Honeypot Scheme for Distributed Denial-of-Service Attack

被引:2
|
作者
Das, Vinu V. [1 ]
机构
[1] SAINTIGITS Coll Engn, Dept Comp Sci & Engn, Kottayam 686532, Kerala, India
关键词
Honeypot; Denial-of-Service; Network Security; Spoofing;
D O I
10.1109/ICACC.2009.146
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Honeypots are physical or virtual machines successfully used as intrusion detection tools to detect worm-infected hosts. Denial of service (DoS) attack consumes the resources of a remote client or network itself, there by denying or degrading the service to the legitimate users. In a DoS defense mechanism, a honeypot acts as a detective server among the pool of servers in a specific network; where any packet received by the honeypot is most likely a packet from an attacker This paper points out a number of drawbacks such as Legitimate Attacker and Link Unreachable problem in the existing honeypot schemes. This paper proposes a new efficient honeypot model to solve all the existing problems by opening a virtual communication port for any specific communication between an authorized client and server; and by providing facility to act as an Active Server (AS) for any honeypot.
引用
收藏
页码:497 / 501
页数:5
相关论文
共 50 条
  • [1] A detection scheme against Distributed Reflector Denial-of-Service attack
    Kim, YS
    Jeon, JC
    Jeon, JW
    Yoo, KY
    [J]. 8TH WORLD MULTI-CONFERENCE ON SYSTEMICS, CYBERNETICS AND INFORMATICS, VOL IX, PROCEEDINGS: COMPUTER SCIENCE AND ENGINEERING: I, 2004, : 44 - 48
  • [2] Implementation of Honeypot to Detect and Prevent Distributed Denial of Service Attack
    Sembiring, Irwan
    [J]. 2016 3RD INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY, COMPUTER, AND ELECTRICAL ENGINEERING (ICITACEE), 2016, : 345 - 350
  • [3] Gradient Techniques to Predict Distributed Denial-Of-Service Attack
    Qamar, Roheen
    [J]. Iraqi Journal for Computer Science and Mathematics, 2022, 3 (02): : 55 - 71
  • [4] A BitTorrent-driven distributed denial-of-service attack
    Harrington, Jerome
    Kuwanoe, Corey
    Zou, Cliff C.
    [J]. 2007 THIRD INTERNATIONAL CONFERENCE ON SECURITY AND PRIVACY IN COMMUNICATION NETWORKS AND WORKSHOPS, 2007, : 261 - 268
  • [5] Distributed denial-of-service attack detection scheme-based joint-entropy
    Rahmani, Hamza
    Sahli, Nabil
    Kamoun, Farouk
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2012, 5 (09) : 1049 - 1061
  • [6] A Novel Distributed Denial-of-Service Attack Detection Scheme for Software Defined Networking Environments
    Wu, Di
    Li, Jie
    Das, Sajal K.
    Wu, Jinsong
    Ji, Yusheng
    Li, Zhetao
    [J]. 2018 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2018,
  • [7] Honeypot back-propagation for mitigating spoofing distributed Denial-of-Service attacks
    Khattab, Sherif
    Melhem, Rami
    Mosse, Daniel
    Znati, Taieb
    [J]. JOURNAL OF PARALLEL AND DISTRIBUTED COMPUTING, 2006, 66 (09) : 1152 - 1164
  • [8] Impact of Distributed Denial-of-Service Attack on Advanced Metering Infrastructure
    Satin Asri
    Bernardi Pranggono
    [J]. Wireless Personal Communications, 2015, 83 : 2211 - 2223
  • [9] Filter Assignment Policy Against Distributed Denial-of-Service Attack
    Biswas, Rajorshi
    Wu, Jie
    [J]. 2018 IEEE 24TH INTERNATIONAL CONFERENCE ON PARALLEL AND DISTRIBUTED SYSTEMS (ICPADS 2018), 2018, : 537 - 544
  • [10] Defeating distributed denial-of-service attack with deterministic bit marking
    Kim, Y
    Jo, JY
    Merat, FL
    [J]. GLOBECOM'03: IEEE GLOBAL TELECOMMUNICATIONS CONFERENCE, VOLS 1-7, 2003, : 1363 - 1367