首页 > 最新文献

Research Anthology on Combating Denial-of-Service Attacks最新文献

英文 中文
Detecting DDoS Attacks on Multiple Network Hosts 检测多网络主机的DDoS攻击
Pub Date : 1900-01-01 DOI: 10.4018/978-1-5225-8304-2.CH006
Konstantinos F. Xylogiannopoulos, P. Karampelas, R. Alhajj
The proliferation of low security internet of things devices has widened the range of weapons that malevolent users can utilize in order to attack legitimate services in new ways. In the recent years, apart from very large volumetric distributed denial of service attacks, low and slow attacks initiated from intelligent bot networks have been detected to target multiple hosts in a network in a timely fashion. However, even if the attacks seem to be “innocent” at the beginning, they generate huge traffic in the network without practically been detected by the traditional DDoS attack detection methods. In this chapter, an advanced pattern detection method is presented that is able to collect and classify in real time all the incoming traffic and detect a developing slow and low DDoS attack by monitoring the traffic in all the hosts of the network. The experimental analysis on a real dataset provides useful insights about the effectiveness of the method by identifying not only the main source of attack but also secondary sources that produce low traffic, targeting though multiple hosts.
低安全性物联网设备的激增扩大了恶意用户可以利用的武器范围,以便以新的方式攻击合法服务。近年来,除了非常大容量的分布式拒绝服务攻击外,还发现了智能bot网络发起的针对网络中多台主机的慢速慢速攻击。然而,即使这些攻击在一开始看起来是“无辜的”,但它们在网络中产生了巨大的流量,而传统的DDoS攻击检测方法实际上并没有检测到它们。在本章中,我们提出了一种先进的模式检测方法,通过对网络中所有主机的流量进行监控,实时收集和分类所有传入的流量,检测出正在发展的慢速低流量DDoS攻击。对真实数据集的实验分析提供了关于该方法有效性的有用见解,不仅可以识别主要攻击源,还可以识别产生低流量的次要来源,通过多个主机进行攻击。
{"title":"Detecting DDoS Attacks on Multiple Network Hosts","authors":"Konstantinos F. Xylogiannopoulos, P. Karampelas, R. Alhajj","doi":"10.4018/978-1-5225-8304-2.CH006","DOIUrl":"https://doi.org/10.4018/978-1-5225-8304-2.CH006","url":null,"abstract":"The proliferation of low security internet of things devices has widened the range of weapons that malevolent users can utilize in order to attack legitimate services in new ways. In the recent years, apart from very large volumetric distributed denial of service attacks, low and slow attacks initiated from intelligent bot networks have been detected to target multiple hosts in a network in a timely fashion. However, even if the attacks seem to be “innocent” at the beginning, they generate huge traffic in the network without practically been detected by the traditional DDoS attack detection methods. In this chapter, an advanced pattern detection method is presented that is able to collect and classify in real time all the incoming traffic and detect a developing slow and low DDoS attack by monitoring the traffic in all the hosts of the network. The experimental analysis on a real dataset provides useful insights about the effectiveness of the method by identifying not only the main source of attack but also secondary sources that produce low traffic, targeting though multiple hosts.","PeriodicalId":417372,"journal":{"name":"Research Anthology on Combating Denial-of-Service Attacks","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128340980","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Association Rule-Mining-Based Intrusion Detection System With Entropy-Based Feature Selection 基于熵特征选择的关联规则挖掘入侵检测系统
Pub Date : 1900-01-01 DOI: 10.4018/978-1-7998-1290-6.ch001
D. Sellappan, R. Srinivasan
Intrusion detection system (IDSs) are important to industries and organizations to solve the problems of networks, and various classifiers are used to classify the activity as malicious or normal. Today, the security has become a decisive part of any industrial and organizational information system. This chapter demonstrates an association rule-mining algorithm for detecting various network intrusions. The KDD dataset is used for experimentation. There are three input features classified as basic features, content features, and traffic features. There are several attacks are present in the dataset which are classified into Denial of Service (DoS), Probe, Remote to Local (R2L), and User to Root (U2R). The proposed method gives significant improvement in the detection rates compared with other methods. Association rule mining algorithm is proposed to evaluate the KDD dataset and dynamic data to improve the efficiency, reduce the false positive rate (FPR) and provides less time for processing.
