[go: up one dir, main page]

Skip to main content
Log in

Distributed denial of service attack defence simulation based on honeynet technology

  • Original Research
  • Published:
Journal of Ambient Intelligence and Humanized Computing Aims and scope Submit manuscript

Abstract

Distributed denial of service (DDoS) is one of the main threats of Internet security, and the detection and prevention of DDoS has always been a hot issue in network security research. DDoS detection and defence systems have many shortcomings such as high false positive rate, low execution efficiency, and lack of linkage between detection and defence. Therefore, eliminating false positives, improving execution efficiency, and enhancing the linkage between detection and defence processes have always been the focuses of research. A preventive defence mechanism based on honeynet technology in the paper is presented without more additional equipment which does not rely on resource advantages, and is equally effective with less effort. Firstly, the in-depth analysis and discussion of detection and defence problems are illustrated by combining with the principle and characteristics of the attack, and systematically analyzing and classifing the detection and defence problems. Next, a distributed denial of service attack defence based on honeynet technology is proposed. Finally, algorithm and the effectiveness of the method are proved by simulation experiments.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6

Similar content being viewed by others

Explore related subjects

Discover the latest articles, news and stories from top researchers in related subjects.

References

  • Anagnostopoulos M, Kambourakis G, Gritzalis S (2016) New facets of mobile botnet: architecture and evaluation. Int J Inf Secur 15(5):455–473

    Article  Google Scholar 

  • Cross M, Dubouis L, Mangin M (2017) Defining flare in osteoarthritis of the hip and knee: a systematic literature review—OMERACT virtual special interest group. J Rheumatol 44(12):161–171

    Article  Google Scholar 

  • Dou C, Zhang Z, Dong Y (2017) MAS-based hierarchical distributed coordinate control strategy of virtual power source voltage in low-voltage microgrid. IEEE Access 3(2):1–15

    Google Scholar 

  • Du JW, Zhang X, Zhou Y (2013) Active defense security model in the application of network deception system design. Appl Mech Mater 347–350:2860–2864

    Article  Google Scholar 

  • Gao HH, Chu DQ, Duan YC (2017a) The probabilistic model checking based service selection method for business process modeling. J Softw Eng Knowl Eng 27(6):897–923

    Article  Google Scholar 

  • Gao HH, Duan YC, Miao HK, Yin YY (2017b) An approach to data consistency checking for the dynamic replacement of service process. IEEE Access 5(1):11700–11711

    Article  Google Scholar 

  • Gomez C, Arciamoret A, Crowcroft J (2017) TCP in the Internet of Things: from ostracism to prominence. IEEE Internet Comput 2(9):1–12

    Google Scholar 

  • Hassan A, Eltayieb N, Elhabob R, Li FG (2018) An efficient certificateless user authentication and key exchange protocol for client-server environment. J Ambient Intell Hum Comput 9(6):1713–1727

    Article  Google Scholar 

  • Jiang YZ, Chung FL, Ishibuchi H (2015a) Multitask TSK fuzzy system modeling by mining intertask common hidden structure. IEEE Trans Cybern 45(3):548–561

    Article  Google Scholar 

  • Jiang YZ, Chung FL, Wang ST, Deng ZH, Wang J, Qian PJ (2015b) Collaborative fuzzy clustering from multiple weighted views. IEEE Trans Cybern 45(4):688–701

    Article  Google Scholar 

  • Jiang YZ, Deng ZH, Chung FL, Wang G, Qian PJ, Choi KS, Wang ST (2017) Recognition of epileptic EEG signals using a novel multi-view TSK fuzzy system. IEEE Trans Fuzzy Syst 25(1):3–20

    Article  Google Scholar 

  • Khan MA, Khan S, Shams B (2016) Distributed flood attack detection mechanism using artificial neural network in wireless mesh networks. Secur Commun Netw 9(15):2715–2729

    Article  Google Scholar 

  • Kuang B, Zhao X, Zhou C (2016) The role of UDP-glucuronic acid decarboxylase (UXS) in xylan biosynthesis in Arabidopsis. Mol Plant 9(8):1119–1129

    Article  Google Scholar 

  • Mohammadi R, Javidan R, Conti M, SLICOTS (2017) An SDN-based lightweight countermeasure for TCP SYN flooding attacks. IEEE Trans Netw Serv Manag 14(2):487–497

    Article  Google Scholar 

  • Osanaiye O, Choo KKR, Dlodlo M (2016) Distributed denial of service (DDoS) resilience in cloud: review and conceptual cloud DDoS mitigation framework. J Netw Comput Appl 67(C):147–165

