The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Internet of Things (IoT) devices pose a serious threat to the web as poorly configured or faulty devices can be used for massive Distributed Denial of Service attacks. High jacked IoT devices that act like real users are a particular problem that present significant difficulties for traditional detection methods. An adaptive, real time scoring system for detecting such attacks is proposed that does...
Distributed Denial of Service (DDoS) attack has been bringing serious security concerns on banks, finance incorporation, public institutions, and data centers. Also, the emerging wave of Internet of Things (IoT) raises new concerns on the smart devices. Software Defined Networking (SDN) and Network Functions Virtualization (NFV) have provided a new paradigm for network security. In this paper, we...
The paper presents an effective identification method for DDoS attacks and flash crowd in the source-end network. As DDoS attack and flash crowd behavior dramatically increase the number of new (or forged) source IP addresses, the method firstly construct a time series by counting the number of new (or forged) IP addresses in the monitored local area network, and use VTP (variance-time plots) method...
This paper tries to shed more light on Mirai malware, with an aim to facilitate its easier detection and prevention. This malware was used in several recent high profile DDoS attacks. Mirai is used to create and control botnet of IoT devices. The code of this malware is analysed and explanation of its parts provided. Virtual environment for dynamic analysis of Mirai is created. Special settings that...
The Mirai botnet and its variants and imitators are a wake-up call to the industry to better secure Internet of Things devices or risk exposing the Internet infrastructure to increasingly disruptive distributed denial-of-service attacks.
Combating the growing threat to banks of distributed denial-of-service attacks will demand more than keeping pace in a technological arms race; it will also require greater information sharing among banks and other cybersecurity entities.
This study utilizes the open source testing tool, Hping3, and the network analysis tool, Scapy, to simulate DDoS flood, reflection, and amplification attacks. We used the data generated from the attacks with the Splunk platform to conduct data analysis to quickly identify attacks and predict potential dangers that could arise. The analysis results were used in tests conducted on real network environments...
Cloud computing has started to gain acceptance for adoption and implementation among organizations, however, this new technology area has already started to deal with security, performance and availability challenges. Within Cloud Security issues being paramount for the corporates, private enterprises, the denial of service attacks are rated as the highest priority threat to the cloud environments...
Securing communication is a comprehensive challenge due to the increasing of threats and attacks to network security. By knowing the various of threats and attacks, we can collect broad data from the network, by using honeypot. Implemented honeypot uses low-interaction type that is honeyd and other supporting software such as apache2 and bind9. Based on the research, honeypot is successfully giving...
The aim of research is to increase the network attack detection accuracy by means of fuzzy logic. This paper considers an approach to intrusion detection using fuzzy logic. The approach is based on network monitoring of the variables characteristic of different network anomalies, such as ratio of the incoming traffic to the outgoing, packet size, etc. Every type of menace is characterized by a vector...
In recent years, the mobile ad hoc network (MANET) has spread to many sectors, such as education and the military. A MANET is a self-configuring and spontaneous network that is established without any administrative management and without fixed infrastructure. Due to its nature, a MANET becomes vulnerable to many attacks, and in particular, Denial of Service (DoS). DoS overwhelm the network and deprive...
In order to solve the problem of distributed denial of service (DDoS) attack for cloud computing, a DDoS attack detection algorithm was proposed based on feature analysis and Kalman filter. According to the difference of the frequency of accessing the cloud servers between ordinary users and distributed denial of service attacks user, the behavioral features were used as the detection objects. The...
Distributed Denial of Service attacks generally require a botmaster controlling a large number of infected systems (bots) in order to take down a target service. However, more recent DDoS attacks targeting at the HTTP layer can be very effective even with a small number of infected bots. In this paper we analyze DDoS attacks which require only a small number of bots to render a web server unavailable...
The outage of Critical Infrastructures (CI) can have devastating impacts on our society, economic welfare and political stability. One risk that is often encountered in critical infrastructure sectors is its high dependence on ICT components and the complex interdependencies between shared services. Recent cyber attacks (such as Stuxnet, Flame, Gauss) outline the high vulnerability of ICT components...
Distributed Denial of Service attacks of today present a difficult challenge to the network administrators as well as to the users of the Internet. Distributed Denial of Service war field launched by hackers using malicious botnets are evolving day by day. As new countermeasures are developed or mitigate Distributed Denial of Service attacks, attackers are constantly developing new methods to circumvent...
Popularity of application services offered by Internet has grown a lot in recent years. Basically, Internet was built with the focus on its functionality and not with the focus on the security tasks. This has led to discovering embedded weaknesses in Internet architecture, which can be misused by attackers with malicious purposes. This paper focuses on application layer Denial of Service (DoS) and...
How to effectively resist DoS/DDoS (Distributed Denial of Service) attacks is one of the primary issues for Internet security. This paper studies non-invasive types of DoS/DDoS attacks, which attacks against servers via protocol-compliant and legitimate application-layer requests. Attackers use some special service requests, which require high processing complexity, to overwhelm the servers' resources...
Distributed denial of service (DDoS) attack is one of the major threats to the current Internet. It is challenging to detect DDoS attacks accurately and quickly. We propose a novel IP Flow Interaction Feature algorithm (FIF) based on multiple features of DDoS attack flows via IP addresses and ports. To increase the detection accuracy in various conditions, we describe the state characteristics of...
DoS(Denial of Service) or DDoS(Distributed DoS) attack is a major threaten and the most difficult problem to solve among many attacks. Moreover, it is very difficult to find a real origin of attackers because DoS/DDoS attacker uses spoofed IP addresses. To solve this problem, we propose a probabilistic route selection algorithm to trace the attacker's real origin. This algorithm uses three types of...
DDoS (Distributed Denial of Service) attack utilizes sufficient puppet computers to create amount of data packets. It can use DoS attack to assault one or more targets, exhaust the resources of injured end then to bereave the regular services. This article is to elaborate the formative principle of DDoS, analyze the security precautions and bring the defense frame.
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.