入侵检测系统(ids)是行业和组织解决网络问题的重要手段,使用各种分类器将活动分为恶意活动和正常活动。如今,安全已成为任何工业和组织信息系统的决定性组成部分。本章演示了一种用于检测各种网络入侵的关联规则挖掘算法。KDD数据集用于实验。输入特征分为基本特征、内容特征和流量特征三种。数据集中存在几种攻击,分为拒绝服务(DoS),探测,远程到本地(R2L)和用户到根(U2R)。与其他方法相比,该方法在检测率上有显著提高。提出了关联规则挖掘算法对KDD数据集和动态数据进行评估,提高了效率,降低了误报率(FPR),减少了处理时间。
{"title":"Association Rule-Mining-Based Intrusion Detection System With Entropy-Based Feature Selection","authors":"D. Sellappan, R. Srinivasan","doi":"10.4018/978-1-7998-1290-6.ch001","DOIUrl":"https://doi.org/10.4018/978-1-7998-1290-6.ch001","url":null,"abstract":"Intrusion detection system (IDSs) are important to industries and organizations to solve the problems of networks, and various classifiers are used to classify the activity as malicious or normal. Today, the security has become a decisive part of any industrial and organizational information system. This chapter demonstrates an association rule-mining algorithm for detecting various network intrusions. The KDD dataset is used for experimentation. There are three input features classified as basic features, content features, and traffic features. There are several attacks are present in the dataset which are classified into Denial of Service (DoS), Probe, Remote to Local (R2L), and User to Root (U2R). The proposed method gives significant improvement in the detection rates compared with other methods. Association rule mining algorithm is proposed to evaluate the KDD dataset and dynamic data to improve the efficiency, reduce the false positive rate (FPR) and provides less time for processing.","PeriodicalId":417372,"journal":{"name":"Research Anthology on Combating Denial-of-Service Attacks","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123161074","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Inevitable Battle Against Botnets 与僵尸网络不可避免的战斗
Pub Date : 1900-01-01 DOI: 10.4018/978-1-5225-8976-1.CH005
Ibrahim Firat
It is undeniable that technology is developing and growing at an unstoppable pace. Technology has become a part of people's daily lives. It has been used for many purposes but mainly to make human life easier. In addition to being useful, these advancements in technology have some bad consequences. A new malware called botnet has recently emerged. It is considered to be one of the most important and dangerous cyber security problems as it is not well understood and evolves quickly. Communication of bots between each other and their botmaster results in the formation of botnet; this is also known as a zombie army. As botnets become popular among cybercriminals, more studies have been done in botnet detection area. Researchers have developed new detection mechanisms in order to understand and tackle this growing botnet issue. This chapter aims to review working principles of botnets and botnet detection mechanisms in order to increase general knowledge about botnets.
不可否认,技术正在以不可阻挡的速度发展和成长。科技已经成为人们日常生活的一部分。它被用于许多目的,但主要是为了使人类的生活更容易。除了有用之外,这些技术进步也有一些不好的后果。最近出现了一种名为“僵尸网络”的新型恶意软件。它被认为是最重要和最危险的网络安全问题之一,因为它没有很好地理解和发展迅速。机器人之间的通信和它们的僵尸主机导致僵尸网络的形成;这也被称为僵尸军队。随着僵尸网络在网络犯罪中的流行,僵尸网络检测领域的研究越来越多。研究人员已经开发了新的检测机制,以了解和解决这个日益增长的僵尸网络问题。本章旨在回顾僵尸网络的工作原理和僵尸网络检测机制,以增加对僵尸网络的一般知识。
{"title":"Inevitable Battle Against Botnets","authors":"Ibrahim Firat","doi":"10.4018/978-1-5225-8976-1.CH005","DOIUrl":"https://doi.org/10.4018/978-1-5225-8976-1.CH005","url":null,"abstract":"It is undeniable that technology is developing and growing at an unstoppable pace. Technology has become a part of people's daily lives. It has been used for many purposes but mainly to make human life easier. In addition to being useful, these advancements in technology have some bad consequences. A new malware called botnet has recently emerged. It is considered to be one of the most important and dangerous cyber security problems as it is not well understood and evolves quickly. Communication of bots between each other and their botmaster results in the formation of botnet; this is also known as a zombie army. As botnets become popular among cybercriminals, more studies have been done in botnet detection area. Researchers have developed new detection mechanisms in order to understand and tackle this growing botnet issue. This chapter aims to review working principles of botnets and botnet detection mechanisms in order to increase general knowledge about botnets.","PeriodicalId":417372,"journal":{"name":"Research Anthology on Combating Denial-of-Service Attacks","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122300364","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Denial-of-Service and Botnet Analysis, Detection, and Mitigation 拒绝服务和僵尸网络分析、检测和缓解
Pub Date : 1900-01-01 DOI: 10.4018/978-1-5225-9554-0.CH005
Sobana Sikkanan, Kasthuri M.
