Bhatia et al., 2012 - Google Patents
Ensemble-based ddos detection and mitigation modelBhatia et al., 2012
View PDF- Document ID
- 4848213774636608562
- Author
- Bhatia S
- Schmidt D
- Mohay G
- Publication year
- Publication venue
- Proceedings of the Fifth International Conference on Security of Information and Networks
External Links
Snippet
This work-in-progress paper presents an ensemble-based model for detecting and mitigating Distributed Denial-of-Service (DDoS) attacks, and its partial implementation. The model utilises network traffic analysis and MIB (Management Information Base) server load …
- 230000000116 mitigating 0 title abstract description 15
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1425—Traffic logging, e.g. anomaly detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/1458—Denial of Service
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1416—Event detection, e.g. attack signature detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1433—Vulnerability analysis
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F11/00—Error detection; Error correction; Monitoring
- G06F11/30—Monitoring
- G06F11/34—Recording or statistical evaluation of computer activity, e.g. of down time, of input/output operation; Recording or statistical evaluation of user activity, e.g. usability assessment
- G06F11/3409—Recording or statistical evaluation of computer activity, e.g. of down time, of input/output operation; Recording or statistical evaluation of user activity, e.g. usability assessment for performance assessment
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| Masdari et al. | A survey and taxonomy of DoS attacks in cloud computing | |
| Izhikevich et al. | {LZR}: Identifying unexpected internet services | |
| Lau et al. | Distributed denial of service attacks | |
| Bhatia et al. | Ensemble-based ddos detection and mitigation model | |
| Kuwatly et al. | A dynamic honeypot design for intrusion detection | |
| Hayajneh et al. | Performance and information security evaluation with firewalls | |
| Bhatia et al. | A framework for generating realistic traffic for Distributed Denial-of-Service attacks and Flash Events | |
| Harshita | Detection and prevention of ICMP flood DDOS attack | |
| Kyaw et al. | Pi-IDS: evaluation of open-source intrusion detection systems on Raspberry Pi 2 | |
| Korniyenko et al. | Implementation of the information resources protection based on the CentOS operating system | |
| Bijalwan et al. | Forensics of random-UDP flooding attacks | |
| Majumdar et al. | ARP poisoning detection and prevention using Scapy | |
| Kondra et al. | Honeypot-based intrusion detection system: A performance analysis | |
| Huang et al. | An authentication scheme to defend against UDP DrDoS attacks in 5G networks | |
| Paharia et al. | Fog computing as a defensive approach against distributed denial of service (DDoS): A proposed architecture | |
| Kurniawan et al. | Implementation and analysis ipsec-vpn on cisco asa firewall using gns3 network simulator | |
| Wang et al. | Distributed denial of service attack defence simulation based on honeynet technology | |
| Singh | A Study on Cooperative Defense Against Network Attacks | |
| Kiratsata et al. | Behaviour analysis of open-source firewalls under security crisis | |
| Jones et al. | Pptp vpn: An analysis of the effects of a ddos attack | |
| Salim et al. | Preventing ARP spoofing attacks through gratuitous decision packet | |
| Suethanuwong | An Effective Prevention Approach against ARP Cache Poisoning Attacks in MikroTik-based Networks | |
| Parekh | Distributed denial of service attacks–TCP SYN flooding attack mitigation | |
| Bhatia | Detecting distributed denial-of-service attacks and flash events | |
| Khirwadkar | Defense against network attacks using game theory |