首页> 外文OA文献 >Flooding attacks to internet threat monitors (ITM): Modeling and counter measures using botnet and honeypots
【2h】

Flooding attacks to internet threat monitors (ITM): Modeling and counter measures using botnet and honeypots

机译:对Internet威胁监视器(ITm)的泛洪攻击:建模和计数器   使用僵尸网络和蜜罐的措施

代理获取
本网站仅为用户提供外文OA文献查询和代理获取服务,本网站没有原文。下单后我们将采用程序或人工为您竭诚获取高质量的原文,但由于OA文献来源多样且变更频繁,仍可能出现获取不到、文献不完整或与标题不符等情况,如果获取不到我们将提供退款服务。请知悉。

摘要

The Internet Threat Monitoring (ITM),is a globally scoped Internet monitoringsystem whose goal is to measure, detect, characterize, and track threats suchas distribute denial of service(DDoS) attacks and worms. To block themonitoring system in the internet the attackers are targeted the ITM system. Inthis paper we address flooding attack against ITM system in which the attackerattempt to exhaust the network and ITM's resources, such as network bandwidth,computing power, or operating system data structures by sending the malicioustraffic. We propose an information-theoretic frame work that models theflooding attacks using Botnet on ITM. Based on this model we generalize theflooding attacks and propose an effective attack detection using Honeypots.
机译:Internet威胁监视(ITM)是全球范围内的Internet监视系统,其目标是测量,检测,表征和跟踪威胁,例如分发拒绝服务(DDoS)攻击和蠕虫。为了阻止Internet上的监视系统,攻击者将ITM系统作为攻击目标。本文针对ITM系统的泛洪攻击,攻击者试图通过发送恶意流量来耗尽网络和ITM资源,例如网络带宽,计算能力或操作系统数据结构。我们提出了一种信息理论框架,该模型可以在ITM上使用僵尸网络对洪灾攻击进行建模。基于此模型,我们对洪水攻击进行了概括,并提出了使用Honeypots的有效攻击检测。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
代理获取

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号