A denial-of-service resistant intrusion detection architecture
نویسندگان
چکیده
منابع مشابه
A denial-of-service resistant intrusion detection architecture
As the capabilities of intrusion detection systems (IDSs) advance, attackers may disable organizations’ IDSs before attempting to penetrate more valuable targets. To counter this threat, we present an IDS architecture that is resistant to denial-of-service attacks. The architecture frustrates attackers by making IDS components invisible to attackers’ normal means of “seeing” in a network. Upon ...
متن کاملA Denial of Service Resistant Intrusion Dection Architecture
As the capabilities of intrusion detection systems (IDSs) advance, attackers may disable organizations’ IDSs before attempting to penetrate more valuable targets. To counter this threat, we present an IDS architecture that is resistant to denial-of-service attacks. The architecture frustrates attackers by making IDS components invisible to attackers’ normal means of “seeing” in a network. Upon ...
متن کاملNetwork Intrusion Detection and Mitigation Against Denial of Service Attack
The growing use of Internet service in the past few years have facilitated an increase in the denial of service (DoS) attacks. Despite the best preventative measures, DoS attacks have been successfully carried out against high-prole organizations and enterprises, including those that took down Chase, BOA, PNC and other major US banks in September 2009, which reveal the vulnerability of even wel...
متن کاملHost-based Intrusion Detection against Distributed Denial of Service Attacks
350 Abstract One of the greatest threats that network security faces nowadays is Distributed Denial of Service attacks. A newer version of the Denial of Service attack, also called Distributed Denial of Service attack or DDoS. In a distributed denialof-service (DDoS) attack, an attacker may use your computer to attack another computer. An attacker may attempt to: “flood” a network and thus redu...
متن کاملIntrusion Detection against Denial of Service Attacks in Manet Environment
In a Denial of Service (DoS) attack, legitimate users are prevented from access to services or network resources. Distributed DoS (DDoS) occurs if a group of attackers coordinate in DoS. When a DDoS attack occurs in a mobile ad hoc network (MANET), the attacker compromises a number of mobile nodes, which can follow different mobility patterns and have different speeds. This paper provides a sur...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Computer Networks
سال: 2000
ISSN: 1389-1286
DOI: 10.1016/s1389-1286(00)00141-9