Computer Science – Networking and Internet Architecture
Scientific paper
2012-01-12
International Journal of Computer Science & Information Technology (IJCSIT) Vol 3, No 6, Dec 2011, 159-172
Computer Science
Networking and Internet Architecture
Scientific paper
10.5121/ijcsit.2011.3612
The Internet Threat Monitoring (ITM),is a globally scoped Internet monitoring system whose goal is to measure, detect, characterize, and track threats such as distribute denial of service(DDoS) attacks and worms. To block the monitoring system in the internet the attackers are targeted the ITM system. In this paper we address flooding attack against ITM system in which the attacker attempt to exhaust the network and ITM's resources, such as network bandwidth, computing power, or operating system data structures by sending the malicious traffic. We propose an information-theoretic frame work that models the flooding attacks using Botnet on ITM. Based on this model we generalize the flooding attacks and propose an effective attack detection using Honeypots.
Karthik Ganesh M.
Mohan Reddy Rama A.
Prasad Munivara K.
No associations
LandOfFree
Flooding attacks to internet threat monitors (ITM): Modeling and counter measures using botnet and honeypots does not yet have a rating. At this time, there are no reviews or comments for this scientific paper.
If you have personal experience with Flooding attacks to internet threat monitors (ITM): Modeling and counter measures using botnet and honeypots, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Flooding attacks to internet threat monitors (ITM): Modeling and counter measures using botnet and honeypots will most certainly appreciate the feedback.
Profile ID: LFWR-SCP-O-151586