2020
DOI: 10.1080/19393555.2020.1722296
|View full text |Cite
|
Sign up to set email alerts
|

Detecting attacks in high-speed networks: Issues and solutions

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 11 publications
(3 citation statements)
references
References 3 publications
0
3
0
Order By: Relevance
“…For example, Nmap performs reverse-DNS resolution for every IP which responds to host discovery probes (i.e., those that are online). Reverse DNS is represented by DNS PTR records in the zone files of authoritative DNS servers and stored in a special zone called .in-addr.arpa [25]. For example, the zone for the PTR record of private address range 10.…”
Section: Detecting Internal Scannersmentioning
confidence: 99%
“…For example, Nmap performs reverse-DNS resolution for every IP which responds to host discovery probes (i.e., those that are online). Reverse DNS is represented by DNS PTR records in the zone files of authoritative DNS servers and stored in a special zone called .in-addr.arpa [25]. For example, the zone for the PTR record of private address range 10.…”
Section: Detecting Internal Scannersmentioning
confidence: 99%
“…These assaults produce a huge amount of network traffic by either forcing the victim to carry out the attacker's commands or cause the system to crash, rendering the service unavailable. SYN flood assault, ICMP flood assault, and UDP flood assault [10] are all common volumetric DDoS assaults. Protocol based attacks make use of Transport Control Protocol (TCP) / Internet Protocol (IP) or User Datagram Protocol (UDP) / IP mechanics to exhaust the CPU and memory resources, rendering the targeted system unable to respond to queries, Fig 1 . shows the DDoS attack scenario.…”
Section: Introductionmentioning
confidence: 99%
“…The problem of detecting attacks on networks has increased much fold after the increased use of botnets and distributed attacks. Two common network attacks are Denial of Service (DoS) and Port Scan [2]. To deal with intrusion on a computer network, an Intrusion Detection System (IDS) is used which is installed on the server.…”
Section: Introductionmentioning
confidence: 99%