A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2018; you can also visit the original URL.
The file type is application/pdf
.
Filters
A Survey on DDoS Attack and Defense Strategies: From Traditional Schemes to Current Techniques
2013
Interdisciplinary Information Sciences
in the light of future challenges identified in this paper. unaware of the fact that there machines are being used as a part of some botnet. ...
On the other hand, in reflector attacks, zombies send request packets with spoofed IP (IP of the victim) in source address field to a number of other compromised machines (PCs, routers etc.) and the reply ...
Many research efforts have been presented for securing cloud environments. A confidence based filtering (CBF) method for packets in clouds is proposed in [145] . ...
doi:10.4036/iis.2013.173
fatcat:pgvcutvfajejpmgatezon5ftdq
Detection and defense mechanisms against DDoS attacks: A review
2015
2015 International Conference on Innovations in Information, Embedded and Communication Systems (ICIIECS)
if they came from a legitimate client. ...
It is most challenging to defense against such attacks because most of the attacker use source IP address spoofing in order to hide their identity and such attack packets appear to the target server as ...
[16] , proposed a new IP traceback method called flexible deterministic packet marking for defending against the attack sources. ...
doi:10.1109/iciiecs.2015.7193118
fatcat:35aawztearef7f2ecxlybff46e
On Distributed Denial of Service Current Defense Schemes
2019
Technologies
As defense schemes are designed and developed, attackers are also on the move to evade these defense mechanisms and so there is a need for a continual study in developing defense mechanisms. ...
Distributed denial of service (DDoS) attacks are a major threat to any network-based service provider. ...
Acknowledgments: This work forms part of a research project on Cloud-Based Integration Solution for Electricity Transmission in Ghana. The supervisor of this project is grateful to the Dr. ...
doi:10.3390/technologies7010019
fatcat:dfczo5mrxra4vajz3pig7lo7yq
ICSTrace: A Malicious IP Traceback Model for Attacking Data of the Industrial Control System
2021
Security and Communication Networks
Based on the infrastructure of the internet, we have developed a novel malicious IP traceback model, ICSTrace, without deploying any new services. ...
ICSTrace is evaluated based on the attack data captured by the large-scale deployed honeypots for the industrial control system, and the results demonstrate that ICSTrace is effective on malicious IP traceback ...
Acknowledgments e authors thank Biao Chang, Binglei Wang, and Dazhong Shen for their useful feedback and comments. ...
doi:10.1155/2021/7525092
fatcat:tpq2jb2dyrd3bm3xvzwxdfwjoq
ICSTrace: A Malicious IP Traceback Model for Attacking Data of Industrial Control System
[article]
2019
arXiv
pre-print
Based on the infrastructure of the Internet, we have developed a novel malicious IP traceback model-ICSTrace, without deploying any new services. ...
ICSTrace is evaluated basing on the attack data captured by the large-scale deployed honeypots for industrial control system, and the results demonstrate that ICSTrace is effective on malicious IP traceback ...
Acknowledgments The authors thank Biao Chang, Binglei Wang and Dazhong Shen for their useful feedback and comments. ...
arXiv:1912.12828v1
fatcat:pm6euv7rujhwpchvxiiecgaxdm
Increasing Accuracy and Reliability of IP Traceback for DDoS Attack Using Completion Condition
2016
International Journal of Network Security
Probabilistic Packet Marking (PPM ) is one of the most promising schemes for performing IP Traceback. PPM reconstructs the attack graph in order to trace back to the attackers. ...
One presently being used works only for a single attacker based DoS attack and has an accuracy of just around 70%. ...
Acknowledgments The authors gratefully acknowledge the anonymous reviewers for their valuable comments. ...
dblp:journals/ijnsec/SaurabhS16
fatcat:g7jqljmfc5f2joo2mo54rp5i4q
Analysis of Challenges in Modern Network Forensic Framework
2021
Security and Communication Networks
This paper proposed a thematic taxonomy of classifications of network forensic techniques based on extensive. ...
It covers the necessity for dedicated investigative abilities. When you look at the design, this indeed currently allows investigating harmful behavior in communities. ...
Traceback-Based Network Forensic Technique. Traceback is a specific term used when the origin of the packet is to be identified in a network. It is also known as the IP traceback [12] . ...
doi:10.1155/2021/8871230
fatcat:nkrfvnk3vvdzxk5xihfzx7vrda
Anomaly traceback using software defined networking
2014
2014 IEEE International Workshop on Information Forensics and Security (WIFS)
usual IP traceback techniques. ...
As SDN technologies tend to be deployed in the next generation of networks including in data centers, they provide a helpful framework to implement our proposal without developing dedicated routers like ...
