Adaptive Defense Against Various Network Attacks
نویسندگان
چکیده
منابع مشابه
Cooperative Defense against Network Attacks
Distributed denial of service (DDoS) attacks on the Internet have become an immediate problem. As DDoS streams do not have common characteristics, currently available intrusion detection systems (IDS) can not detect them accurately. As a result, defend DDoS attacks based on current available IDS will dramatically affect legitimate traffic. In this paper, we propose a distributed approach to def...
متن کاملA Study on Various Defense Mechanisms Against DDoS Attacks
Distributed Denial of service (DDOS) attack is one of the biggest security threat to the Internet. This research paper attempts to study the DDOS attacks and its main types. The study will provide good knowledge to try for the defense measures for these attacks. The network is always vulnerable to this type of attack even after providing the security measures. This study will also focus on the ...
متن کاملTowards a Cooperative Defense Model Against Network Security Attacks
It is widely acknowledged that internet security issues can be handled better through cooperation rather than competition. We introduce a game theoretic cooperative model against network security attacks, where users form coalitions and invest in joint protection. We analyze coalition formation in three canonical security games described in a previous work by Grossklags et al. Our findings reve...
متن کاملAgent-based Simulation of Distributed Defense against Computer Network Attacks
The paper describes the agent-based approach and software environment (based on OMNeT++ INET Framework) developed for simulation of distributed defense mechanisms which can be deployed in the Internet for counteraction to computer network attacks. According to the approach suggested, the cybernetic counteraction of “bad guys” and security systems is represented by the interaction of different a...
متن کاملDistributed Defense Against DDoS Attacks
Distributed denial-of-service attacks represent a major security problem. The main task of defense systems is to accurately detect these attacks and quickly respond to stop the oncoming flood. It is equally important to recognize the legitimate traffic that shares the attack signature and deliver it reliably to the victim. Unfortunately, there is no single deployment point on the attack tree th...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: IEEE Journal on Selected Areas in Communications
سال: 2006
ISSN: 0733-8716
DOI: 10.1109/jsac.2006.877137