The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Terrible network environment is damaging the critical infrastructure and the interests of internet users. In order to ensure the protection and resilience of attack, it is important to better analyze and observe network traffic for discovering anomaly. This paper presents a clustering algorithm by using network-layer and transport-layer statistical feature to classify anomaly traffic. Experiments...
Protecting publicly available servers in internet today is a serious challenge, especially when encountering Distributed denial-of-service (DDoS) attacks. In traditional internet, there is narrow scope of choices one can take when ingress traffic overloads physical connection limits. This paper proposes Firewall as a service in internet service providers (ISP) networks allowing end users to request...
Anomaly traffic detection is one method to detect attack in internet, especially Distributed Denial of Service (DDoS). Here, traffic analysis which reveal the observed traffic pattern is key important process as the anomaly decision was taken based on traffic analysis. This research analyzed several statistical analysis of traffic datasets categorized as normal, DDoS attack and flashcrowd. Analysis...
Distributed-Denial-Of-Service attacks are one of the hardest security issues on the Internet today. One difficulty to counter these attacks is to trace the source of the attacks because they often use spoofed source IP addresses to hide their original source. This paper presents a new IP traceback scheme, called Probabilistic Flow Marking (PFM). The goal is to trace anonymous flooding attacks on the...
Information Centric Networking (ICN) is a new communication paradigm for the upcoming Next Generation Internet (NGI). ICN is an open environment that depends on in-network caching and focuses on contents rather than infrastructures or end-points as in current Internet architectures. These ICN attributes make ICN architectures subject to different types of routing and caching attacks. An attacker sends...
Named-Data Networking (NDN) is a promising architecture for future Internet. Its design, however, can be misused to perform a new DDoS attack known as the Interest Flooding Attack (IFA). In IFA, the attacker issues non-satisfiable interest packets, aiming to drop legitimate interest packets by overwhelming pending interest tables in NDN routers. Prior defence mechanisms are not highly effective, harm...
DoS attacks are significant issues for the Internet. With huge need on internet service provided using large application server, Denial of Service (DoS) attack is developed into a key security issue in the network service provisioning. Flooding attack is one of the major DoS attacks, floods the network traffic abnormally to disturb the internet services which is rendered to users. In addition, worm...
IP spoofing is prevalently used in DDoS attacks for anonymity and amplification, making them harder to prevent. Combating spoofing attacks requires the collaboration of different autonomous systems (ASes). Existing methods either lack flexibility in collaboration or require centralized control in the inter-AS environment. In this paper, we propose a Distributed Collaboration System (DISCS) for inter-AS...
Source IP spoofing is still an endemic challenge despite best practices documents being published more than 13 years ago that would prevent it if all ISPs abided by them. We argue that these approaches failed to gain widespread adoption due to fundamental incentive misalignment. We then propose an SDN-based solution designed to be placed at Internet exchange points by ISPs with the incentives to filter...
Today network security is major problem faced not only by small companies but big giants like Samsung and Google. Traditional architecture of internet is vulnerable to DDoS attacks and it provides an opportunity to an attacker to get access to a great amount of compromised hosts by using their vulnerabilities to create attack networks or Botnets. Although a number of defense techniques and countermeasures...
A large amount of DNS queries ask for error names or error records, and therefore they are negatively answered. Those negative responses, however, are sub optimally cached by today's DNS and DNSSEC. This weakness of negative caching may exhibit low negative cache hit rate so as to be vulnerable to DoS/DDoS attacks utilizing name error queries. This paper proposes a high efficient Negative Caching...
Sony in United States and KHNP in South Korea were hit by a series of cyberattacks late in 2014 that were blamed on North Korea. U.S. president Obama responded strongly and positively as control tower, and led Sony do not surrender to hacker's demand. U.S government demonstrated retaliatory action against North Korea under the proportional principle, blacklisted 3 North Korean entities and 10 officials...
Information-Centric Networking (ICN) is an internetworking paradigm that offers an alternative to the current IP-based Internet architecture. ICN's most distinguishing feature is its emphasis on information (content) instead of communication endpoints. One important open issue in ICN is whether negative acknowledgments (NACKs) at the network layer are useful for notifying downstream nodes about forwarding...
Many users do not realize whether their devices become bots or not. There are many security accidents due to malicious bots. To solve this problem, we propose a monitor system composed of IoT devices to detect bots.
For a successful communication in a LAN network Internet Protocol version 4 (IPv4) has to identify Machine Code Address (MAC) of the target host which was possible via using Address Resolution Protocol (ARP). This is improved in IPv6 in which nodes uses Neighbor Discovery Protocol (NDP) to access MAC address of other nodes. In addition to this it enables accessibility to routers and reachability of...
Denial of Service (DoS) is a hot topic phenomenon lately. The intensity of DoS attacks increasing every day with the discovery of a new attack with the same type which is Distributed Denial of Service (DDoS). Both, attack the victims by flooding a lot of packet to the traffic channels at a time. This makes the flow of packets to the victim's becomes choked and victim do not get the desired package...
Email is one of the most popular Internet ap- plications which enables individuals and organisations alike to communicate and work effectively. However, email has also been used by criminals as a means to commit cybercrimes such as phishing, spamming, cyberbullying and cyberstalking. Cyberstalking is a relatively new surfacing cybercrime, which recently has been recognised as a serious social and...
Digital information has become a social infrastructure and with the expansion of the Internet, network infrastructure has become an indispensable part of social life and industrial activity for mankind. The idea of using existing electronics in smart home appliances and connecting them to the Internet is a new dimension along which technologies continue to grow, and in recent years mankind has witnessed...
Information and Communications Technologies (ICTs), especially the Internet, have become a key enabler for government organisations, businesses and individuals. With increasing growth in the adoption and use of ICT devices such as smart phones, personal computers and the Internet, Cybersecurity is one of the key concerns facing modern organisations in both developed and developing countries. This...
Internet Distributed Denial of Service (DDoS) at- tacks are prevalent but hard to defend against, partially due to the volatility of the attacking methods and patterns used by attackers. Understanding the latest DDoS attacks can provide new insights for effective defense. But most of existing understandings are based on indirect traffic measures (e.g., backscatters) or traffic seen locally. In this...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.