Counteracting Network Distributed Attacks: An Intelligent Approach to Minimise the TCP/IP Protocol Threats using Agents Technology
نویسنده
چکیده
Today, communications, information networks, e-Commerce, e-Education, and all other e-Services and infrastructures tend to play a major role in our daily life and global economy. Nowadays, in modern society, Information and Communications Technology (ICT) is the force that drives productivity and creates a higher standard of living. The growing dependence on such systems, however, increased their vulnerability to cyber vigilantism. Any failure to these systems typically would lead to a huge impact, not only on businesses, but also human life that rely on biomedical networks. The growing potential for telecommunications network infrastructures problems stems from their nature of openness. A successful attempt for a network attack to a particular network could have devastating effects on the Organisation security. In this paper we propose an innovative way to counteract TCP/IP protocol network attacks such as Distributed Denial of Service (DDoS) attacks using Fuzzy Logic intelligent scheme.
منابع مشابه
Modeling TCP/IP Networks Topology for Network Vulnerability Analysis Modeling TCP/IP Networks Topology for Network Vulnerability Analysis
The distributed nature and complexity of computer networks and various services provided via them, makes the networks vulnerable to numerous attacks. The TCP/IP presumptions which are based on using this protocol to provide a simple, open communication infrastructure in an academic and collaborative environment, causes this protocol lack of built-in mechanisms for authentication, integrity and ...
متن کاملSurvey Of DDoS Attacks Based On TCP/IP Protocol Vulnerabilities
Distributed denial-of-service (DDoS) attacks are one of the key threats and perhaps the toughest security problem for today’s Internet.Distributed Denial of Service (DDoS) attack has become a stimulating problem to the availability of resources in computer networks.With brief or no advance warning, a DDoS attack can easily drain the computing and communication resources of its victim within a s...
متن کاملModeling TCP/IP Networks Topology for Network Vulnerability Analysis
The distributed nature and complexity of computer networks and various services provided via them, makes the networks vulnerable to numerous attacks. The TCP/IP presumptions which are based on using this protocol to provide a simple, open communication infrastructure in an academic and collaborative environment, causes this protocol lack of built-in mechanisms for authentication, integrity and ...
متن کاملIntroduction to TCP/IP Network Attacks
Computation model has experienced a significant change since the emergence of the computer networks, which brought us much benefit that is difficult or even impossible to achieve by the traditional centralized system, such as resource sharing, high reliability, better price/performance ratio, and so on. Meanwhile, there also come many potential threats to the network community like unauthorized...
متن کاملHF-Blocker: Detection of Distributed Denial of Service Attacks Based On Botnets
Abstract—Today, botnets have become a serious threat to enterprise networks. By creation of network of bots, they launch several attacks, distributed denial of service attacks (DDoS) on networks is a sample of such attacks. Such attacks with the occupation of system resources, have proven to be an effective method of denying network services. Botnets that launch HTTP packet flood attacks agains...
متن کامل