The internet is designed for processing and forwarding of any packet in a best effort manner. The packets carried by the internet may be malicious or not. Most of the time, internet architecture provides an unregulated path to victims. Denial-of-service (DoS) attack is the most common critical threat that causes devastating effects on the internet. The Botnet-based DoS attack aims to exhaust both the target resources and network bandwidth, thereby making the network resources unavailable for its valid users. The resources are utilized by either injecting a computer virus or flooding the network with useless traffic. This chapter provides a systematic analysis of the causes of DoS attacks, including motivations and history, analysis of different attacks, detection and protection techniques, various mitigation techniques, the limitations and challenges of DoS research areas. Finally, this chapter discusses some important research directions which will need more attention in the near future to guarantee the successful defense against DoS attacks.
因特网的设计是为了尽可能地处理和转发任何数据包。互联网上携带的数据包可能是恶意的,也可能不是。大多数时候,互联网架构为受害者提供了一条不受监管的途径。拒绝服务(DoS)攻击是对互联网造成毁灭性影响的最常见的严重威胁。基于僵尸网络的DoS攻击的目的是耗尽目标资源和网络带宽,使其合法用户无法使用网络资源。通过注入计算机病毒或用无用的流量淹没网络来利用这些资源。本章系统分析了DoS攻击的原因,包括动机和历史,分析了不同的攻击,检测和保护技术,各种缓解技术,DoS研究领域的局限性和挑战。最后,本章讨论了今后需要关注的一些重要研究方向,以确保成功防御DoS攻击。
{"title":"Denial-of-Service and Botnet Analysis, Detection, and Mitigation","authors":"Sobana Sikkanan, Kasthuri M.","doi":"10.4018/978-1-5225-9554-0.CH005","DOIUrl":"https://doi.org/10.4018/978-1-5225-9554-0.CH005","url":null,"abstract":"The internet is designed for processing and forwarding of any packet in a best effort manner. The packets carried by the internet may be malicious or not. Most of the time, internet architecture provides an unregulated path to victims. Denial-of-service (DoS) attack is the most common critical threat that causes devastating effects on the internet. The Botnet-based DoS attack aims to exhaust both the target resources and network bandwidth, thereby making the network resources unavailable for its valid users. The resources are utilized by either injecting a computer virus or flooding the network with useless traffic. This chapter provides a systematic analysis of the causes of DoS attacks, including motivations and history, analysis of different attacks, detection and protection techniques, various mitigation techniques, the limitations and challenges of DoS research areas. Finally, this chapter discusses some important research directions which will need more attention in the near future to guarantee the successful defense against DoS attacks.","PeriodicalId":417372,"journal":{"name":"Research Anthology on Combating Denial-of-Service Attacks","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115486606","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Botnet and Internet of Things (IoTs) 僵尸网络和物联网(iot)
Pub Date : 1900-01-01 DOI: 10.4018/978-1-5225-9742-1.CH013
Kamal Alieyan, Ammar Almomani, R. Abdullah, Badr Almutairi, Mohammad Alauthman
In today's internet world the internet of things (IoT) is becoming the most significant and developing technology. The primary goal behind the IoT is enabling more secure existence along with the improvement of risks at various life levels. With the arrival of IoT botnets, the perspective towards IoT products has transformed from enhanced living enabler into the internet of vulnerabilities for cybercriminals. Of all the several types of malware, botnet is considered as really a serious risk that often happens in cybercrimes and cyber-attacks. Botnet performs some predefined jobs and that too in some automated fashion. These attacks mostly occur in situations like phishing against any critical targets. Files sharing channel information are moved to DDoS attacks. IoT botnets have subjected two distinct problems, firstly, on the public internet. Most of the IoT devices are easily accessible. Secondly, in the architecture of most of the IoT units, security is usually a reconsideration. This particular chapter discusses IoT, botnet in IoT, and various botnet detection techniques available in IoT.
