Computer Science – Networking and Internet Architecture
Scientific paper
2012-02-21
International Journal of Network Security & Its Applications (IJNSA), Vol.4, No.1, January 2012
Computer Science
Networking and Internet Architecture
International Journal of Network Security & Its Applications (IJNSA), Vol.4, No.1, January 2012. arXiv admin note: substantial
Scientific paper
10.5121/ijnsa.2012.4102
The Internet Threat Monitoring (ITM) is an efficient monitoring system used globally to measure, detect, characterize and track threats such as denial of service (DoS) and distributed Denial of Service (DDoS) attacks and worms. . To block the monitoring system in the internet the attackers are targeted the ITM system. In this paper we address the flooding attack of DDoS against ITM monitors to exhaust the network resources, such as bandwidth, computing power, or operating system data structures by sending the malicious traffic. We propose an information-theoretic frame work that models the flooding attacks using Botnet on ITM. One possible way to counter DDoS attacks is to trace the attack sources and punish the perpetrators. we propose a novel traceback method for DDoS using Honeypots. IP tracing through honeypot is a single packet tracing method and is more efficient than commonly used packet marking techniques.
Jyothsna V.
Mohan Reddy Rama A.
Prasad Munivara K.
No associations
LandOfFree
IP Traceback for Flooding attacks on Internet Threat Monitors (ITM) Using Honeypots does not yet have a rating. At this time, there are no reviews or comments for this scientific paper.
If you have personal experience with IP Traceback for Flooding attacks on Internet Threat Monitors (ITM) Using Honeypots, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and IP Traceback for Flooding attacks on Internet Threat Monitors (ITM) Using Honeypots will most certainly appreciate the feedback.
Profile ID: LFWR-SCP-O-422563