    Article  Google Scholar 

  • Prasad KM, Reddy ARM, Rao KV, BIFAD (2017) Bio-inspired anomaly based http-flood attack detection. Wirel Pers Commun 97(1):281–308

    Article  Google Scholar 

  • Qian PJ, Jiang YZ, Deng ZH, Hu LZ, Sun SW, Wang ST, Raymond F, Jr Muzic (2016) Cluster prototypes and fuzzy memberships jointly leveraged cross-domain maximum entropy clustering. IEEE Trans Cybern 46(1):181–193

    Article  Google Scholar 

  • Qian PJ, Jiang YZ, Wang ST, Su KH, Wang J, Hu LZ, Raymond F, Jr Muzic (2017a) Affinity and penalty jointly constrained spectral clustering with all-compatibility, flexibility, and robustness. IEEE Trans Neural Netw Learn Syst 28(5):1123–1138

    Article  Google Scholar 

  • Qian PJ, Zhao KF, Jiang YZ, Su KH, Deng ZH, Wang ST, Raymond F, Jr Muzic (2017b) Knowledge-leveraged transfer fuzzy c-means for texture image segmentation with self-adaptive cluster prototype matching. Knowl Based Syst 130:33–50

    Article  Google Scholar 

  • Ren J, Xu Y (2018) A compartmental model to explore the interplay between virus epidemics and honeynet potency. Appl Math Model 59:86–99

    Article  MathSciNet  Google Scholar 

  • Saied A, Overill RE, Radzik T (2016) Detection of known and unknown DDoS attacks using artificial neural networks. Neurocomputing 172(C):385–393

    Article  Google Scholar 

  • Sharma A, Singh R, Pandey G (2013) Detection and prevention from black hole attack in AODV protocol for MANET. Int J Comput Appl 50(5):1–4

    Google Scholar 

  • Somani G, Gaur MS, Sanghi D (2016) DDoS attacks in cloud computing: collateral damage to non-targets. Comput Netw 109:157–171

    Article  Google Scholar 

  • Sombolestan SM, Rasooli A, Khodaygan S (2018) Optimal path-planning for mobile robots to find a hidden target in an unknown environment based on machine learning. J Ambient Intell Hum Comput 10(5):1841–1850

    Article  Google Scholar 

  • Stalans LJ, Finn MA (2016) Understanding how the internet facilitates crime and deviance. Victims Offenders Int J Evid Based Res Policy Pract 11(4):1–8

    Google Scholar 

  • Stone-Gross B, Cova M, Gilbert B (2011) Analysis of a botnet takeover. IEEE Secur Privacy 9(1):64–72

    Article  Google Scholar 

  • Tapaswi S, Mahboob A, Shukla AS (2014) Markov chain based roaming schemes for honeypots. Wirel Pers Commun 78(2):995–1010

    Article  Google Scholar 

  • Taylor SJE (2019) Distributed simulation: state-of-the-art and potential for operational research. Eur J Oper Res 273:37–47

    Article  Google Scholar 

  • Wen CY, Juan YH, Yang AS (2017) Enhancement of city breathability with half open spaces in ideal urban street canyons. Build Environ 112:322–336

    Article  Google Scholar 

  • Xin W, Myeongwon O, Katsumi S (2016) Gel-free/label-free proteomic analysis of root tip of soybean over time under flooding and drought stresses. J Proteom 130:42–55

    Article  Google Scholar 

  • Yang Y, Mi J (2011) Design and implementation of distributed intrusion detection system based on honeypot. Comput Knowl Technol 100:303–308

    Google Scholar 

Download references

Acknowledgements

The work is partially supported by (1) Langfang Science and Technology Research Self-financing Project, Research on Network Abnormal Behavior Analysis Technology Based on Traffic Precursor Observation System Flow Detection (Grant no. 2015013011), (2) Hebei Science and Technology Plan Project, Research on APT Attack Detection Algorithm Based on Big Data Analysis (Grant no. 16210705), (3) Shanghai Key Laboratory of Integrated Administration Technologies for Information Security, Research on Path Marking Method of Malicious Code Attack Based on CampusNetwork (Grant no. AGK201704), (4) Research on the basic research business expenses of the central colleges and universities, based on the full-campus network DNS, the key technology of malicious domain name automatic detection (Grant no. ZY20180123).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Fangping Gao.

Additional information

Publisher’s Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Wang, X., Guo, N., Gao, F. et al. Distributed denial of service attack defence simulation based on honeynet technology. J Ambient Intell Human Comput (2019). https://doi.org/10.1007/s12652-019-01396-x

Download citation

  • Received:

  • Accepted:

  • Published:

  • DOI: https://doi.org/10.1007/s12652-019-01396-x

Keywords

Navigation