Distributed Denial of Service Using I-DFT
نویسندگان
چکیده
ABSTRACT : With the rapid development of information technology, internet has affect the people in all aspects such as public utilities, telecommunication, financial transaction and defense system, all depends on information technology and their security. The widespread deployment of new technologies had maximized the use of internet to a great extent. But at the same time, the potential attackers are success on discovering new ways to attack. Botnet is one of the most serious emerging threats and it refers to a number of compromised computers within a network. Malicious activities which are performed by a botnet are DDoS, spam, click fraud, phishing, identity theft, sniffing traffic, keylogging etc.
منابع مشابه
HF-Blocker: Detection of Distributed Denial of Service Attacks Based On Botnets
Abstract—Today, botnets have become a serious threat to enterprise networks. By creation of network of bots, they launch several attacks, distributed denial of service attacks (DDoS) on networks is a sample of such attacks. Such attacks with the occupation of system resources, have proven to be an effective method of denying network services. Botnets that launch HTTP packet flood attacks agains...
متن کاملNeural Network Based Protection of Software Defined Network Controller against Distributed Denial of Service Attacks
Software Defined Network (SDN) is a new architecture for network management and its main concept is centralizing network management in the network control level that has an overview of the network and determines the forwarding rules for switches and routers (the data level). Although this centralized control is the main advantage of SDN, it is also a single point of failure. If this main contro...
متن کاملHost-based Intrusion Detection against Distributed Denial of Service Attacks
350 Abstract One of the greatest threats that network security faces nowadays is Distributed Denial of Service attacks. A newer version of the Denial of Service attack, also called Distributed Denial of Service attack or DDoS. In a distributed denialof-service (DDoS) attack, an attacker may use your computer to attack another computer. An attacker may attempt to: “flood” a network and thus redu...
متن کاملDistributed denial of service attacks
We discuss distributed denial of service attacks in the Internet. We were motivated by the widely known February 2000 distributed attacks on Yahoo!, Amazon.com, CNN.com, and other major Web sites. A denial of service is characterized by an explicit attempt by an attacker to prevent legitimate users from using resources. An attacker may attempt to: “flood” a network and thus reduce a legitimate ...
متن کاملComputer Assisted Proof of Resistance of Denial of Service Attacks in Security Protocols Based on Events with CryptoVerif in Computational Model
Owning to the huge damage and difficulty of prevention of denial of service attacks in security protocols, people pay serious attentions on analysis, verification and prevention of denial of service attacks. Formal method in computational model is a powerful tool used to analyze and prove securities in security protocols, network and distributed system. But until now in computational model ther...
متن کامل