Research Anthology on Combating Denial-of-Service Attacks最新文献

筛选
英文 中文
Detecting DDoS Attacks on Multiple Network Hosts 检测多网络主机的DDoS攻击
Research Anthology on Combating Denial-of-Service Attacks Pub Date : 1900-01-01 DOI: 10.4018/978-1-5225-8304-2.CH006
Konstantinos F. Xylogiannopoulos, P. Karampelas, R. Alhajj
{"title":"Detecting DDoS Attacks on Multiple Network Hosts","authors":"Konstantinos F. Xylogiannopoulos, P. Karampelas, R. Alhajj","doi":"10.4018/978-1-5225-8304-2.CH006","DOIUrl":"https://doi.org/10.4018/978-1-5225-8304-2.CH006","url":null,"abstract":"The proliferation of low security internet of things devices has widened the range of weapons that malevolent users can utilize in order to attack legitimate services in new ways. In the recent years, apart from very large volumetric distributed denial of service attacks, low and slow attacks initiated from intelligent bot networks have been detected to target multiple hosts in a network in a timely fashion. However, even if the attacks seem to be “innocent” at the beginning, they generate huge traffic in the network without practically been detected by the traditional DDoS attack detection methods. In this chapter, an advanced pattern detection method is presented that is able to collect and classify in real time all the incoming traffic and detect a developing slow and low DDoS attack by monitoring the traffic in all the hosts of the network. The experimental analysis on a real dataset provides useful insights about the effectiveness of the method by identifying not only the main source of attack but also secondary sources that produce low traffic, targeting though multiple hosts.","PeriodicalId":417372,"journal":{"name":"Research Anthology on Combating Denial-of-Service Attacks","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128340980","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Association Rule-Mining-Based Intrusion Detection System With Entropy-Based Feature Selection 基于熵特征选择的关联规则挖掘入侵检测系统
Research Anthology on Combating Denial-of-Service Attacks Pub Date : 1900-01-01 DOI: 10.4018/978-1-7998-1290-6.ch001
D. Sellappan, R. Srinivasan
{"title":"Association Rule-Mining-Based Intrusion Detection System With Entropy-Based Feature Selection","authors":"D. Sellappan, R. Srinivasan","doi":"10.4018/978-1-7998-1290-6.ch001","DOIUrl":"https://doi.org/10.4018/978-1-7998-1290-6.ch001","url":null,"abstract":"Intrusion detection system (IDSs) are important to industries and organizations to solve the problems of networks, and various classifiers are used to classify the activity as malicious or normal. Today, the security has become a decisive part of any industrial and organizational information system. This chapter demonstrates an association rule-mining algorithm for detecting various network intrusions. The KDD dataset is used for experimentation. There are three input features classified as basic features, content features, and traffic features. There are several attacks are present in the dataset which are classified into Denial of Service (DoS), Probe, Remote to Local (R2L), and User to Root (U2R). The proposed method gives significant improvement in the detection rates compared with other methods. Association rule mining algorithm is proposed to evaluate the KDD dataset and dynamic data to improve the efficiency, reduce the false positive rate (FPR) and provides less time for processing.","PeriodicalId":417372,"journal":{"name":"Research Anthology on Combating Denial-of-Service Attacks","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123161074","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Inevitable Battle Against Botnets 与僵尸网络不可避免的战斗
Research Anthology on Combating Denial-of-Service Attacks Pub Date : 1900-01-01 DOI: 10.4018/978-1-5225-8976-1.CH005
Ibrahim Firat
{"title":"Inevitable Battle Against Botnets","authors":"Ibrahim Firat","doi":"10.4018/978-1-5225-8976-1.CH005","DOIUrl":"https://doi.org/10.4018/978-1-5225-8976-1.CH005","url":null,"abstract":"It is undeniable that technology is developing and growing at an unstoppable pace. Technology has become a part of people's daily lives. It has been used for many purposes but mainly to make human life easier. In addition to being useful, these advancements in technology have some bad consequences. A new malware called botnet has recently emerged. It is considered to be one of the most important and dangerous cyber security problems as it is not well understood and evolves quickly. Communication of bots between each other and their botmaster results in the formation of botnet; this is also known as a zombie army. As botnets become popular among cybercriminals, more studies have been done in botnet detection area. Researchers have developed new detection mechanisms in order to understand and tackle this growing botnet issue. This chapter aims to review working principles of botnets and botnet detection mechanisms in order to increase general knowledge about botnets.","PeriodicalId":417372,"journal":{"name":"Research Anthology on Combating Denial-of-Service Attacks","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122300364","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Denial-of-Service and Botnet Analysis, Detection, and Mitigation 拒绝服务和僵尸网络分析、检测和缓解
Research Anthology on Combating Denial-of-Service Attacks Pub Date : 1900-01-01 DOI: 10.4018/978-1-5225-9554-0.CH005
Sobana Sikkanan, Kasthuri M.