在当今的互联网世界中,物联网(IoT)正在成为最重要和发展的技术。物联网背后的主要目标是实现更安全的存在,同时改善各种生活水平的风险。随着物联网僵尸网络的到来,对物联网产品的看法已经从增强的生活推动者转变为网络犯罪分子的脆弱性。在各种类型的恶意软件中,僵尸网络被认为是真正的严重风险,经常发生在网络犯罪和网络攻击中。僵尸网络执行一些预定义的工作,也以某种自动化的方式。这些攻击主要发生在针对任何关键目标的网络钓鱼等情况下。共享通道信息的文件被转移到DDoS攻击中。物联网僵尸网络面临两个截然不同的问题,首先是在公共互联网上。大多数物联网设备都很容易访问。其次,在大多数物联网单元的架构中,安全性通常是一个重新考虑的问题。本章讨论了物联网、物联网中的僵尸网络以及物联网中可用的各种僵尸网络检测技术。
{"title":"Botnet and Internet of Things (IoTs)","authors":"Kamal Alieyan, Ammar Almomani, R. Abdullah, Badr Almutairi, Mohammad Alauthman","doi":"10.4018/978-1-5225-9742-1.CH013","DOIUrl":"https://doi.org/10.4018/978-1-5225-9742-1.CH013","url":null,"abstract":"In today's internet world the internet of things (IoT) is becoming the most significant and developing technology. The primary goal behind the IoT is enabling more secure existence along with the improvement of risks at various life levels. With the arrival of IoT botnets, the perspective towards IoT products has transformed from enhanced living enabler into the internet of vulnerabilities for cybercriminals. Of all the several types of malware, botnet is considered as really a serious risk that often happens in cybercrimes and cyber-attacks. Botnet performs some predefined jobs and that too in some automated fashion. These attacks mostly occur in situations like phishing against any critical targets. Files sharing channel information are moved to DDoS attacks. IoT botnets have subjected two distinct problems, firstly, on the public internet. Most of the IoT devices are easily accessible. Secondly, in the architecture of most of the IoT units, security is usually a reconsideration. This particular chapter discusses IoT, botnet in IoT, and various botnet detection techniques available in IoT.","PeriodicalId":417372,"journal":{"name":"Research Anthology on Combating Denial-of-Service Attacks","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115309820","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Denial of Service Attack on Protocols for Smart Grid Communications 智能电网通信协议的拒绝服务攻击
Pub Date : 1900-01-01 DOI: 10.4018/978-1-5225-1829-7.CH003
Swapnoneel Roy
In this work, a denial of service (DoS) attack known as the clogging attack has been performed on three different modern protocols for smart grid (SG) communications. The first protocol provides authentication between smart meters (SM) and a security and authentication server (SAS). The second protocol facilitates secure and private communications between electric vehicles (EV) and the smart grid. The third protocol is a secure and efficient key distribution protocol for the smart grid. The protocols differ in either their applications (authentication, key distribution), or their ways of communications (usage of encryption, hashes, timestamps etc.). But they are similar in their purpose of design (for the smart grid) and their usage of computationally intensive mathematical operations (modular exponentiation, ECC) to implement security. Solutions to protect these protocols against this attack are then illustrated along with identifying the causes behind the occurrence of this vulnerability in SG communication protocols in general.
