Visible to the public A NOVEL APPROACH TO DETECT DDOS ATTACK THROUGH VIRTUAL HONEYPOT

TitleA NOVEL APPROACH TO DETECT DDOS ATTACK THROUGH VIRTUAL HONEYPOT
Publication TypeConference Paper
Year of Publication2018
AuthorsVenkatesan, R., Kumar, G. Ashwin, Nandhan, M. R.
Conference Name2018 IEEE International Conference on System, Computation, Automation and Networking (ICSCA)
Date Publishedjul
ISBN Number978-1-5386-4866-7
Keywordsauthority level system attacks, Botnet, Computer crime, computer network security, DDoS Attack, DDoS Attacks, detection, digital attacks, distributed denial-of-service attack, end-clients, exceptional security risk, expensive network resources, Floods, honey pots, honeypot system, Human Behavior, human factors, IDS, Internet Service Providers level, Interruption counteractive action framework, intrusion prevention system, IP networks, Mitigation and hybrid algorithms, pubcrawl, resilience, Resiliency, Scalability, Servers, strange vindictive attacks, uncommon attacks, virtual honeypot
Abstract

Distributed denial-of-service (DDoS) attack remains an exceptional security risk, alleviating these digital attacks are for all intents and purposes extremely intense to actualize, particularly when it faces exceptionally well conveyed attacks. The early disclosure of these attacks, through testing, is critical to ensure safety of end-clients and the wide-ranging expensive network resources. With respect to DDoS attacks - its hypothetical establishment, engineering, and calculations of a honeypot have been characterized. At its core, the honeypot consists of an intrusion prevention system (Interruption counteractive action framework) situated in the Internet Service Providers level. The IPSs then create a safety net to protect the hosts by trading chosen movement data. The evaluation of honeypot promotes broad reproductions and an absolute dataset is introduced, indicating honeypot's activity and low overhead. The honeypot anticipates such assaults and mitigates the servers. The prevailing IDS are generally modulated to distinguish known authority level system attacks. This spontaneity makes the honeypot system powerful against uncommon and strange vindictive attacks.

URLhttps://ieeexplore.ieee.org/document/8541209
DOI10.1109/ICSCAN.2018.8541209
Citation Keyvenkatesan_novel_2018