{"title":"Denial-of-Service and Botnet Analysis, Detection, and Mitigation","authors":"Sobana Sikkanan, Kasthuri M.","doi":"10.4018/978-1-5225-9554-0.CH005","DOIUrl":"https://doi.org/10.4018/978-1-5225-9554-0.CH005","url":null,"abstract":"The internet is designed for processing and forwarding of any packet in a best effort manner. The packets carried by the internet may be malicious or not. Most of the time, internet architecture provides an unregulated path to victims. Denial-of-service (DoS) attack is the most common critical threat that causes devastating effects on the internet. The Botnet-based DoS attack aims to exhaust both the target resources and network bandwidth, thereby making the network resources unavailable for its valid users. The resources are utilized by either injecting a computer virus or flooding the network with useless traffic. This chapter provides a systematic analysis of the causes of DoS attacks, including motivations and history, analysis of different attacks, detection and protection techniques, various mitigation techniques, the limitations and challenges of DoS research areas. Finally, this chapter discusses some important research directions which will need more attention in the near future to guarantee the successful defense against DoS attacks.","PeriodicalId":417372,"journal":{"name":"Research Anthology on Combating Denial-of-Service Attacks","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115486606","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Botnet and Internet of Things (IoTs) 僵尸网络和物联网(iot)
Research Anthology on Combating Denial-of-Service Attacks Pub Date : 1900-01-01 DOI: 10.4018/978-1-5225-9742-1.CH013
Kamal Alieyan, Ammar Almomani, R. Abdullah, Badr Almutairi, Mohammad Alauthman
{"title":"Botnet and Internet of Things (IoTs)","authors":"Kamal Alieyan, Ammar Almomani, R. Abdullah, Badr Almutairi, Mohammad Alauthman","doi":"10.4018/978-1-5225-9742-1.CH013","DOIUrl":"https://doi.org/10.4018/978-1-5225-9742-1.CH013","url":null,"abstract":"In today's internet world the internet of things (IoT) is becoming the most significant and developing technology. The primary goal behind the IoT is enabling more secure existence along with the improvement of risks at various life levels. With the arrival of IoT botnets, the perspective towards IoT products has transformed from enhanced living enabler into the internet of vulnerabilities for cybercriminals. Of all the several types of malware, botnet is considered as really a serious risk that often happens in cybercrimes and cyber-attacks. Botnet performs some predefined jobs and that too in some automated fashion. These attacks mostly occur in situations like phishing against any critical targets. Files sharing channel information are moved to DDoS attacks. IoT botnets have subjected two distinct problems, firstly, on the public internet. Most of the IoT devices are easily accessible. Secondly, in the architecture of most of the IoT units, security is usually a reconsideration. This particular chapter discusses IoT, botnet in IoT, and various botnet detection techniques available in IoT.","PeriodicalId":417372,"journal":{"name":"Research Anthology on Combating Denial-of-Service Attacks","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115309820","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Denial of Service Attack on Protocols for Smart Grid Communications 智能电网通信协议的拒绝服务攻击
Research Anthology on Combating Denial-of-Service Attacks Pub Date : 1900-01-01 DOI: 10.4018/978-1-5225-1829-7.CH003
Swapnoneel Roy
{"title":"Denial of Service Attack on Protocols for Smart Grid Communications","authors":"Swapnoneel Roy","doi":"10.4018/978-1-5225-1829-7.CH003","DOIUrl":"https://doi.org/10.4018/978-1-5225-1829-7.CH003","url":null,"abstract":"In this work, a denial of service (DoS) attack known as the clogging attack has been performed on three different modern protocols for smart grid (SG) communications. The first protocol provides authentication between smart meters (SM) and a security and authentication server (SAS). The second protocol facilitates secure and private communications between electric vehicles (EV) and the smart grid. The third protocol is a secure and efficient key distribution protocol for the smart grid. The protocols differ in either their applications (authentication, key distribution), or their ways of communications (usage of encryption, hashes, timestamps etc.). But they are similar in their purpose of design (for the smart grid) and their usage of computationally intensive mathematical operations (modular exponentiation, ECC) to implement security. Solutions to protect these protocols against this attack are then illustrated along with identifying the causes behind the occurrence of this vulnerability in SG communication protocols in general.","PeriodicalId":417372,"journal":{"name":"Research Anthology on Combating Denial-of-Service Attacks","volume":"65 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130881968","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
UWDBCSN Analysis During Node Replication Attack in WSN WSN节点复制攻击中的UWDBCSN分析
Research Anthology on Combating Denial-of-Service Attacks Pub Date : 1900-01-01 DOI: 10.4018/978-1-5225-5152-2.CH011
Harpreet Kaur, S. Saxena
