Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Filters








122 Hits in 2.7 sec

A Survey on DDoS Attack and Defense Strategies: From Traditional Schemes to Current Techniques

Muhammad AAMIR, Mustafa Ali ZAIDI
2013 Interdisciplinary Information Sciences  
in the light of future challenges identified in this paper. unaware of the fact that there machines are being used as a part of some botnet.  ...  On the other hand, in reflector attacks, zombies send request packets with spoofed IP (IP of the victim) in source address field to a number of other compromised machines (PCs, routers etc.) and the reply  ...  Many research efforts have been presented for securing cloud environments. A confidence based filtering (CBF) method for packets in clouds is proposed in [145] .  ... 
doi:10.4036/iis.2013.173 fatcat:pgvcutvfajejpmgatezon5ftdq

Detection and defense mechanisms against DDoS attacks: A review

Archana S. Pimpalkar, A. R. Bhagat Patil
2015 2015 International Conference on Innovations in Information, Embedded and Communication Systems (ICIIECS)  
if they came from a legitimate client.  ...  It is most challenging to defense against such attacks because most of the attacker use source IP address spoofing in order to hide their identity and such attack packets appear to the target server as  ...  [16] , proposed a new IP traceback method called flexible deterministic packet marking for defending against the attack sources.  ... 
doi:10.1109/iciiecs.2015.7193118 fatcat:35aawztearef7f2ecxlybff46e

On Distributed Denial of Service Current Defense Schemes

Seth Kotey, Eric Tchao, James Gadze
2019 Technologies  
As defense schemes are designed and developed, attackers are also on the move to evade these defense mechanisms and so there is a need for a continual study in developing defense mechanisms.  ...  Distributed denial of service (DDoS) attacks are a major threat to any network-based service provider.  ...  Acknowledgments: This work forms part of a research project on Cloud-Based Integration Solution for Electricity Transmission in Ghana. The supervisor of this project is grateful to the Dr.  ... 
doi:10.3390/technologies7010019 fatcat:dfczo5mrxra4vajz3pig7lo7yq

ICSTrace: A Malicious IP Traceback Model for Attacking Data of the Industrial Control System

Feng Xiao, Enhong Chen, Qiang Xu, Xianguo Zhang, Jingyu Feng
2021 Security and Communication Networks  
Based on the infrastructure of the internet, we have developed a novel malicious IP traceback model, ICSTrace, without deploying any new services.  ...  ICSTrace is evaluated based on the attack data captured by the large-scale deployed honeypots for the industrial control system, and the results demonstrate that ICSTrace is effective on malicious IP traceback  ...  Acknowledgments e authors thank Biao Chang, Binglei Wang, and Dazhong Shen for their useful feedback and comments.  ... 
doi:10.1155/2021/7525092 fatcat:tpq2jb2dyrd3bm3xvzwxdfwjoq

ICSTrace: A Malicious IP Traceback Model for Attacking Data of Industrial Control System [article]

Feng Xiao, Qiang Xu
2019 arXiv   pre-print
Based on the infrastructure of the Internet, we have developed a novel malicious IP traceback model-ICSTrace, without deploying any new services.  ...  ICSTrace is evaluated basing on the attack data captured by the large-scale deployed honeypots for industrial control system, and the results demonstrate that ICSTrace is effective on malicious IP traceback  ...  Acknowledgments The authors thank Biao Chang, Binglei Wang and Dazhong Shen for their useful feedback and comments.  ... 
arXiv:1912.12828v1 fatcat:pm6euv7rujhwpchvxiiecgaxdm

Increasing Accuracy and Reliability of IP Traceback for DDoS Attack Using Completion Condition

Samant Saurabh, Ashok Singh Sairam
2016 International Journal of Network Security  
Probabilistic Packet Marking (PPM ) is one of the most promising schemes for performing IP Traceback. PPM reconstructs the attack graph in order to trace back to the attackers.  ...  One presently being used works only for a single attacker based DoS attack and has an accuracy of just around 70%.  ...  Acknowledgments The authors gratefully acknowledge the anonymous reviewers for their valuable comments.  ... 
dblp:journals/ijnsec/SaurabhS16 fatcat:g7jqljmfc5f2joo2mo54rp5i4q

Analysis of Challenges in Modern Network Forensic Framework

Sirajuddin Qureshi, Jianqiang Li, Faheem Akhtar, Saima Tunio, Zahid Hussain Khand, Ahsan Wajahat, Neetesh Saxena
2021 Security and Communication Networks  
This paper proposed a thematic taxonomy of classifications of network forensic techniques based on extensive.  ...  It covers the necessity for dedicated investigative abilities. When you look at the design, this indeed currently allows investigating harmful behavior in communities.  ...  Traceback-Based Network Forensic Technique. Traceback is a specific term used when the origin of the packet is to be identified in a network. It is also known as the IP traceback [12] .  ... 
doi:10.1155/2021/8871230 fatcat:nkrfvnk3vvdzxk5xihfzx7vrda