Acknowledgements: This work is partially funded by Flamingo, a Network of Excellence project (ICT-318488) supported by the European Commission under FP7 and by ANR DOCTOR project. ...
doi:10.1109/wifs.2014.7084328
dblp:conf/wifs/FrancoisF14
fatcat:zdvplk3jmjawngdboromsyn6kq
An Anatomy for Recognizing Network Attack Intention
2019
International journal of recent technology and engineering
In this paper, we have presented the architecture of an analysis mechanism for network forensics. ...
The work followed by generic process model for network forensics investigation is also presented and discussed in detail. ...
launch flood. ICMP Traceback: In [45] , the researchers showed an IP traceback by using a scheme called iTrace. ...
doi:10.35940/ijrte.c4022.098319
fatcat:7c4v67lvjjharelmcqvlpvuo7u
Attribution of Cyber Attacks on Industrial Control Systems
2016
EAI Endorsed Transactions on Industrial Networks and Intelligent Systems
We highlight the critical differences between attribution in enterprise networks and attribution in industrial networks. In doing so we provide a roadmap for future research. A. ...
In order to deter or prosecute for cyber attacks on industrial control systems it is necessary to assign attribution to the attacker and define the type of attack so that international law enforcement ...
This study also suggests there is merit in research into a methodology that encompasses both technical and non-technical techniques to form a probabilistic model of attribution. ...
doi:10.4108/eai.21-4-2016.151158
fatcat:vwx6gddunrcwhhou6gq5odc3wi
A Review on Detection, Defensive and Mitigation of DDoS Attacks with Traceback Methods
2021
Turkish Journal of Computer and Mathematics Education
The advantages and disadvantages of existing research methods in this problem are also described.. ...
services of architecture is unsafe to DDoS attacks and the collection of internet connected devices affected by the malwares, then it allows the intruders to control all the internet connected devices is a ...
DDoS attack and their impact in cloud environment. ...
doi:10.17762/turcomat.v12i10.5496
fatcat:j3ok4odugjcatltbcqmghy7rm4
A Survey of Denial-of-Service and Distributed Denial of Service Attacks and Defenses in Cloud Computing
2017
Future Internet
Cloud Computing is a computing model that allows ubiquitous, convenient and on-demand access to a shared pool of highly configurable resources (e.g., networks, servers, storage, applications and services ...
In this paper, new types of DoS and DDoS attacks in Cloud Computing are explored, especially the XML-DoS and HTTP-DoS attacks, and some possible detection and mitigation techniques are examined. ...
[42] propose a clusterized firewall framework for Cloud Computing. ...
doi:10.3390/fi9030043
fatcat:zhhl36zts5g7rkstbitjj2kde4
Threats, Countermeasures and Attribution of Cyber Attacks on Critical Infrastructures
2018
EAI Endorsed Transactions on Security and Safety
As Critical National Infrastructures are becoming more vulnerable to cyber attacks, their protection becomes a significant issue for any organization as well as a nation. ...
Moreover, the ability to attribute is a vital element of avoiding impunity in cyberspace. ...
It has a short lifetime as an adversary can for example change the IP address. ...
doi:10.4108/eai.15-10-2018.155856
fatcat:vfxzvkj2irad7jbllg235shqja
An Enhanced Attack Graph Model Based Technique to Mitigate Zombie Attack in Cloud Computing using Fuzzy Logic
2017
International Journal of Advanced Research in Computer Science and Software Engineering
A cloud storagea secure cloud of solid cloud data is a solid well-defined framework. This is the confidence of the cloud an essential undertaking for cloud specialist organizations. ...
In this proposed research a technique is developed for security in cloud users. ...
Part based get to control gives a superior security answer for getting to Cloud information is mapped to an RBAC portion in order to get authentication [4] , and all customers are mapped to the right ...
doi:10.23956/ijarcsse.v7i8.51
fatcat:oc72d3xc2naytiqidl3imfpyna
Botnet in DDoS Attacks: Trends and Challenges
2015
IEEE Communications Surveys and Tutorials
Furthermore, a list of important issues and research challenges is also reported. Index Terms-DDoS attack, botnet, mobile botnet, IP traceback, DDoS prevention. ...
Botnets pose a major threat to network security as they are widely used for many Internet crimes such as DDoS attacks, identity theft, email spamming, and click fraud. ...
DDoS and Botnet in Cloud Computing Security in the cloud is a major concern for cloud service providers. ...
doi:10.1109/comst.2015.2457491
fatcat:oph4lgawmzbuvgygq4iagsr6eu
« Previous
Showing results 1 — 15 out of 122 results