在这项工作中,被称为阻塞攻击的拒绝服务(DoS)攻击已经在智能电网(SG)通信的三种不同的现代协议上执行。第一种协议提供智能电表(SM)与安全和身份验证服务器(SAS)之间的身份验证。第二个协议促进了电动汽车(EV)和智能电网之间的安全和私人通信。第三种协议是一种安全高效的智能电网密钥分发协议。这些协议在应用程序(身份验证、密钥分发)或通信方式(加密、散列、时间戳等的使用)方面有所不同。但它们在设计目的(智能电网)和使用计算密集型数学运算(模块化幂运算,ECC)来实现安全性方面是相似的。然后说明了保护这些协议免受此攻击的解决方案,并确定了SG通信协议中通常出现此漏洞的原因。
{"title":"Denial of Service Attack on Protocols for Smart Grid Communications","authors":"Swapnoneel Roy","doi":"10.4018/978-1-5225-1829-7.CH003","DOIUrl":"https://doi.org/10.4018/978-1-5225-1829-7.CH003","url":null,"abstract":"In this work, a denial of service (DoS) attack known as the clogging attack has been performed on three different modern protocols for smart grid (SG) communications. The first protocol provides authentication between smart meters (SM) and a security and authentication server (SAS). The second protocol facilitates secure and private communications between electric vehicles (EV) and the smart grid. The third protocol is a secure and efficient key distribution protocol for the smart grid. The protocols differ in either their applications (authentication, key distribution), or their ways of communications (usage of encryption, hashes, timestamps etc.). But they are similar in their purpose of design (for the smart grid) and their usage of computationally intensive mathematical operations (modular exponentiation, ECC) to implement security. Solutions to protect these protocols against this attack are then illustrated along with identifying the causes behind the occurrence of this vulnerability in SG communication protocols in general.","PeriodicalId":417372,"journal":{"name":"Research Anthology on Combating Denial-of-Service Attacks","volume":"65 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130881968","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
UWDBCSN Analysis During Node Replication Attack in WSN WSN节点复制攻击中的UWDBCSN分析
Pub Date : 1900-01-01 DOI: 10.4018/978-1-5225-5152-2.CH011
Harpreet Kaur, S. Saxena
Wireless sensor network is an emerging area in which multiple sensor nodes are present to perform many real-time applications like military application, industrialized automation, health monitoring, weather forecast, etc. Sensor nodes can be organized into a group which is led by a cluster head; this concept is known as clustering. Clustering of wireless sensor network is used when sensor nodes want to communicate simultaneously in a single network. The author organizes the sensor nodes by applying UWDBCSN (underwater density-based clustering sensor network) clustering approach in which routing of the packets is controlled by cluster head. The author also considers the security of sensor nodes which are harmful to different types of mischievous attacks like wormhole attack, denial of service attack, replication or cloning attack, blackhole attack, etc. Node replication is one of the types in which an attacker tries to capture the node and generate the replica or clone of that node in the same network. So, this chapter describes how to deal with these types of attacks. The author used the intrusion detection process to deal with this type of attack. All the detection procedure is combined with sleep/wake scheduling algorithm to increase the performance of sensor nodes in the network.
无线传感器网络是一个新兴的领域,其中多个传感器节点存在,以执行许多实时应用,如军事应用,工业自动化,健康监测,天气预报等。传感器节点可以被组织成一个由簇头领导的组;这个概念被称为集群。无线传感器网络的聚类是指传感器节点在单个网络中同时通信的情况。采用由簇头控制数据包路由的水下密度聚类传感器网络(UWDBCSN)聚类方法对传感器节点进行组织。作者还考虑了传感器节点的安全性,它对虫洞攻击、拒绝服务攻击、复制或克隆攻击、黑洞攻击等不同类型的恶意攻击都是有害的。节点复制是攻击者试图捕获节点并在同一网络中生成该节点的副本或克隆的类型之一。因此,本章将介绍如何处理这些类型的攻击。作者使用入侵检测过程来处理这类攻击。所有的检测过程都与睡眠/唤醒调度算法相结合,以提高网络中传感器节点的性能。
{"title":"UWDBCSN Analysis During Node Replication Attack in WSN","authors":"Harpreet Kaur, S. Saxena","doi":"10.4018/978-1-5225-5152-2.CH011","DOIUrl":"https://doi.org/10.4018/978-1-5225-5152-2.CH011","url":null,"abstract":"Wireless sensor network is an emerging area in which multiple sensor nodes are present to perform many real-time applications like military application, industrialized automation, health monitoring, weather forecast, etc. Sensor nodes can be organized into a group which is led by a cluster head; this concept is known as clustering. Clustering of wireless sensor network is used when sensor nodes want to communicate simultaneously in a single network. The author organizes the sensor nodes by applying UWDBCSN (underwater density-based clustering sensor network) clustering approach in which