A NOVEL APPROACH TO DETECT DDOS ATTACK THROUGH VIRTUAL HONEYPOT
Title | A NOVEL APPROACH TO DETECT DDOS ATTACK THROUGH VIRTUAL HONEYPOT |
Publication Type | Conference Paper |
Year of Publication | 2018 |
Authors | Venkatesan, R., Kumar, G. Ashwin, Nandhan, M. R. |
Conference Name | 2018 IEEE International Conference on System, Computation, Automation and Networking (ICSCA) |
Date Published | jul |
ISBN Number | 978-1-5386-4866-7 |
Keywords | authority level system attacks, Botnet, Computer crime, computer network security, DDoS Attack, DDoS Attacks, detection, digital attacks, distributed denial-of-service attack, end-clients, exceptional security risk, expensive network resources, Floods, honey pots, honeypot system, Human Behavior, human factors, IDS, Internet Service Providers level, Interruption counteractive action framework, intrusion prevention system, IP networks, Mitigation and hybrid algorithms, pubcrawl, resilience, Resiliency, Scalability, Servers, strange vindictive attacks, uncommon attacks, virtual honeypot |
Abstract | Distributed denial-of-service (DDoS) attack remains an exceptional security risk, alleviating these digital attacks are for all intents and purposes extremely intense to actualize, particularly when it faces exceptionally well conveyed attacks. The early disclosure of these attacks, through testing, is critical to ensure safety of end-clients and the wide-ranging expensive network resources. With respect to DDoS attacks - its hypothetical establishment, engineering, and calculations of a honeypot have been characterized. At its core, the honeypot consists of an intrusion prevention system (Interruption counteractive action framework) situated in the Internet Service Providers level. The IPSs then create a safety net to protect the hosts by trading chosen movement data. The evaluation of honeypot promotes broad reproductions and an absolute dataset is introduced, indicating honeypot's activity and low overhead. The honeypot anticipates such assaults and mitigates the servers. The prevailing IDS are generally modulated to distinguish known authority level system attacks. This spontaneity makes the honeypot system powerful against uncommon and strange vindictive attacks. |
URL | https://ieeexplore.ieee.org/document/8541209 |
DOI | 10.1109/ICSCAN.2018.8541209 |
Citation Key | venkatesan_novel_2018 |
- Human behavior
- virtual honeypot
- uncommon attacks
- strange vindictive attacks
- Servers
- Scalability
- Resiliency
- resilience
- pubcrawl
- Mitigation and hybrid algorithms
- IP networks
- intrusion prevention system
- Interruption counteractive action framework
- Internet Service Providers level
- IDS
- Human Factors
- authority level system attacks
- honeypot system
- honey pots
- Floods
- expensive network resources
- exceptional security risk
- end-clients
- distributed denial-of-service attack
- digital attacks
- detection
- DDoS Attacks
- DDoS Attack
- computer network security
- Computer crime
- botnet