Proceedings of the 6th International ICST Conference on Collaborative Computing: Networking, Applications, Worksharing 2010
DOI: 10.4108/icst.collaboratecom.2010.46
|View full text |Cite
|
Sign up to set email alerts
|

A collaborative approach to facilitate intrusion detection and response against DDoS attacks.

Abstract: Intrusion detection and response systems (IPSs) for literature based on two intrusion prevention systems, motl protecting against distributed denial-of-service (DDoS) attacks host-based IPS (HIPS) and network-based IPS (NIPS) [1[2 will beneflit significantly if all the routers within each autonomous [3]. HIPSs are deployed on end-hosts, either source (Souce system (AS) are capable of detection and response in addition to side) or destination (Destination-side) of the attack. Sourcesd sampling. However, DDoS de… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
8
0

Year Published

2011
2011
2024
2024

Publication Types

Select...
5
2

Relationship

1
6

Authors

Journals

citations
Cited by 14 publications
(8 citation statements)
references
References 5 publications
0
8
0
Order By: Relevance
“…These overheads get even worse if each router does redundant detection and response through the path to the destination [86], which can present a significant burden. Various researchers have proposed different approaches to reduce the amount of storage and consumption of CPU cycles for detection and response at the routers such as Bloom filters [78] [87], Packet sampling [88], etc.…”
Section: Destination-based Mechanismsmentioning
confidence: 99%
See 1 more Smart Citation
“…These overheads get even worse if each router does redundant detection and response through the path to the destination [86], which can present a significant burden. Various researchers have proposed different approaches to reduce the amount of storage and consumption of CPU cycles for detection and response at the routers such as Bloom filters [78] [87], Packet sampling [88], etc.…”
Section: Destination-based Mechanismsmentioning
confidence: 99%
“…But these approaches are not sufficient when routers still do redundant jobs. Moreover, reducing the amount of redundant detection and response between the routers requires coordination among them [86]. Different communication protocols have been proposed to coordinate attack detection and response among the routers [1].…”
Section: Destination-based Mechanismsmentioning
confidence: 99%
“…Collaboration also increases attack detection and the speed and strength of prevention efforts. Distributed detection and prevention of the attacks within/among cloud providers can reduce the complexity of redundant monitoring of attack flows [6] at different check points which should be one of the main features in the next generation of IDPSs suitable for cloud environments. Creating comprehensive local/global databases to be used for detection tasks by IDPSs is another major requirement in order for IDPSs to act as a comprehensive defense mechanism.…”
Section: Motivationmentioning
confidence: 99%
“…Based on where detection and response occurs in the system, IDPSs can be categorized into three different types: host-based IDPSs (HIDPSs), network-based IDPS (NIDPSs), and Hybrid IDPSs (also known as Distributed IDPSs [2]) which includes both host-based and network-based sensors [6], [8]. HIDPSs are not capable of detecting attacks before the end-system is compromised.…”
Section: Intrusion Detection and Prevention Systemsmentioning
confidence: 99%
See 1 more Smart Citation