A Novel Approach Towards Analysis of Attacker Behavior in DDoS Attacks

被引:0
|
作者
Gupta, Himanshu [1 ]
Kulkarni, Tanmay Girish [1 ]
Kumar, Lov [1 ]
Murthy, Neti Lalita Bhanu [1 ]
机构
[1] BITS Pilani, Hyderabad Campus, Hyderabad, India
来源
关键词
Distributed denial of service attacks; Honey pot; Machine learning; Clustering algorithms; Attacker profiling;
D O I
10.1007/978-3-030-45778-5_27
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Traditionally, research in Network Security has largely focused on Intrusion Detection and the use of Machine Learning techniques towards identifying malicious agents as well as work on methods towards protecting ourselves from such attacks. In this paper, we wish to make use of the same techniques to analyze the profile of the attacker in the case of a DDoS attack on a distributed honeypot.
引用
收藏
页码:392 / 402
页数:11
相关论文
共 50 条
  • [21] Towards securing cloud computing from DDOS attacks
    Ahmed I.
    Ahmed S.
    Nawaz A.
    Jan S.
    Najam Z.
    Saadat M.
    Khan R.A.
    Zaman K.
    1600, Science and Information Organization (11): : 615 - 622
  • [22] An Adaptive Approach for Defending against DDoS Attacks
    Li, Muhai
    Li, Ming
    MATHEMATICAL PROBLEMS IN ENGINEERING, 2010, 2010
  • [23] An Adaptive Approach to Mitigate Ddos Attacks in Cloud
    Singh, Baldev
    Panda, S. N.
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2015, 6 (10) : 47 - 52
  • [24] An approach for detecting and preventing DDoS attacks in campus
    Merouane M.
    Merouane, Mehdi (mmehdi_m@hotmail.com), 1600, Springer Science and Business Media, LLC (51): : 13 - 23
  • [25] Research on An Effective Approach against DDoS Attacks
    Zeng Xiao-hui
    Peng Xuan-ge
    Li Man-hua
    Xu Hong-qi
    Jin Shi-yao
    2009 INTERNATIONAL CONFERENCE ON RESEARCH CHALLENGES IN COMPUTER SCIENCE, ICRCCS 2009, 2009, : 21 - +
  • [26] An Approach of DNS Protection Against DDoS Attacks
    Georgiev, Ivan
    Nikolova, Kamelia
    2017 13TH INTERNATIONAL CONFERENCE ON ADVANCED TECHNOLOGIES, SYSTEMS AND SERVICES IN TELECOMMUNICATIONS (TELSIKS), 2017, : 140 - 143
  • [27] Systematic Analysis of DDoS Attacks in Blockchain
    Sheikh, Mohamad Arsalan
    Khan, Gul Zameen
    Hussain, Farookh Khadeer
    2022 24TH INTERNATIONAL CONFERENCE ON ADVANCED COMMUNICATION TECHNOLOGY (ICACT): ARITIFLCIAL INTELLIGENCE TECHNOLOGIES TOWARD CYBERSECURITY, 2022, : 132 - +
  • [28] Simulation and Analysis of Quiet DDOS Attacks
    Zhang, Jing
    Liu, Bo
    Hu, Huaping
    Chen, Lin
    Wang, Tianzuo
    INSTRUMENTATION, MEASUREMENT, CIRCUITS AND SYSTEMS, 2012, 127 : 71 - 81
  • [29] An Analysis of DDoS Attacks on the Instant Messengers
    Faisal, Mohammad
    Abbas, Sohail
    Rahman, Haseeb Ur
    Khan, Muhammad Zahid
    Rahman, Arif Ur
    SECURITY AND COMMUNICATION NETWORKS, 2019, 2019
  • [30] A novel approach for DDoS attacks detection in COVID-19 scenario for small entrepreneurs
    Gaurav, Akshat
    Gupta, Brij B.
    Panigrahi, Prabin Kumar
    TECHNOLOGICAL FORECASTING AND SOCIAL CHANGE, 2022, 177