[go: up one dir, main page]

Reddy et al., 2012 - Google Patents

Robust IP spoof control mechanism through packet filters

Reddy et al., 2012

View PDF
Document ID
13688570647992477868
Author
Reddy S
Prasad S
Publication year
Publication venue
International Journal of Computer Trends and Technology

External Links

Snippet

A new approach for detecting spoofed IP level, called IP Spoofing Detection Approach (ISDA), is proposed. The purpose of this approach is maximally to keep effective parts and remove forged parts of Source IP addresses under flooding attacks and dynamically …
Continue reading at www.researchgate.net (PDF) (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/1458Denial of Service
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1425Traffic logging, e.g. anomaly detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1416Event detection, e.g. attack signature detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/145Countermeasures against malicious traffic the attack involving the propagation of malware through the network, e.g. viruses, trojans or worms
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/02Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
    • H04L63/0209Architectural arrangements, e.g. perimeter networks or demilitarized zones
    • H04L63/0218Distributed architectures, e.g. distributed firewalls
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/1483Countermeasures against malicious traffic service impersonation, e.g. phishing, pharming or web spoofing

Similar Documents

Publication Publication Date Title
Kene et al. A review on intrusion detection techniques for cloud computing and security challenges
US9667589B2 (en) Logical / physical address state lifecycle management
US7917957B2 (en) Method and system for counting new destination addresses
Yu et al. Entropy-based collaborative detection of DDOS attacks on community networks
Fakeeh An overview of DDoS attacks detection and prevention in the cloud
Kazienko et al. Intrusion Detection Systems (IDS) Part I-(network intrusions; attack symptoms; IDS tasks; and IDS architecture)
Reddy et al. Analysis and detection of dos attacks in cloud computing by using qse algorithm
Praptodiyono et al. Development of hybrid intrusion detection system based on Suricata with pfSense method for high reduction of DDoS attacks on IPv6 networks.
Keshri et al. DoS attacks prevention using IDS and data mining
US8095981B2 (en) Worm detection by trending fan out
Prasad et al. Flooding attacks to internet threat monitors (ITM): modeling and counter measures using botnet and honeypots
Khadke et al. Review on mitigation of distributed Denial of Service (DDoS) attacks in cloud computing
Prasad et al. IP traceback for flooding attacks on Internet threat monitors (ITM) using Honeypots
Irum et al. DDoS detection and prevention in internet of things
Anand et al. Performance analysis of ACO-based IP Traceback
Ma An effective method for defense against IP spoofing attack
Singh et al. Analysis of Botnet behavior using Queuing theory
Kuppusamy et al. An effective prevention of attacks using gI time frequency algorithm under dDoS
Reddy et al. Robust IP spoof control mechanism through packet filters
Singhrova A host based intrusion detection system for DDoS attack in WLAN
Stiawan et al. Classification of habitual activities in behavior-based network detection
Ibrahim A comprehensive study of distributed denial of service attack with the detection techniques
Prasad et al. An efficient flash crowd attack detection to internet threat monitors (itm) using honeypots
Hamdani et al. Detection of DDOS attacks in cloud computing environment
Gupta et al. An efficient analytical solution to thwart DDoS attacks in public domain