+

Bhatia et al., 2012 - Google Patents

Ensemble-based ddos detection and mitigation model

Bhatia et al., 2012

View PDF
Document ID
4848213774636608562
Author
Bhatia S
Schmidt D
Mohay G
Publication year
Publication venue
Proceedings of the Fifth International Conference on Security of Information and Networks

External Links

Snippet

This work-in-progress paper presents an ensemble-based model for detecting and mitigating Distributed Denial-of-Service (DDoS) attacks, and its partial implementation. The model utilises network traffic analysis and MIB (Management Information Base) server load …
Continue reading at eprints.qut.edu.au (PDF) (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1425Traffic logging, e.g. anomaly detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/1458Denial of Service
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1416Event detection, e.g. attack signature detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1433Vulnerability analysis
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/30Monitoring
    • G06F11/34Recording or statistical evaluation of computer activity, e.g. of down time, of input/output operation; Recording or statistical evaluation of user activity, e.g. usability assessment
    • G06F11/3409Recording or statistical evaluation of computer activity, e.g. of down time, of input/output operation; Recording or statistical evaluation of user activity, e.g. usability assessment for performance assessment

Similar Documents

Publication Publication Date Title
Masdari et al. A survey and taxonomy of DoS attacks in cloud computing
Izhikevich et al. {LZR}: Identifying unexpected internet services
Lau et al. Distributed denial of service attacks
Bhatia et al. Ensemble-based ddos detection and mitigation model
Kuwatly et al. A dynamic honeypot design for intrusion detection
Hayajneh et al. Performance and information security evaluation with firewalls
Bhatia et al. A framework for generating realistic traffic for Distributed Denial-of-Service attacks and Flash Events
Harshita Detection and prevention of ICMP flood DDOS attack
Kyaw et al. Pi-IDS: evaluation of open-source intrusion detection systems on Raspberry Pi 2
Korniyenko et al. Implementation of the information resources protection based on the CentOS operating system
Bijalwan et al. Forensics of random-UDP flooding attacks
Majumdar et al. ARP poisoning detection and prevention using Scapy
Kondra et al. Honeypot-based intrusion detection system: A performance analysis
Huang et al. An authentication scheme to defend against UDP DrDoS attacks in 5G networks
Paharia et al. Fog computing as a defensive approach against distributed denial of service (DDoS): A proposed architecture
Kurniawan et al. Implementation and analysis ipsec-vpn on cisco asa firewall using gns3 network simulator
Wang et al. Distributed denial of service attack defence simulation based on honeynet technology
Singh A Study on Cooperative Defense Against Network Attacks
Kiratsata et al. Behaviour analysis of open-source firewalls under security crisis
Jones et al. Pptp vpn: An analysis of the effects of a ddos attack
Salim et al. Preventing ARP spoofing attacks through gratuitous decision packet
Suethanuwong An Effective Prevention Approach against ARP Cache Poisoning Attacks in MikroTik-based Networks
Parekh Distributed denial of service attacks–TCP SYN flooding attack mitigation
Bhatia Detecting distributed denial-of-service attacks and flash events
Khirwadkar Defense against network attacks using game theory
点击 这是indexloc提供的php浏览器服务,不要输入任何密码和下载