3,569 Hits in 5.4 sec

Preventing Distributed Denial of Service Attacks in Cloud Environments

Subramaniam T.K, Deepa B
2016 International Journal of Information Technology Control and Automation  
Attacker in the system may capture this private information and distorted. So security is the major issue. There are several security attacks in network.  ...  DDoS occur in two different behaviors they may happen obviously or it may due to some attackers .Various schemes are developed defense against to this attack.  ...  Reducing vulnerability by network mechanism: This also helps in reducing vulnerability of DDoS attack happening in the network.  ... 
doi:10.5121/ijitca.2016.6203 fatcat:hl5poift7zhwzfsfk6tksflfje

Survey on Software Defined Network based Botnet Attacks

Rajni Samta, Pooja Rani
2020 International Journal of Innovative Science and Research Technology  
Software Defined Network breaks the barriers of traditional way of networking, where as it is cost efficient as it simplifies hardware and software management, any change in the software defined networks  ...  This paper has discussed about a major security threat that has emerged in past few years called botnets and also has discussed related work regarding Software Defined Network based botnets  ...  As software defined networks have their own ways of detecting and also mitigating such kinds of security threats to the networks. [5] , shows the illustration of Botnet attack.TYPES OF BOTNETS: The three  ... 
doi:10.38124/ijisrt20aug647 fatcat:enahmomczjev5h6och6ojx47am

Analysis of Different Attacks on Software Defined Network and Approaches to Mitigate using Intelligent Techniques

P. Karthika, A. Karmel
2021 International Journal of Advanced Computer Science and Applications  
The detection of DDoS (Distributed Denial of Service) attacks is essential topic under network security.  ...  Both Software Defined Networking (SDN) and Deep Learning (DL) have recently found a number of practical and fascinating applications in industry and academia.  ...  To identify DDoS attacks, data from network traffic flow must be used to build a network-based Intrusion Detection System (IDS) that employs cutting-edge networking techniques like Software-Defined Networking  ... 
doi:10.14569/ijacsa.2021.0120938 fatcat:r5cm4po2rnashlmu54kz2bhpgu

Performance analysis of security framework for software defined network architectures

K. A. Varun Kumar, D. Arivudainambi
2019 International Journal of Advances in Applied Sciences  
<p>Software defined data centers (SDDC) and software defined networking (SDN) are two emerging areas in the field of cloud data centers.  ...  Some Application as a Service used in NFV data centers have a wide range in building security services like Virtual firewalls, Intrusion Detection System (IDS), load balancing, bandwidth allocation and  ...  Figure 1 . 1 Software defined network security attack vectors Performance analysis of security framework for software defined network architectures (D.  ... 
doi:10.11591/ijaas.v8.i3.pp232-242 fatcat:bwdltwcb6zfehputh42meurhaq

Protection from Application Layer DDoS Attacks for Popular Websites

Sreeja Rajesh
2013 International Journal of Computer and Electrical Engineering  
Access Matrix (AM) is defined to detect App-DDoS attacks based on userlogs and threshold value. Hidden Markov model is used to detect App-DDoS attack based on user behavior.  ...  These are the prime reasons that gained importance for the study of DDoS attack detection and prevention.  ...  Intrusion Detection System A software that is used to automate the intrusion detection process is known as intrusion detection system (IDS). C.  ... 
doi:10.7763/ijcee.2013.v5.771 fatcat:qyjmtaqdqfc2lluugihjxphlj4

A Survey of Intrusion Detection System for Denial of Service Attack in Cloud

Shalki Sharma, Anshul Gupta, Sanjay Agrawal
2015 International Journal of Computer Applications  
This paper discusses about the Denial of Service attack or DoS attack in cloud environment and what are the various detection methods which have been proposed for the same.  ...  One of main flaw in cloud is the security present in the cloud. There are various threats, attacks and security issues that pertain in cloud. Among all the attacks DoS is a crucial one.  ...  Securing Cloud Computing Environment Against DDoS Attacks Bansidhar Joshi et al. [4] is using Cloud Trace Back(CTB) model for detecting DDoS attacks employing back propagation neural network.  ... 
doi:10.5120/21332-4309 fatcat:yq6ylsk4pzb5xcxyag5roqvzje

A Novel Hifi-Hacking Interrupter for Iot Devices

2020 International Journal of Engineering and Advanced Technology  
DDoS attacks built on compromised IoT systems emerge as a serious problem. There are many technological solutions, but technology has changed a lot, so software solution can be in risk as well.  ...  The proposed system will serve as a prevention tool for DDoS attack and send the admin an alert when an attempt is made to hack the IoT device.  ...  Commonly DDoS attacks are evaluated by considering three layer which are Perception, Network and Application Layer [5] DDoS attacks have been made over the last few weeks with 145,000 IOT-compatible  ... 
doi:10.35940/ijeat.d8323.049420 fatcat:7ibhzgjbyvay5jdmlx63qef4qq

Dealing With COVID-19 Network Traffic Spikes [Cybercrime and Forensics]