{"title":"UWDBCSN Analysis During Node Replication Attack in WSN","authors":"Harpreet Kaur, S. Saxena","doi":"10.4018/978-1-5225-5152-2.CH011","DOIUrl":"https://doi.org/10.4018/978-1-5225-5152-2.CH011","url":null,"abstract":"Wireless sensor network is an emerging area in which multiple sensor nodes are present to perform many real-time applications like military application, industrialized automation, health monitoring, weather forecast, etc. Sensor nodes can be organized into a group which is led by a cluster head; this concept is known as clustering. Clustering of wireless sensor network is used when sensor nodes want to communicate simultaneously in a single network. The author organizes the sensor nodes by applying UWDBCSN (underwater density-based clustering sensor network) clustering approach in which routing of the packets is controlled by cluster head. The author also considers the security of sensor nodes which are harmful to different types of mischievous attacks like wormhole attack, denial of service attack, replication or cloning attack, blackhole attack, etc. Node replication is one of the types in which an attacker tries to capture the node and generate the replica or clone of that node in the same network. So, this chapter describes how to deal with these types of attacks. The author used the intrusion detection process to deal with this type of attack. All the detection procedure is combined with sleep/wake scheduling algorithm to increase the performance of sensor nodes in the network.","PeriodicalId":417372,"journal":{"name":"Research Anthology on Combating Denial-of-Service Attacks","volume":"195 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130661608","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Distributed Denial of Service Attacks and Defense in Cloud Computing 云计算中的分布式拒绝服务攻击与防御
Research Anthology on Combating Denial-of-Service Attacks Pub Date : 1900-01-01 DOI: 10.4018/978-1-5225-7335-7.CH003
Gopal Singh Kushwah, V. Ranga
{"title":"Distributed Denial of Service Attacks and Defense in Cloud Computing","authors":"Gopal Singh Kushwah, V. Ranga","doi":"10.4018/978-1-5225-7335-7.CH003","DOIUrl":"https://doi.org/10.4018/978-1-5225-7335-7.CH003","url":null,"abstract":"Cloud computing has now become a part of many businesses. It provides on-demand resources to its users based on pay-as-you-use policy, across the globe. The high availability feature of this technology is affected by distributed denial of service (DDoS) attack, which is a major security issue. In this attack, cloud or network resources are exhausted, resulting in a denial of service for legitimate users. In this chapter, a classification of various types of DDoS attacks has been presented, and techniques for defending these attacks in cloud computing have been discussed. A discussion on challenges and open issues in this area is also given. Finally, a conceptual model based on extreme learning machine has been proposed to defend these attacks.","PeriodicalId":417372,"journal":{"name":"Research Anthology on Combating Denial-of-Service Attacks","volume":"70 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116624300","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Cyber-Physical System and Internet of Things Security 网络物理系统与物联网安全
Research Anthology on Combating Denial-of-Service Attacks Pub Date : 1900-01-01 DOI: 10.4018/978-1-7998-5348-0.ch018
Thomas Ulz, Sarah Haas, C. Steger
{"title":"Cyber-Physical System and Internet of Things Security","authors":"Thomas Ulz, Sarah Haas, C. Steger","doi":"10.4018/978-1-7998-5348-0.ch018","DOIUrl":"https://doi.org/10.4018/978-1-7998-5348-0.ch018","url":null,"abstract":"An increase of distributed denial-of-service (DDoS) attacks launched by botnets such as Mirai has raised public awareness regarding potential security weaknesses in the Internet of Things (IoT). Devices are an attractive target for attackers because of their large number and due to most devices being online 24/7. In addition, many traditional security mechanisms are not applicable for resource constraint IoT devices. The importance of security for cyber-physical systems (CPS) is even higher, as most systems process confidential data or control a physical process that could be harmed by attackers. While industrial IoT is a hot topic in research, not much focus is put on ensuring information security. Therefore, this paper intends to give an overview of current research regarding the security of data in industrial CPS. In contrast to other surveys, this work will provide an overview of the big CPS security picture and not focus on special aspects.","PeriodicalId":417372,"journal":{"name":"Research Anthology on Combating Denial-of-Service Attacks","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132130952","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Security in IoT Devices 物联网设备的安全性
Research Anthology on Combating Denial-of-Service Attacks Pub Date : 1900-01-01 DOI: 10.4018/978-1-5225-2296-6.CH005
N. Jeyanthi, Shreyansh Banthia, Akhil Sharma
{"title":"Security in IoT Devices","authors":"N. Jeyanthi, Shreyansh Banthia, Akhil Sharma","doi":"10.4018/978-1-5225-2296-6.CH005","DOIUrl":"https://doi.org/10.4018/978-1-5225-2296-6.CH005","url":null,"abstract":"An attempt to do a comparison between the various DDoS attack types that exist by analysing them in various categories that can be formed, to provide a more comprehensive view of the problem that DDoS poses to the internet infrastructure today. Then DDoS and its relevance with respect to IoT (Internet of Things) devices are analysed where attack types have been explained and possible solutions available are analysed. This chapter does not propose any new solutions to mitigating the effects of DDoS attacks but just provides a general survey of the prevailing attack types along with analysis of the underlying structures that make these attacks possible, which would help researchers in understanding the DDoS problem better.","PeriodicalId":417372,"journal":{"name":"Research Anthology on Combating Denial-of-Service Attacks","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129305999","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信