routing of the packets is controlled by cluster head. The author also considers the security of sensor nodes which are harmful to different types of mischievous attacks like wormhole attack, denial of service attack, replication or cloning attack, blackhole attack, etc. Node replication is one of the types in which an attacker tries to capture the node and generate the replica or clone of that node in the same network. So, this chapter describes how to deal with these types of attacks. The author used the intrusion detection process to deal with this type of attack. All the detection procedure is combined with sleep/wake scheduling algorithm to increase the performance of sensor nodes in the network.","PeriodicalId":417372,"journal":{"name":"Research Anthology on Combating Denial-of-Service Attacks","volume":"195 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130661608","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Distributed Denial of Service Attacks and Defense in Cloud Computing 云计算中的分布式拒绝服务攻击与防御
Pub Date : 1900-01-01 DOI: 10.4018/978-1-5225-7335-7.CH003
Gopal Singh Kushwah, V. Ranga
Cloud computing has now become a part of many businesses. It provides on-demand resources to its users based on pay-as-you-use policy, across the globe. The high availability feature of this technology is affected by distributed denial of service (DDoS) attack, which is a major security issue. In this attack, cloud or network resources are exhausted, resulting in a denial of service for legitimate users. In this chapter, a classification of various types of DDoS attacks has been presented, and techniques for defending these attacks in cloud computing have been discussed. A discussion on challenges and open issues in this area is also given. Finally, a conceptual model based on extreme learning machine has been proposed to defend these attacks.
云计算现在已经成为许多企业的一部分。它在全球范围内根据按需付费的策略为用户提供按需资源。该技术的高可用性受到分布式拒绝服务(DDoS)攻击的影响,是一个主要的安全问题。在这种攻击中,耗尽云或网络资源,导致合法用户拒绝服务。在本章中,对各种类型的DDoS攻击进行了分类,并讨论了在云计算中防御这些攻击的技术。本文还讨论了这一领域的挑战和悬而未决的问题。最后,提出了一种基于极限学习机的概念模型来防御这些攻击。
{"title":"Distributed Denial of Service Attacks and Defense in Cloud Computing","authors":"Gopal Singh Kushwah, V. Ranga","doi":"10.4018/978-1-5225-7335-7.CH003","DOIUrl":"https://doi.org/10.4018/978-1-5225-7335-7.CH003","url":null,"abstract":"Cloud computing has now become a part of many businesses. It provides on-demand resources to its users based on pay-as-you-use policy, across the globe. The high availability feature of this technology is affected by distributed denial of service (DDoS) attack, which is a major security issue. In this attack, cloud or network resources are exhausted, resulting in a denial of service for legitimate users. In this chapter, a classification of various types of DDoS attacks has been presented, and techniques for defending these attacks in cloud computing have been discussed. A discussion on challenges and open issues in this area is also given. Finally, a conceptual model based on extreme learning machine has been proposed to defend these attacks.","PeriodicalId":417372,"journal":{"name":"Research Anthology on Combating Denial-of-Service Attacks","volume":"70 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116624300","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Cyber-Physical System and Internet of Things Security 网络物理系统与物联网安全
Pub Date : 1900-01-01 DOI: 10.4018/978-1-7998-5348-0.ch018
Thomas Ulz, Sarah Haas, C. Steger
An increase of distributed denial-of-service (DDoS) attacks launched by botnets such as Mirai has raised public awareness regarding potential security weaknesses in the Internet of Things (IoT). Devices are an attractive target for attackers because of their large number and due to most devices being online 24/7. In addition, many traditional security mechanisms are not applicable for resource constraint IoT devices. The importance of security for cyber-physical systems (CPS) is even higher, as most systems process confidential data or control a physical process that could be harmed by attackers. While industrial IoT is a hot topic in research, not much focus is put on ensuring information security. Therefore, this paper intends to give an overview of current research regarding the security of data in industrial CPS. In contrast to other surveys, this work will provide an overview of the big CPS security picture and not focus on special aspects.
