Simulation of dynamic honeypot based redirection to counter service level DDoS attacks

被引:0
|
作者
Sardana, Anjali [1 ]
Joshi, Ramesh Chandra [1 ]
机构
[1] Indian Inst Technol, Dept Elect & Comp Engn, Roorkee 247667, Uttar Pradesh, India
来源
INFORMATION SYSTEMS SECURITY, PROCEEDINGS | 2007年 / 4812卷
关键词
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
DDOS attacks generate flooding traffic from multiple sources towards selected nodes which may be targets of opportunity or targets of choice. The latter reflects service level attacks aimed to disrupt services. Array of schemes have been proposed for defense against DDOS attacks in real time. Low rate DDOS attacks lead to graceful degradation while high rate attacks leave network functionally unstable. Our scheme uses three lines of defense. The first line of defense detects the presence of attacks. The second line of defense identifies and tags attack flows in real time. As the last line of defense, a model for dynamic honeypot routing and redirection has been proposed in response to identified attacks that triggers the automatic generation of adequate nodes to service client requests and required number of honeypots that interact with attackers in contained manner. The judicious mixture of servers and honeypots at different time intervals provide stable network functionality at ISP level. We validate the effectiveness of the approach with analytical modeling on Internet type topology and simulation in ns-2 on a Linux platform.
引用
收藏
页码:259 / 262
页数:4
相关论文
共 50 条
  • [1] An Integrated Honeypot Framework for Proactive Detection, Characterization and Redirection of DDoS Attacks at ISP level
    Sardana, Anjali
    Joshi, R. C.
    JOURNAL OF INFORMATION ASSURANCE AND SECURITY, 2008, 3 (01): : 1 - 15
  • [2] Honeypot based routing to mitigate DDoS attacks on servers at ISP level
    Sardana, Anjali
    Joshi, R. C.
    2008 INTERNATIONAL SYMPOSIUM ON INFORMATION PROCESSING AND 2008 INTERNATIONAL PACIFIC WORKSHOP ON WEB MINING AND WEB-BASED APPLICATION, 2008, : 505 - 509
  • [3] Autonomous Dynamic Honeypot Routing Mechanism for Mitigating DDoS Attacks in DMZ
    Sardana, Anjali
    Joshi, R. C.
    PROCEEDINGS OF THE 2008 16TH INTERNATIONAL CONFERENCE ON NETWORKS, 2008, : 356 - 362
  • [4] NBHU-based Method to Counter Quiet DDoS Attacks
    Zhang, Jing
    Liu, Hui
    Hu, Huaping
    Chen, Lin
    2011 INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND NETWORK TECHNOLOGY (ICCSNT), VOLS 1-4, 2012, : 898 - 901
  • [5] An Enhanced LSTM Approach for Detecting IoT-Based DDoS Attacks Using Honeypot Data
    Arnob, Arjun Kumar Bose
    Mridha, M. F.
    Safran, Mejdl
    Amiruzzaman, Md
    Islam, Md. Rajibul
    INTERNATIONAL JOURNAL OF COMPUTATIONAL INTELLIGENCE SYSTEMS, 2025, 18 (01)
  • [6] Mitigating DDoS Attacks towards Top Level Domain Name Service
    Pan, Lanlan
    Yuchi, Xuebiao
    Chen, Yong
    2016 18TH ASIA-PACIFIC NETWORK OPERATIONS AND MANAGEMENT SYMPOSIUM (APNOMS), 2016,
  • [7] Research on counter bandwidth depletion DDoS attacks based on Genetic algorithm
    Guo, Rui
    Chang, Guiran
    Hou, Ruidong
    Qin, Yuhai
    Sun, Baojing
    liu, An
    Jia, Yan
    Peng, Dan
    ICNC 2007: THIRD INTERNATIONAL CONFERENCE ON NATURAL COMPUTATION, VOL 4, PROCEEDINGS, 2007, : 155 - +
  • [8] Simulation study of DDoS attacks and remediation based on OPNET
    Wang, Fang
    Meng, Gong
    Wang, Shenhang
    Fu, Yanfang
    Li, Qiang
    INTERNATIONAL CONFERENCE ON MECHANICAL DESIGN AND SIMULATION (MDS 2022), 2022, 12261
  • [9] Research on active defense strategy of counter DDoS attacks based on Differential Games Model
    Guo, Rui
    Chang, Guiran
    Qin, Yuhai
    Sun, Baojing
    Feng, Yifu
    Peng, Dan
    FIRST INTERNATIONAL WORKSHOP ON KNOWLEDGE DISCOVERY AND DATA MINING, PROCEEDINGS, 2007, : 566 - +
  • [10] Quick service during DDoS attacks in the container-based cloud environment
    Kumar, Anmol
    Agarwal, Mayank
    JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2024, 229