Rajendran et al., 2020 - Google Patents
DNS amplification & DNS tunneling attacks simulation, detection and mitigation approachesRajendran et al., 2020
- Document ID
- 8238600392154834226
- Author
- Rajendran B
- et al.
- Publication year
- Publication venue
- 2020 International Conference on Inventive Computation Technologies (ICICT)
External Links
Snippet
DNS is a critical infrastructure service of the Internet that translates hostnames to network IP addresses and vice versa. The criticality of DNS can be evidenced by the fact that all most all organizations and enterprises do not block DNS traffic, as it would eventually stop access to …
- 230000003321 amplification 0 title abstract description 43
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/1458—Denial of Service
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/145—Countermeasures against malicious traffic the attack involving the propagation of malware through the network, e.g. viruses, trojans or worms
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Rajendran | DNS amplification & DNS tunneling attacks simulation, detection and mitigation approaches | |
Andryukhin | Phishing attacks and preventions in blockchain based projects | |
Lee et al. | Classification of attack types and analysis of attack methods for profiling phishing mail attack groups | |
Saharan et al. | Prevention and Mitigation of DNS based DDoS attacks in SDN Environment | |
Aishwarya et al. | Intrusion detection system-An efficient way to thwart against Dos/DDos attack in the cloud environment | |
Tosun et al. | Resip host detection: Identification of malicious residential ip proxy flows | |
Kaur et al. | Threat and vulnerability analysis of cloud platform: a user perspective | |
Tripathi et al. | Preventing time synchronization in NTP broadcast mode | |
Anderson | Network Attack and Defence | |
Mirdula et al. | Security vulnerabilities in web application-An attack perspective | |
Patel et al. | Polyddoschain-collaborative volumetric distributed denial of service attack detection and prevention using blockchain technology | |
Singh et al. | Analysis of Botnet behavior using Queuing theory | |
Idriss | Mirai botnet in Lebanon | |
Ali et al. | Node protection using hiding identity for IPv6 based network | |
Kashyap et al. | Ddos attack detection and attacker identification | |
Dooley et al. | DNS vulnerabilities | |
Alphonse et al. | Review of Machine Learning Techniques Used for Intrusion and Malware Detection in WSNs and IoT Devices | |
Srivastava et al. | Network Attacks and Protection | |
ABDULLAH et al. | THE IMPLEMENTATION STRATEGY OF DNSSEC IN STRENGTHENING DIGITAL GOVERNMENT SECURITY IN MALAYSIA. | |
Neto et al. | Infrastructure Protection | |
Dooley et al. | Service Denial Attacks | |
Kumar et al. | Multi-Core Parallel Processing Technique to Prepare the Time Series Data for the Early Detection of DDoS Flooding Attacks | |
Chapple et al. | Containment, Eradication, and Recovery | |
Rooney et al. | IPAM and Network Security | |
Gimhana et al. | Mitigating DoS Attacks in mMTC: An Energy Efficiency Perspective |