A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2020; you can also visit the original URL.
The file type is application/pdf
.
Filters
DDoS Attacks with Randomized Traffic Innovation: Botnet Identification Challenges and Strategies
[article]
2016
arXiv
pre-print
Distributed Denial-of-Service (DDoS) attacks are usually launched through the botnet, an "army" of compromised nodes hidden in the network. ...
in the network; and iii) we verify the validity of the proposed inferential strategy over real network traces. ...
The main challenge is instead ascertaining whether the anomaly is caused by a DDoS attack, and, if so, performing a correct/early identification of the botnet hidden in the network. ...
arXiv:1606.03986v2
fatcat:6vjpw5ylwjgxta6tr7mgvgwa74
Detection and defense mechanisms against DDoS attacks: A review
2015
2015 International Conference on Innovations in Information, Embedded and Communication Systems (ICIIECS)
It is most challenging to defense against such attacks because most of the attacker use source IP address spoofing in order to hide their identity and such attack packets appear to the target server as ...
Distributed Denial of Service (DDoS) attacks is launched by large number of compromised host to interrupt the services of the legitimate users. ...
[14] proposed a packet marking scheme called hash based path identification for defending against DDoS attack with spoofing of IP addresses. 16-bit IP Identification field in each packet is used to ...
doi:10.1109/iciiecs.2015.7193118
fatcat:35aawztearef7f2ecxlybff46e
Botnet Identification In Multi-Clustered Ddos Attacks
2018
Zenodo
Unfortunately, the aforementioned strategies are not suited to face the novel class of randomized DDoS attacks. ...
This work focuses on a more challenging variant of DDoS attack, namely, on the recent class of application-layer DDoS attacks. ...
doi:10.5281/zenodo.1159428
fatcat:wln6fha6wzgcbm3rxx3z42owgm
Botnet identification in randomized DDoS attacks
2016
2016 24th European Signal Processing Conference (EUSIPCO)
New countermeasures are necessary, aimed at guaranteeing an early and reliable identification of the compromised network nodes (the botnet). ...
Recent variants of Distributed Denial-of-Service (DDoS) attacks leverage the flexibility of application-layer protocols to disguise malicious activities as normal traffic patterns, while concurrently overwhelming ...
Thus, when dealing with real network traces, and with challenging DDoS attacks, the operational validity of the algorithm BotBuster is not at all obvious. ...
doi:10.1109/eusipco.2016.7760651
dblp:conf/eusipco/MattaML16
fatcat:ddzcvwnfsjhu7lxg3z57rguifa
Central Pivot Heuristics for Botnet Attack Defense in Iot
2022
International Journal on Recent and Innovation Trends in Computing and Communication
Botnet assaults on IoT systems have become a big issue, and several strategies for botnet protection have been investigated by the academic and industry communities. ...
While many of these methods are practical and effective for botnet attack prevention, one of the important limits is the load factor on the servers that manage monitoring and control in addition to catering ...
The future research can focus to define access gateway level botnet detection strategies for IoT networks. • Launching of DDoS attacks over the other websites or services • Distributing spam emails or ...
doi:10.17762/ijritcc.v10i10.5738
fatcat:sm7nhv5fbnbyviihlbo4dsyyeq
Binary Arithmetic Optimization Algorithm with Machine Learning based Intrusion Detection System
2023
International Journal on Recent and Innovation Trends in Computing and Communication
Machine Learning (ML) approaches are extremely executed for recognizing intrusion since it is investigating huge volumes of network traffic data and recognize designs indicative of intrusions. ...
Moreover, Extreme Learning Machine (ELM) approach is utilized for the identification of the intrusions. ...
The attacks rate against network systems has increased significantly and the attackers are continuing their strategies, which are used for development. ...
doi:10.17762/ijritcc.v11i9.8869
fatcat:42r3uzwzsfa3voqanfssxiesae
Botnet in DDoS Attacks: Trends and Challenges
2015
IEEE Communications Surveys and Tutorials
Furthermore, a list of important issues and research challenges is also reported. Index Terms-DDoS attack, botnet, mobile botnet, IP traceback, DDoS prevention. ...
This survey presents a comprehensive overview of DDoS attacks, their causes, types with a taxonomy, and technical details of various attack launching tools. ...
DDOS ATTACK: BACKGROUND, STRATEGY AND TAXONOMY A DDoS attacker requires more diligence and is usually more damaging than a DoS attacker. ...
doi:10.1109/comst.2015.2457491
fatcat:oph4lgawmzbuvgygq4iagsr6eu
Deciphering the Surge: A Focused Review of Flooding Attacks and Proactive Defense Mechanisms using Anomaly-Based Detection Strategies
2024
International Journal for Research in Applied Science and Engineering Technology
to tackle with them, followed by a review of the detection strategies using anomaly techniques for a proactive defense and the challenges faced. ...
