against DDoS attacks: A review

Archana S. Pimpalkar, A. R. Bhagat Patil
2015 2015 International Conference on Innovations in Information, Embedded and Communication Systems (ICIIECS)  
It is most challenging to defense against such attacks because most of the attacker use source IP address spoofing in order to hide their identity and such attack packets appear to the target server as  ...  Distributed Denial of Service (DDoS) attacks is launched by large number of compromised host to interrupt the services of the legitimate users.  ...  [14] proposed a packet marking scheme called hash based path identification for defending against DDoS attack with spoofing of IP addresses. 16-bit IP Identification field in each packet is used to  ... 
doi:10.1109/iciiecs.2015.7193118 fatcat:35aawztearef7f2ecxlybff46e

Botnet Identification In Multi-Clustered Ddos Attacks

Mario Di Mauro, Maurizio Longo, Vincenzo Matta
2018 Zenodo  
Unfortunately, the aforementioned strategies are not suited to face the novel class of randomized DDoS attacks.  ...  This work focuses on a more challenging variant of DDoS attack, namely, on the recent class of application-layer DDoS attacks.  ... 
doi:10.5281/zenodo.1159428 fatcat:wln6fha6wzgcbm3rxx3z42owgm

Botnet identification in randomized DDoS attacks

Vincenzo Matta, Mario Di Mauro, Maurizio Longo
2016 2016 24th European Signal Processing Conference (EUSIPCO)  
New countermeasures are necessary, aimed at guaranteeing an early and reliable identification of the compromised network nodes (the botnet).  ...  Recent variants of Distributed Denial-of-Service (DDoS) attacks leverage the flexibility of application-layer protocols to disguise malicious activities as normal traffic patterns, while concurrently overwhelming  ...  Thus, when dealing with real network traces, and with challenging DDoS attacks, the operational validity of the algorithm BotBuster is not at all obvious.  ... 
doi:10.1109/eusipco.2016.7760651 dblp:conf/eusipco/MattaML16 fatcat:ddzcvwnfsjhu7lxg3z57rguifa

Central Pivot Heuristics for Botnet Attack Defense in Iot

G. Chandana Swathi, G. Kishor Kumar, A.P. Siva Kumar
2022 International Journal on Recent and Innovation Trends in Computing and Communication  
Botnet assaults on IoT systems have become a big issue, and several strategies for botnet protection have been investigated by the academic and industry communities.  ...  While many of these methods are practical and effective for botnet attack prevention, one of the important limits is the load factor on the servers that manage monitoring and control in addition to catering  ...  The future research can focus to define access gateway level botnet detection strategies for IoT networks. • Launching of DDoS attacks over the other websites or services • Distributing spam emails or  ... 
doi:10.17762/ijritcc.v10i10.5738 fatcat:sm7nhv5fbnbyviihlbo4dsyyeq

Binary Arithmetic Optimization Algorithm with Machine Learning based Intrusion Detection System

Et al. S. P. Senthilkumar,
2023 International Journal on Recent and Innovation Trends in Computing and Communication  
Machine Learning (ML) approaches are extremely executed for recognizing intrusion since it is investigating huge volumes of network traffic data and recognize designs indicative of intrusions.  ...  Moreover, Extreme Learning Machine (ELM) approach is utilized for the identification of the intrusions.  ...  The attacks rate against network systems has increased significantly and the attackers are continuing their strategies, which are used for development.  ... 
doi:10.17762/ijritcc.v11i9.8869 fatcat:42r3uzwzsfa3voqanfssxiesae

Botnet in DDoS Attacks: Trends and Challenges

Nazrul Hoque, Dhruba K. Bhattacharyya, Jugal K. Kalita
2015 IEEE Communications Surveys and Tutorials  
Furthermore, a list of important issues and research challenges is also reported. Index Terms-DDoS attack, botnet, mobile botnet, IP traceback, DDoS prevention.  ...  This survey presents a comprehensive overview of DDoS attacks, their causes, types with a taxonomy, and technical details of various attack launching tools.  ...  DDOS ATTACK: BACKGROUND, STRATEGY AND TAXONOMY A DDoS attacker requires more diligence and is usually more damaging than a DoS attacker.  ... 
doi:10.1109/comst.2015.2457491 fatcat:oph4lgawmzbuvgygq4iagsr6eu

Deciphering the Surge: A Focused Review of Flooding Attacks and Proactive Defense Mechanisms using Anomaly-Based Detection Strategies

Aparna Khare, Pradnya Kashikar
2024 International Journal for Research in Applied Science and Engineering Technology  
to tackle with them, followed by a review of the detection strategies using anomaly techniques for a proactive defense and the challenges faced.  ...  Abstract: Flooding attacks, a taxonomical classification of the denial-of-service attacks, are a brute force attempt of overloading and incapacitating the target by consuming the entirety of the bandwidth  ...  Given the majority of flooding attacks today utilize botnets, it also becomes crucial to develop a defense strategy that can also cope with the variability factor that comes with compromised devices included  ... 
doi:10.22214/ijraset.2024.58025 fatcat:7mcavqzla5bebgw3jwchl7ziba

