Reddy et al., 2012 - Google Patents
Robust IP spoof control mechanism through packet filtersReddy et al., 2012
View PDF- Document ID
- 13688570647992477868
- Author
- Reddy S
- Prasad S
- Publication year
- Publication venue
- International Journal of Computer Trends and Technology
External Links
Snippet
A new approach for detecting spoofed IP level, called IP Spoofing Detection Approach (ISDA), is proposed. The purpose of this approach is maximally to keep effective parts and remove forged parts of Source IP addresses under flooding attacks and dynamically …
- 238000001514 detection method 0 abstract description 44
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/1458—Denial of Service
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1425—Traffic logging, e.g. anomaly detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1416—Event detection, e.g. attack signature detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/145—Countermeasures against malicious traffic the attack involving the propagation of malware through the network, e.g. viruses, trojans or worms
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/02—Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
- H04L63/0209—Architectural arrangements, e.g. perimeter networks or demilitarized zones
- H04L63/0218—Distributed architectures, e.g. distributed firewalls
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/1483—Countermeasures against malicious traffic service impersonation, e.g. phishing, pharming or web spoofing
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Kene et al. | A review on intrusion detection techniques for cloud computing and security challenges | |
US9667589B2 (en) | Logical / physical address state lifecycle management | |
US7917957B2 (en) | Method and system for counting new destination addresses | |
Yu et al. | Entropy-based collaborative detection of DDOS attacks on community networks | |
Fakeeh | An overview of DDoS attacks detection and prevention in the cloud | |
Kazienko et al. | Intrusion Detection Systems (IDS) Part I-(network intrusions; attack symptoms; IDS tasks; and IDS architecture) | |
Reddy et al. | Analysis and detection of dos attacks in cloud computing by using qse algorithm | |
Praptodiyono et al. | Development of hybrid intrusion detection system based on Suricata with pfSense method for high reduction of DDoS attacks on IPv6 networks. | |
Keshri et al. | DoS attacks prevention using IDS and data mining | |
US8095981B2 (en) | Worm detection by trending fan out | |
Prasad et al. | Flooding attacks to internet threat monitors (ITM): modeling and counter measures using botnet and honeypots | |
Khadke et al. | Review on mitigation of distributed Denial of Service (DDoS) attacks in cloud computing | |
Prasad et al. | IP traceback for flooding attacks on Internet threat monitors (ITM) using Honeypots | |
Irum et al. | DDoS detection and prevention in internet of things | |
Anand et al. | Performance analysis of ACO-based IP Traceback | |
Ma | An effective method for defense against IP spoofing attack | |
Singh et al. | Analysis of Botnet behavior using Queuing theory | |
Kuppusamy et al. | An effective prevention of attacks using gI time frequency algorithm under dDoS | |
Reddy et al. | Robust IP spoof control mechanism through packet filters | |
Singhrova | A host based intrusion detection system for DDoS attack in WLAN | |
Stiawan et al. | Classification of habitual activities in behavior-based network detection | |
Ibrahim | A comprehensive study of distributed denial of service attack with the detection techniques | |
Prasad et al. | An efficient flash crowd attack detection to internet threat monitors (itm) using honeypots | |
Hamdani et al. | Detection of DDOS attacks in cloud computing environment | |
Gupta et al. | An efficient analytical solution to thwart DDoS attacks in public domain |