...
首页> 外文期刊>International Journal of Network Security & Its Applications >IP Traceback for Flooding Attacks on Internet Threat Monitors (ITM ) Using Honeypots
【24h】

IP Traceback for Flooding Attacks on Internet Threat Monitors (ITM ) Using Honeypots

机译:IP回溯,用于使用蜜罐对Internet威胁监视器(ITM)进行洪泛攻击

获取原文
   

获取外文期刊封面封底 >>

       

摘要

The Internet Threat Monitoring (ITM) is an efficient monitoring system used globally to measure, detect, characterize and track threats such as denial of service (DoS) and distributed Denial of Service (DDoS) attacks and worms. . To block the monitoring system in the internet the attackers are targeted the ITM system. In this paper we address the flooding attack of DDoS against ITM monitors to exhaust the network resources, such as bandwidth, computing power, or operating system data structures by sending the malicious traffic. We propose an information-theoretic frame work that models the flooding attacks using Botnet on ITM. One possible way to counter DDoS attacks is to trace the attack sources and punish the perpetrators. we propose a novel traceback method for DDoS using Honeypots. IP tracing through honeypot is a single packet tracing method and is more efficient than commonly used packet marking techniques
机译:Internet威胁监视(ITM)是一种高效的监视系统,在全球范围内用于测量,检测,表征和跟踪诸如拒绝服务(DoS)和分布式拒绝服务(DDoS)攻击和蠕虫之类的威胁。 。为了阻止Internet上的监视系统,攻击者将ITM系统作为攻击目标。在本文中,我们通过发送恶意流量来解决针对ITM监视器的DDoS泛洪攻击,以耗尽网络资源,例如带宽,计算能力或操作系统数据结构。我们提出了一种信息理论框架,该模型可以在ITM上使用僵尸网络对泛洪攻击进行建模。应对DDoS攻击的一种可能方法是跟踪攻击源并惩罚犯罪者。我们提出了一种使用Honeypots的DDoS追溯方法。通过蜜罐进行IP跟踪是单个数据包跟踪方法,并且比常用的数据包标记技术更有效

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号