{"title":"防范雾计算中DDoS攻击的IP欺骗检测","authors":"Amakan Elisha Agoni, M. Dlodlo","doi":"10.1109/GWS.2018.8686626","DOIUrl":null,"url":null,"abstract":"One of the biggest security threats to the availability of service in Fog Computing has been identified as Distributed Denial of Service (DDoS), whose attributes include IP address spoofing. In this paper, various methods for identifying spoofed IP packets in Fog Computing are discussed. In order to match the Operating System (OS) of incoming packet from its database, we proposed a Host-Based OS fingerprinting that uses both active and passive technique. Consequently, the proposed technique was implemented using the Xen Cloud Platform (XCP).","PeriodicalId":256742,"journal":{"name":"2018 Global Wireless Summit (GWS)","volume":"69 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"7","resultStr":"{\"title\":\"IP Spoofing Detection for Preventing DDoS Attack in Fog Computing\",\"authors\":\"Amakan Elisha Agoni, M. Dlodlo\",\"doi\":\"10.1109/GWS.2018.8686626\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"One of the biggest security threats to the availability of service in Fog Computing has been identified as Distributed Denial of Service (DDoS), whose attributes include IP address spoofing. In this paper, various methods for identifying spoofed IP packets in Fog Computing are discussed. In order to match the Operating System (OS) of incoming packet from its database, we proposed a Host-Based OS fingerprinting that uses both active and passive technique. Consequently, the proposed technique was implemented using the Xen Cloud Platform (XCP).\",\"PeriodicalId\":256742,\"journal\":{\"name\":\"2018 Global Wireless Summit (GWS)\",\"volume\":\"69 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2018-11-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"7\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2018 Global Wireless Summit (GWS)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/GWS.2018.8686626\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2018 Global Wireless Summit (GWS)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/GWS.2018.8686626","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
IP Spoofing Detection for Preventing DDoS Attack in Fog Computing
One of the biggest security threats to the availability of service in Fog Computing has been identified as Distributed Denial of Service (DDoS), whose attributes include IP address spoofing. In this paper, various methods for identifying spoofed IP packets in Fog Computing are discussed. In order to match the Operating System (OS) of incoming packet from its database, we proposed a Host-Based OS fingerprinting that uses both active and passive technique. Consequently, the proposed technique was implemented using the Xen Cloud Platform (XCP).