Mahmoud Said Elsayed, Nhien-An Le-Khac, Anca Delia Jurcut
2021 IEEE Security and Privacy  
The situation is accelerating IT infrastructure providers' migration toward new technological innovations, such as software-defined networking (SDN).  ...  However, the centralized controller's global view in SDN facilitates DDoS detection by instructing network devices to pass the flow traffic to the controller for further inspection without installing additional  ... 
doi:10.1109/msec.2020.3037448 fatcat:jmdpcl6o7zbyfabia7ibckdqie

SVM Implementation for Ddos Attacks in Software Defined Networks

Software Defined Network (SDN) is making software interaction with the network. SDN has made the network flexible and dynamic and also enabled the abstraction feature of applications and services.  ...  DDOS is an attack that in general leads to exhaust of the network resources in turn stopping the controller.  ...  The author in A Deep Learning-Based DDoS Detection System in Software-Defined Networking (SDN) proposed a profound learning-based multi-vector DDoS recognition framework in an SDN domain.  ... 
doi:10.35940/ijitee.a8166.1110120 fatcat:uqgpckoqyrghxmic2cksyhb7di

Comprehensive Review of Artificial Intelligence and Statistical Approaches in Distributed Denial of Service Attack and Defense Methods

Bashar Ahmed Khalaf, Salama A. Mostafa, Aida Mustapha, Mazin Abed Mohammed, Wafaa Mustafa Abduallah
2019 IEEE Access  
INDEX TERMS DDoS attack, DDoS defense, artificial intelligence technique, statistical technique.  ...  Subsequently, extensive research on applying artificial intelligence and statistical techniques in the defense methods has been conducted in order to identify, mitigate, and prevent these attacks.  ...  detect and classify DDoS attack and measure network service condition of social media servers as in [69] . • Software agent technique covers various roles in DDoS attack and defense methods.  ... 
doi:10.1109/access.2019.2908998 fatcat:wasnqcj4bnc23pk4wzsl7n7rze

Robust Self-Protection Against Application-Layer (D)DoS Attacks in SDN Environment

Chafika Benzaid, Mohammed Boukhalfa, Tarik Taleb
2020 2020 IEEE Wireless Communications and Networking Conference (WCNC)  
In this work, we propose a robust application-layer DDoS self-protection framework that empowers a fully autonomous detection and mitigation of the application-layer DDoS attacks leveraging on Deep Learning  ...  The performance results show the effectiveness of the proposed framework in protecting against application-layer DDoS attacks even in the presence of adversarial attacks.  ...  The framework empowers a fully autonomous detection and mitigation of the application-layer DDoS attacks, leveraging Deep Learning (DL) and Software Defined Networking (SDN) enablers.  ... 
doi:10.1109/wcnc45663.2020.9120472 dblp:conf/wcnc/BenzaidBT20 fatcat:jnmwmwy53zeepjeqdzlhpxz7e4

DDoS attacks and defense mechanisms: classification and state-of-the-art

Christos Douligeris, Aikaterini Mitrokotsa
2004 Computer Networks  
Denial of Service (DoS) attacks constitute one of the major threats and among the hardest security problems in todayÕs Internet.  ...  This paper presents a structural approach to the DDoS problem by developing a classification of DDoS attacks and DDoS defense mechanisms.  ...  All of these steps were later automated, by the use of semi-automatic DDoS attacks, and automatic DDoS attacks. • In semi-automatic attacks, the DDoS attack belongs in the agent-handler attack model.  ... 
doi:10.1016/j.comnet.2003.10.003 fatcat:j5bmatgznraqxcnclv326qr7my

ReCSDN: Resilient Controller for Software Defined Networks

Soomaiya Hamid, Narmeen Zakaria, Jawwad Ahmed
2017 International Journal of Advanced Computer Science and Applications  
Software Defined Networking (SDN) is an emerging network paradigm that provides central control over the network.  ...  This framework is capable of detecting and mitigating DDoS attacks timely and ensures the continuity of services without performance degradation.  ...  Software defined network architecture.  ... 
doi:10.14569/ijacsa.2017.080826 fatcat:evievgzryncbxafctqxtl7u66i

Intrusion Detection System based on the SDN Network, Bloom Filter and Machine Learning

Traore Issa, Kone Tiemoman
2019 International Journal of Advanced Computer Science and Applications  
This method is based on Software Defined Network (SDN) technologies, Bloom filter and automatic behaviour learning.  ...  Indeed, distributed denial of service attacks (DDoS) are difficult to detect in real time. In particular, it concerns the distinction between legitimate and illegitimate packages.  ...  .  Attack detection detects the DDoS attack when it occurs.  ... 
doi:10.14569/ijacsa.2019.0100953 fatcat:mapuy2cysjdr7ehkou37s7rchu

A Survey on Defense Mechanism against Distributed Denial of Service (DDoS) Attacks in Control System

YooJin Kwon
2015 KEPCO Journal on Electric Power and Energy  
Then we propose a comprehensive defense mechanism against DDoS attacks in Control System to detect attacks efficiently.  ...  In this paper, we categorize the DDoS attacks and classify existing countermeasures based on where and when they prevent, detect, and respond to the DDoS attacks.  ...  We introduced an automated detection techniques in this paper to prevent DDoS attacks on control systems environment and it is necessary to apply the filtering rule using 'local filter'.  ... 
doi:10.18770/kepco.2015.01.01.055 fatcat:hdtmpljsezhytay5ojesurczsa
« Previous Showing results 1 — 15 out of 3,569 results