Bhale et al., 2018 - Google Patents
An adaptive and lightweight solution to detect mixed rate ip spoofed ddos attack in iot ecosystemBhale et al., 2018
View PDF- Document ID
- 10798509606439447358
- Author
- Bhale P
- Biswas S
- Nandi S
- Publication year
- Publication venue
- 2018 15th IEEE India council international conference (INDICON)
External Links
Snippet
Internet of Things (IoT) is a fast-growing and promising technology segment that aims to build advanced developments in automation and control, communication technologies, intelligent sensors etc. Despite various gains, it suffers from several security breaches or …
- 230000003044 adaptive 0 title abstract description 8
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/1458—Denial of Service
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1425—Traffic logging, e.g. anomaly detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1416—Event detection, e.g. attack signature detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/145—Countermeasures against malicious traffic the attack involving the propagation of malware through the network, e.g. viruses, trojans or worms
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/1466—Active attacks involving interception, injection, modification, spoofing of data unit addresses, e.g. hijacking, packet injection or TCP sequence number attacks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/02—Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
- H04L63/0209—Architectural arrangements, e.g. perimeter networks or demilitarized zones
- H04L63/0218—Distributed architectures, e.g. distributed firewalls
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/1491—Countermeasures against malicious traffic using deception as countermeasure, e.g. honeypots, honeynets, decoys or entrapment
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/02—Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
- H04L63/0227—Filtering policies
- H04L63/0254—Stateful filtering
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/02—Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
- H04L63/0227—Filtering policies
- H04L63/0236—Filtering by address, protocol, port number or service, e.g. IP-address or URL
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1433—Vulnerability analysis
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2463/00—Additional details relating to network architectures or network communication protocols for network security covered by H04L63/00
- H04L2463/141—Denial of service attacks against endpoints in a network
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/12—Applying verification of the received information
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Phan et al. | Efficient distributed denial-of-service attack defense in SDN-based cloud | |
Gupta et al. | An ISP level solution to combat DDoS attacks using combined statistical based approach | |
Aamir et al. | A survey on DDoS attack and defense strategies: from traditional schemes to current techniques | |
Chin et al. | An SDN-supported collaborative approach for DDoS flooding detection and containment | |
Rios et al. | Detection and mitigation of low-rate denial-of-service attacks: A survey | |
Iyengar et al. | A fuzzy logic based defense mechanism against distributed denial of service attack in cloud computing environment | |
Bhushan et al. | Detecting DDoS attack using software defined network (SDN) in cloud computing environment | |
Bijalwan et al. | Forensics of random-UDP flooding attacks | |
Amini et al. | A survey on Botnet: Classification, detection and defense | |
Agrawal et al. | A lightweight approach to detect the low/high rate IP spoofed cloud DDoS attacks | |
Bhatt et al. | HADS: Hybrid anomaly detection system for IoT environments | |
Udhayan et al. | Statistical segregation method to minimize the false detections during ddos attacks. | |
Thakur et al. | Detection and prevention of botnets and malware in an enterprise network | |
Bhuyan et al. | Low-rate and high-rate distributed dos attack detection using partial rank correlation | |
Naik et al. | Discovering hackers by stealth: Predicting fingerprinting attacks on honeypot systems | |
Lin et al. | Implementation of an SDN-based security defense mechanism against DDoS attacks | |
Ding et al. | Active link obfuscation to thwart link-flooding attacks for internet of things | |
Patel et al. | Internet protocol identification number based ideal stealth port scan detection using snort | |
Aamir et al. | Ddos attack and defense: Review of some traditional and current techniques | |
Das et al. | Flood control: Tcp-syn flood detection for software-defined networks using openflow port statistics | |
Preetha et al. | Autonomous Agent for DDoS Attack Detection and Defense in an Experimental Testbed. | |
Bhale et al. | An adaptive and lightweight solution to detect mixed rate ip spoofed ddos attack in iot ecosystem | |
Mantoo et al. | A machine learning model for detection of man in the middle attack over unsecured devices | |
Raheja et al. | Rule‐Based Approach for Botnet Behavior Analysis | |
Aroua et al. | A distributed and coordinated massive DDOS attack detection and response approach |