Anomaly traceback using software defined networking

Jerome Francois, Olivier Festor
2014 2014 IEEE International Workshop on Information Forensics and Security (WIFS)  
usual IP traceback techniques.  ...  As SDN technologies tend to be deployed in the next generation of networks including in data centers, they provide a helpful framework to implement our proposal without developing dedicated routers like  ...  Acknowledgements: This work is partially funded by Flamingo, a Network of Excellence project (ICT-318488) supported by the European Commission under FP7 and by ANR DOCTOR project.  ... 
doi:10.1109/wifs.2014.7084328 dblp:conf/wifs/FrancoisF14 fatcat:zdvplk3jmjawngdboromsyn6kq

An Anatomy for Recognizing Network Attack Intention

2019 International journal of recent technology and engineering  
In this paper, we have presented the architecture of an analysis mechanism for network forensics.  ...  The work followed by generic process model for network forensics investigation is also presented and discussed in detail.  ...  launch flood.  ICMP Traceback: In [45] , the researchers showed an IP traceback by using a scheme called iTrace.  ... 
doi:10.35940/ijrte.c4022.098319 fatcat:7c4v67lvjjharelmcqvlpvuo7u

Attribution of Cyber Attacks on Industrial Control Systems

Allan Cook, Andrew Nicholson, Helge Janicke, Leandros Maglaras, Richard Smith
2016 EAI Endorsed Transactions on Industrial Networks and Intelligent Systems  
We highlight the critical differences between attribution in enterprise networks and attribution in industrial networks. In doing so we provide a roadmap for future research. A.  ...  In order to deter or prosecute for cyber attacks on industrial control systems it is necessary to assign attribution to the attacker and define the type of attack so that international law enforcement  ...  This study also suggests there is merit in research into a methodology that encompasses both technical and non-technical techniques to form a probabilistic model of attribution.  ... 
doi:10.4108/eai.21-4-2016.151158 fatcat:vwx6gddunrcwhhou6gq5odc3wi

A Review on Detection, Defensive and Mitigation of DDoS Attacks with Traceback Methods

Mr K Alluraiah, Et. al.
2021 Turkish Journal of Computer and Mathematics Education  
The advantages and disadvantages of existing research methods in this problem are also described..  ...  services of architecture is unsafe to DDoS attacks and the collection of internet connected devices affected by the malwares, then it allows the intruders to control all the internet connected devices is a  ...  DDoS attack and their impact in cloud environment.  ... 
doi:10.17762/turcomat.v12i10.5496 fatcat:j3ok4odugjcatltbcqmghy7rm4

A Survey of Denial-of-Service and Distributed Denial of Service Attacks and Defenses in Cloud Computing

Adrien Bonguet, Martine Bellaiche
2017 Future Internet  
Cloud Computing is a computing model that allows ubiquitous, convenient and on-demand access to a shared pool of highly configurable resources (e.g., networks, servers, storage, applications and services  ...  In this paper, new types of DoS and DDoS attacks in Cloud Computing are explored, especially the XML-DoS and HTTP-DoS attacks, and some possible detection and mitigation techniques are examined.  ...  [42] propose a clusterized firewall framework for Cloud Computing.  ... 
doi:10.3390/fi9030043 fatcat:zhhl36zts5g7rkstbitjj2kde4

Threats, Countermeasures and Attribution of Cyber Attacks on Critical Infrastructures

Leandros Maglaras, Mohamed Ferrag, Abdelouahid Derhab, Mithun Mukherjee, Helge Janicke, Stylianos Rallis
2018 EAI Endorsed Transactions on Security and Safety  
As Critical National Infrastructures are becoming more vulnerable to cyber attacks, their protection becomes a significant issue for any organization as well as a nation.  ...  Moreover, the ability to attribute is a vital element of avoiding impunity in cyberspace.  ...  It has a short lifetime as an adversary can for example change the IP address.  ... 
doi:10.4108/eai.15-10-2018.155856 fatcat:vfxzvkj2irad7jbllg235shqja

An Enhanced Attack Graph Model Based Technique to Mitigate Zombie Attack in Cloud Computing using Fuzzy Logic

Ravneet Kaur, Rekha Bhatia
2017 International Journal of Advanced Research in Computer Science and Software Engineering  
A cloud storagea secure cloud of solid cloud data is a solid well-defined framework. This is the confidence of the cloud an essential undertaking for cloud specialist organizations.  ...  In this proposed research a technique is developed for security in cloud users.  ...  Part based get to control gives a superior security answer for getting to Cloud information is mapped to an RBAC portion in order to get authentication [4] , and all customers are mapped to the right  ... 
doi:10.23956/ijarcsse.v7i8.51 fatcat:oc72d3xc2naytiqidl3imfpyna

Botnet in DDoS Attacks: Trends and Challenges

Nazrul Hoque, Dhruba K. Bhattacharyya, Jugal K. Kalita
2015 IEEE Communications Surveys and Tutorials  
Furthermore, a list of important issues and research challenges is also reported. Index Terms-DDoS attack, botnet, mobile botnet, IP traceback, DDoS prevention.  ...  Botnets pose a major threat to network security as they are widely used for many Internet crimes such as DDoS attacks, identity theft, email spamming, and click fraud.  ...  DDoS and Botnet in Cloud Computing Security in the cloud is a major concern for cloud service providers.  ... 
doi:10.1109/comst.2015.2457491 fatcat:oph4lgawmzbuvgygq4iagsr6eu
« Previous Showing results 1 — 15 out of 122 results