Internet of Things Botnet Detection Approaches: Analysis and Recommendations for Future Research

Majda Wazzan, Daniyal Algazzawi, Omaima Bamasaq, Aiiad Albeshri, Li Cheng
2021 Applied Sciences  
This work employed three research questions on the detection methods used to detect IoT botnets, the botnet phases and the different malicious activity scenarios.  ...  IoT botnets, for instance, have become a critical threat; however, systematic and comprehensive studies analyzing the importance of botnet detection methods are limited in the IoT environment.  ...  Therefore, the authors gratefully acknowledge the technical and financial support from the Ministry of Education and King Abdulaziz University, Jeddah, Saudi Arabia.  ... 
doi:10.3390/app11125713 fatcat:d56mns6avfhwtk4rqkwxoomoqi

Networking in IoT: Technologies used, Security Threats and Possible Countermeasures

2020 VOLUME-8 ISSUE-10, AUGUST 2019, REGULAR ISSUE  
Many threats, like botnets, home intrusion, remote control of the IoT devices, and man in the middle attacks, are emerging and need a stronger security implementation to protect IoT devices from being  ...  Constrained devices work with low memory, low storage, and low computation power. Implementing security algorithms in these devices is challenging.  ...  Table II : Popular Botnets with their attack techniques II IoT Botnets Year Attack Technique Dark_nexus 2020 Hijacks IoT resources to carry out devastating DDoS attacks.  ... 
doi:10.35940/ijitee.i7622.079920 fatcat:q7okrcda2zatna4q72xk5npanu

Taxonomy of DDoS attacks and their defense mechanisms in IoT

Nimisha Pandey, Pramod Kumar Mishra
2021 Journal of scientific research  
DDoS attacks have not been able to affect the lives of people directly. But with IoT systems as their target, attackers can cause serious impact on the lives of people.  ...  Recently, there have been many DDoS attacks using IoT devices opening the possibility of DDoS attacks on the IoT systems vastly.  ...  Various researchers and enthusiasts have also designed different innovative systems that use this technology in overcoming societal challenges.  ... 
doi:10.37398/jsr.2021.650523 fatcat:hdq7oupn6zfvndqghb6jjh6bwi

Computational Intelligent Techniques To Detect DDOS Attacks : A Survey

Isha Sood, Varsha Sharma
2021 Journal of Cyber Security  
Finally, various challenges attached to the detection of DDOS attacks and research gaps are depicted.  ...  In the digital era of today, cases of DDoS attacks have also been exceeded in the wireless, smartphone, and IoT attacks with catastrophic implications.  ...  in the identification of DDoS attacks.  ... 
doi:10.32604/jcs.2021.018623 fatcat:nzdhwmj5cveszbfmz7godbzqbu

Securing Consumer Internet of Things for Botnet Attacks: Deep Learning燗pproach

Tariq Ahamed Ahanger, Abdulaziz Aldaej, Mohammed Atiquzzaman, Imdad Ullah, Mohammed Yousuf Uddin
2022 Computers Materials & Continua  
For text identification and translation of attack data segments into tokenized form, word embedding is employed.  ...  Conspicuously, an attack identification technique inspired by Recurrent Neural networks and Bidirectional Long Short Term Memory (BLRNN) is presented using a unique Deep Learning (DL) technique.  ...  It includes Mirai botnet traffic including Infect, Scan, Attack traffic and Control, Camcorder data produced in the proposed model.  ... 
doi:10.32604/cmc.2022.027212 fatcat:kztbmgfxtbafpgkz3hqjixwu3i

The Impact of Denial-of-Service Attacks and Queue Management Algorithms on Cellular Networks

Muhammet ÇAKMAK
2023 Zeki sistemler teori ve uygulamaları dergisi  
These findings underscore the critical role of advanced queue management algorithms in fortifying LTE networks against DDoS attacks, offering robust defences and resilient network performance.  ...  In today's digital landscape, Distributed Denial of Service (DDoS) attacks stand out as a formidable threat to organisations all over the world.  ...  DDoS attacks, which disrupt services on the network, are challenging to detect.  ... 
doi:10.38016/jista.1225716 fatcat:ftkwdrtmyfcq3o2vi4prz3zcui

Distributed Denial-of-Service (DDoS) Attacks and Defence Mechanisms in Various Web-enabled Computing Platforms

2022 International Journal on Semantic Web and Information Systems (IJSWIS)  
In the end, we list prevalent DDoS attack tools and open challenges.  ...  The expeditious surge in the collaborative environments, like IoT, cloud computing and SDN, have provided attackers with countless new avenues to benefit from the distributed nature of DDoS attacks.  ...  This makes the identification of a DDoS attack source even difficult.  ... 
doi:10.4018/ijswis.297143 fatcat:imoau72665dxbmfdoxvntbyyiq
« Previous Showing results 1 — 15 out of 498 results