[go: up one dir, main page]

Rajendran et al., 2020 - Google Patents

DNS amplification & DNS tunneling attacks simulation, detection and mitigation approaches

Rajendran et al., 2020

Document ID
8238600392154834226
Author
Rajendran B
et al.
Publication year
Publication venue
2020 International Conference on Inventive Computation Technologies (ICICT)

External Links

Snippet

DNS is a critical infrastructure service of the Internet that translates hostnames to network IP addresses and vice versa. The criticality of DNS can be evidenced by the fact that all most all organizations and enterprises do not block DNS traffic, as it would eventually stop access to …
Continue reading at ieeexplore.ieee.org (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/1458Denial of Service
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/145Countermeasures against malicious traffic the attack involving the propagation of malware through the network, e.g. viruses, trojans or worms

Similar Documents

Publication Publication Date Title
Rajendran DNS amplification & DNS tunneling attacks simulation, detection and mitigation approaches
Andryukhin Phishing attacks and preventions in blockchain based projects
Lee et al. Classification of attack types and analysis of attack methods for profiling phishing mail attack groups
Saharan et al. Prevention and Mitigation of DNS based DDoS attacks in SDN Environment
Aishwarya et al. Intrusion detection system-An efficient way to thwart against Dos/DDos attack in the cloud environment
Tosun et al. Resip host detection: Identification of malicious residential ip proxy flows
Kaur et al. Threat and vulnerability analysis of cloud platform: a user perspective
Tripathi et al. Preventing time synchronization in NTP broadcast mode
Anderson Network Attack and Defence
Mirdula et al. Security vulnerabilities in web application-An attack perspective
Patel et al. Polyddoschain-collaborative volumetric distributed denial of service attack detection and prevention using blockchain technology
Singh et al. Analysis of Botnet behavior using Queuing theory
Idriss Mirai botnet in Lebanon
Ali et al. Node protection using hiding identity for IPv6 based network
Kashyap et al. Ddos attack detection and attacker identification
Dooley et al. DNS vulnerabilities
Alphonse et al. Review of Machine Learning Techniques Used for Intrusion and Malware Detection in WSNs and IoT Devices
Srivastava et al. Network Attacks and Protection
ABDULLAH et al. THE IMPLEMENTATION STRATEGY OF DNSSEC IN STRENGTHENING DIGITAL GOVERNMENT SECURITY IN MALAYSIA.
Neto et al. Infrastructure Protection
Dooley et al. Service Denial Attacks
Kumar et al. Multi-Core Parallel Processing Technique to Prepare the Time Series Data for the Early Detection of DDoS Flooding Attacks
Chapple et al. Containment, Eradication, and Recovery
Rooney et al. IPAM and Network Security
Gimhana et al. Mitigating DoS Attacks in mMTC: An Energy Efficiency Perspective