随着Mirai等僵尸网络发起的分布式拒绝服务(DDoS)攻击的增加,人们对物联网(IoT)潜在安全漏洞的认识日益提高。对于攻击者来说,设备是一个有吸引力的目标,因为它们的数量很大,而且大多数设备都是全天候在线的。此外,许多传统的安全机制并不适用于资源受限的物联网设备。网络物理系统(CPS)安全的重要性甚至更高,因为大多数系统处理机密数据或控制可能被攻击者破坏的物理过程。虽然工业物联网是一个研究热点,但信息安全问题却没有得到太多关注。因此,本文拟对工业CPS中数据安全的研究现状进行概述。与其他调查相比,这项工作将提供一个大的CPS安全图景的概述,而不是专注于特定方面。
{"title":"Cyber-Physical System and Internet of Things Security","authors":"Thomas Ulz, Sarah Haas, C. Steger","doi":"10.4018/978-1-7998-5348-0.ch018","DOIUrl":"https://doi.org/10.4018/978-1-7998-5348-0.ch018","url":null,"abstract":"An increase of distributed denial-of-service (DDoS) attacks launched by botnets such as Mirai has raised public awareness regarding potential security weaknesses in the Internet of Things (IoT). Devices are an attractive target for attackers because of their large number and due to most devices being online 24/7. In addition, many traditional security mechanisms are not applicable for resource constraint IoT devices. The importance of security for cyber-physical systems (CPS) is even higher, as most systems process confidential data or control a physical process that could be harmed by attackers. While industrial IoT is a hot topic in research, not much focus is put on ensuring information security. Therefore, this paper intends to give an overview of current research regarding the security of data in industrial CPS. In contrast to other surveys, this work will provide an overview of the big CPS security picture and not focus on special aspects.","PeriodicalId":417372,"journal":{"name":"Research Anthology on Combating Denial-of-Service Attacks","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132130952","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Security in IoT Devices 物联网设备的安全性
Pub Date : 1900-01-01 DOI: 10.4018/978-1-5225-2296-6.CH005
N. Jeyanthi, Shreyansh Banthia, Akhil Sharma
An attempt to do a comparison between the various DDoS attack types that exist by analysing them in various categories that can be formed, to provide a more comprehensive view of the problem that DDoS poses to the internet infrastructure today. Then DDoS and its relevance with respect to IoT (Internet of Things) devices are analysed where attack types have been explained and possible solutions available are analysed. This chapter does not propose any new solutions to mitigating the effects of DDoS attacks but just provides a general survey of the prevailing attack types along with analysis of the underlying structures that make these attacks possible, which would help researchers in understanding the DDoS problem better.
本文试图对存在的各种DDoS攻击类型进行比较,通过分析它们可以形成的各种类别,以提供DDoS对当今互联网基础设施造成的问题的更全面的看法。然后分析DDoS及其与IoT(物联网)设备的相关性,其中解释了攻击类型并分析了可能的解决方案。本章没有提出任何新的解决方案来减轻DDoS攻击的影响,而只是提供了一个普遍的攻击类型的调查,并分析了使这些攻击成为可能的底层结构,这将有助于研究人员更好地理解DDoS问题。
{"title":"Security in IoT Devices","authors":"N. Jeyanthi, Shreyansh Banthia, Akhil Sharma","doi":"10.4018/978-1-5225-2296-6.CH005","DOIUrl":"https://doi.org/10.4018/978-1-5225-2296-6.CH005","url":null,"abstract":"An attempt to do a comparison between the various DDoS attack types that exist by analysing them in various categories that can be formed, to provide a more comprehensive view of the problem that DDoS poses to the internet infrastructure today. Then DDoS and its relevance with respect to IoT (Internet of Things) devices are analysed where attack types have been explained and possible solutions available are analysed. This chapter does not propose any new solutions to mitigating the effects of DDoS attacks but just provides a general survey of the prevailing attack types along with analysis of the underlying structures that make these attacks possible, which would help researchers in understanding the DDoS problem better.","PeriodicalId":417372,"journal":{"name":"Research Anthology on Combating Denial-of-Service Attacks","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129305999","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
期刊
Research Anthology on Combating Denial-of-Service Attacks
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1