AN INVESTIGATION OF SECURITY TECHNIQUES FOR CONCEALED DDOS EXPOSURE ATTACKS

K. Praghash, M. Masthan, R. Ravi
{"title":"AN INVESTIGATION OF SECURITY TECHNIQUES FOR CONCEALED DDOS EXPOSURE ATTACKS","authors":"K. Praghash, M. Masthan, R. Ravi","doi":"10.21917/ijct.2018.0246","DOIUrl":null,"url":null,"abstract":"Due to the influence of the multi-level system, the DDoS became a significant investigation in modern days. This encourages us to reduce the data loss and service overheads. In order to investigate these issues, an investigation of the DDoS attack and their related security techniques were analyzed in this paper. So, in this investigation, various data about the intruders will be collected by employing a secured multi-layered design with nomadic honeypots. Our proposed Subterranean Optimization procedure is utilized to distinguish the gatecrashers in view of the pheromone store on that considered zone. A multi-degree IP log table is utilized to distinguish the gatecrashers at diverse ranges of the device. Once the prompted range is found, the information is sent to multi-degree engineering to restrain the spreading of the stimulated region within the honeypot. This statistics will be dispatched to the honeypot to make a guard framework towards the attackers. The advantage of this proposed strategy is that it gives a complete barrier against DDoS at multilevel without making any overhead.","PeriodicalId":30618,"journal":{"name":"ICTACT Journal on Communication Technology","volume":"9 1","pages":"1681-1685"},"PeriodicalIF":0.0000,"publicationDate":"2018-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"ICTACT Journal on Communication Technology","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.21917/ijct.2018.0246","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

Abstract

Due to the influence of the multi-level system, the DDoS became a significant investigation in modern days. This encourages us to reduce the data loss and service overheads. In order to investigate these issues, an investigation of the DDoS attack and their related security techniques were analyzed in this paper. So, in this investigation, various data about the intruders will be collected by employing a secured multi-layered design with nomadic honeypots. Our proposed Subterranean Optimization procedure is utilized to distinguish the gatecrashers in view of the pheromone store on that considered zone. A multi-degree IP log table is utilized to distinguish the gatecrashers at diverse ranges of the device. Once the prompted range is found, the information is sent to multi-degree engineering to restrain the spreading of the stimulated region within the honeypot. This statistics will be dispatched to the honeypot to make a guard framework towards the attackers. The advantage of this proposed strategy is that it gives a complete barrier against DDoS at multilevel without making any overhead.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
隐藏DDOS暴露攻击的安全技术研究
由于多层次系统的影响,DDoS攻击在现代成为一个重要的研究课题。这鼓励我们减少数据丢失和服务开销。为了研究这些问题,本文对DDoS攻击及其相关的安全技术进行了研究。因此,在本次调查中,有关入侵者的各种数据将通过采用安全的多层设计与游牧蜜罐收集。我们所提出的地下优化程序被用来根据所考虑区域的信息素储存来区分闯入者。利用多级IP日志表来区分设备不同范围的“闯门者”。一旦发现提示范围,将信息发送到多度工程,以抑制受激区域在蜜罐内的扩散。这些统计数据将被发送到蜜罐,以建立一个针对攻击者的保护框架。该策略的优点是,它在不产生任何开销的情况下,在多层提供了针对DDoS的完整屏障。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
自引率
0.00%
发文量
0
审稿时长
8 weeks
期刊最新文献
ENHANCEMENT OF BANDWIDTH AND BEAM FORMING ANTENNA ARRAYS IN 5G CELLULAR COMMUNICATION NETWORKS WIRELESS SENSOR NETWORK FOR SITE SPECIFIC CROP MANAGEMENT FOR PRECISION AGRICULTURE ENHANCEMENT OF DATA MANAGEMENT IN BROADBAND WIRELESS COMMUNICATION SYSTEM USING MOBILITY MANAGEMENT MODEL A SMART RESOURCE UTILIZATION ALGORITHM FOR HIGH SPEED 5G COMMUNICATION NETWORKS BASED ON CLOUD SERVERS SECURITY AND PRIVACY CONCERNS OF INTERNET OF THINGS (IOT) IN THE CLOUD
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1