Abstract: Flooding attacks, a taxonomical classification of the denial-of-service attacks, are a brute force attempt of overloading and incapacitating the target by consuming the entirety of the bandwidth ...
Given the majority of flooding attacks today utilize botnets, it also becomes crucial to develop a defense strategy that can also cope with the variability factor that comes with compromised devices included ...
doi:10.22214/ijraset.2024.58025
fatcat:7mcavqzla5bebgw3jwchl7ziba
Internet of Things Botnet Detection Approaches: Analysis and Recommendations for Future Research
2021
Applied Sciences
This work employed three research questions on the detection methods used to detect IoT botnets, the botnet phases and the different malicious activity scenarios. ...
IoT botnets, for instance, have become a critical threat; however, systematic and comprehensive studies analyzing the importance of botnet detection methods are limited in the IoT environment. ...
Therefore, the authors gratefully acknowledge the technical and financial support from the Ministry of Education and King Abdulaziz University, Jeddah, Saudi Arabia. ...
doi:10.3390/app11125713
fatcat:d56mns6avfhwtk4rqkwxoomoqi
Networking in IoT: Technologies used, Security Threats and Possible Countermeasures
2020
VOLUME-8 ISSUE-10, AUGUST 2019, REGULAR ISSUE
Many threats, like botnets, home intrusion, remote control of the IoT devices, and man in the middle attacks, are emerging and need a stronger security implementation to protect IoT devices from being ...
Constrained devices work with low memory, low storage, and low computation power. Implementing security algorithms in these devices is challenging. ...
Table II : Popular Botnets with their attack techniques II IoT Botnets Year Attack Technique Dark_nexus 2020 Hijacks IoT resources to carry out devastating DDoS attacks. ...
doi:10.35940/ijitee.i7622.079920
fatcat:q7okrcda2zatna4q72xk5npanu
Taxonomy of DDoS attacks and their defense mechanisms in IoT
2021
Journal of scientific research
DDoS attacks have not been able to affect the lives of people directly. But with IoT systems as their target, attackers can cause serious impact on the lives of people. ...
Recently, there have been many DDoS attacks using IoT devices opening the possibility of DDoS attacks on the IoT systems vastly. ...
Various researchers and enthusiasts have also designed different innovative systems that use this technology in overcoming societal challenges. ...
doi:10.37398/jsr.2021.650523
fatcat:hdq7oupn6zfvndqghb6jjh6bwi
Computational Intelligent Techniques To Detect DDOS Attacks : A Survey
2021
Journal of Cyber Security
Finally, various challenges attached to the detection of DDOS attacks and research gaps are depicted. ...
In the digital era of today, cases of DDoS attacks have also been exceeded in the wireless, smartphone, and IoT attacks with catastrophic implications. ...
in the identification of DDoS attacks. ...
doi:10.32604/jcs.2021.018623
fatcat:nzdhwmj5cveszbfmz7godbzqbu
Securing Consumer Internet of Things for Botnet Attacks: Deep Learning燗pproach
2022
Computers Materials & Continua
For text identification and translation of attack data segments into tokenized form, word embedding is employed. ...
Conspicuously, an attack identification technique inspired by Recurrent Neural networks and Bidirectional Long Short Term Memory (BLRNN) is presented using a unique Deep Learning (DL) technique. ...
It includes Mirai botnet traffic including Infect, Scan, Attack traffic and Control, Camcorder data produced in the proposed model. ...
doi:10.32604/cmc.2022.027212
fatcat:kztbmgfxtbafpgkz3hqjixwu3i
The Impact of Denial-of-Service Attacks and Queue Management Algorithms on Cellular Networks
2023
Zeki sistemler teori ve uygulamaları dergisi
These findings underscore the critical role of advanced queue management algorithms in fortifying LTE networks against DDoS attacks, offering robust defences and resilient network performance. ...
In today's digital landscape, Distributed Denial of Service (DDoS) attacks stand out as a formidable threat to organisations all over the world. ...
DDoS attacks, which disrupt services on the network, are challenging to detect. ...
doi:10.38016/jista.1225716
fatcat:ftkwdrtmyfcq3o2vi4prz3zcui
Distributed Denial-of-Service (DDoS) Attacks and Defence Mechanisms in Various Web-enabled Computing Platforms
2022
International Journal on Semantic Web and Information Systems (IJSWIS)
In the end, we list prevalent DDoS attack tools and open challenges. ...
The expeditious surge in the collaborative environments, like IoT, cloud computing and SDN, have provided attackers with countless new avenues to benefit from the distributed nature of DDoS attacks. ...
This makes the identification of a DDoS attack source even difficult. ...
doi:10.4018/ijswis.297143
fatcat:imoau72665dxbmfdoxvntbyyiq
« Previous
Showing results 1 — 15 out of 498 results