A Novel Approach Towards Analysis of Attacker Behavior in DDoS Attacks

被引:0
|
作者
Gupta, Himanshu [1 ]
Kulkarni, Tanmay Girish [1 ]
Kumar, Lov [1 ]
Murthy, Neti Lalita Bhanu [1 ]
机构
[1] BITS Pilani, Hyderabad Campus, Hyderabad, India
来源
关键词
Distributed denial of service attacks; Honey pot; Machine learning; Clustering algorithms; Attacker profiling;
D O I
10.1007/978-3-030-45778-5_27
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Traditionally, research in Network Security has largely focused on Intrusion Detection and the use of Machine Learning techniques towards identifying malicious agents as well as work on methods towards protecting ourselves from such attacks. In this paper, we wish to make use of the same techniques to analyze the profile of the attacker in the case of a DDoS attack on a distributed honeypot.
引用
收藏
页码:392 / 402
页数:11
相关论文
共 50 条
  • [41] A novel model for detecting application layer DDoS attacks
    Xie, Yi
    Yu, Shun-Zheng
    FIRST INTERNATIONAL MULTI-SYMPOSIUMS ON COMPUTER AND COMPUTATIONAL SCIENCES (IMSCCS 2006), PROCEEDINGS, VOL 2, 2006, : 56 - +
  • [42] Unsupervised Feature Engineering Approach to Predict DDoS Attacks
    de Neira, Anderson B.
    Borges, Ligia F.
    Araujo, Alex M.
    Nogueira, Michele
    IEEE CONFERENCE ON GLOBAL COMMUNICATIONS, GLOBECOM, 2023, : 1644 - 1649
  • [43] Entropy Clustering Approach for Improving Forecasting in DDoS Attacks
    Olabelurin, Abimbola
    Veluru, Suresh
    Healing, Alex
    Rajarajan, Muttukrishnan
    2015 IEEE 12TH INTERNATIONAL CONFERENCE ON NETWORKING, SENSING AND CONTROL (ICNSC), 2015, : 315 - 320
  • [44] An ISP level distributed approach to detect DDoS attacks
    Kumar, Krishan
    Joshi, R. C.
    Singh, Kuldip
    INNOVATIVE ALGORITHMS AND TECHNIQUES IN AUTOMATION, INDUSTRIAL ELECTRONICS AND TELECOMMUNICATIONS, 2007, : 235 - +
  • [45] An Analysis of DDoS Attacks in a Smart Home Networks
    Saxena, Utkarsh
    Sodhi, J. S.
    Singh, Yaduveer
    PROCEEDINGS OF THE CONFLUENCE 2020: 10TH INTERNATIONAL CONFERENCE ON CLOUD COMPUTING, DATA SCIENCE & ENGINEERING, 2020, : 272 - 276
  • [46] Booters - An Analysis of DDoS-as-a-Service Attacks
    Santanna, Jose Jair
    van Rijswijk-Deij, Roland
    Hofstede, Rick
    Sperotto, Anna
    Wierbosch, Mark
    Granville, Lisandro Zambenedetti
    Pras, Aiko
    PROCEEDINGS OF THE 2015 IFIP/IEEE INTERNATIONAL SYMPOSIUM ON INTEGRATED NETWORK MANAGEMENT (IM), 2015, : 243 - 251
  • [47] A Simulation Model for the Analysis of DDoS Amplification Attacks
    Furfaro, Angelo
    Malena, Giovanna
    Molina, Lorena
    Parise, Andrea
    2015 17TH UKSIM-AMSS INTERNATIONAL CONFERENCE ON COMPUTER MODELLING AND SIMULATION (UKSIM), 2015, : 267 - 272
  • [48] DDoS Attacks Analysis in Bigdata (Hadoop) Environment
    Ahmad, Shakeel
    Yasin, Amanullah
    Shafi, Qaisar
    PROCEEDINGS OF 2018 15TH INTERNATIONAL BHURBAN CONFERENCE ON APPLIED SCIENCES AND TECHNOLOGY (IBCAST), 2018, : 495 - 501
  • [49] Analysis of SCADA System Vulnerabilities to DDoS Attacks
    Markovic-Petrovic, Jasna D.
    Stojanovic, Mirjana D.
    2013 11TH INTERNATIONAL CONFERENCE ON TELECOMMUNICATIONS IN MODERN SATELLITE, CABLE AND BROADCASTING SERVICES (TELSIKS), VOLS 1 AND 2, 2013, : 591 - 594
  • [50] KS-DDoS: Kafka streams-based classification approach for DDoS attacks
    Patil, Nilesh Vishwasrao
    Krishna, C. Rama
    Kumar, Krishan
    JOURNAL OF SUPERCOMPUTING, 2022, 78 (06): : 8946 - 8976