Third International Symposium on Information Assurance and Security 2007
DOI: 10.1109/ias.2007.23
|View full text |Cite
|
Sign up to set email alerts
|

Detection and Honeypot Based Redirection to Counter DDoS Attacks in ISP Domain

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
18
0

Year Published

2009
2009
2024
2024

Publication Types

Select...
3
3

Relationship

3
3

Authors

Journals

citations
Cited by 30 publications
(18 citation statements)
references
References 12 publications
0
18
0
Order By: Relevance
“…This becomes a bottleneck, especially for volume-oriented DDoS attacks that will be aggravated by the computational overhead of the detection scheme. Though schemes in [8,9,[12][13][14][15] use volume-based metrics and have been successful in isolating large traffic changes (such as bandwidth flooding attacks), but slow rate, isotropic attacks cannot be detected and characterized because these attacks do not cause detectable disruptions in traffic volume. These suffer from more collateral damage.…”
Section: Related Workmentioning
confidence: 99%
See 3 more Smart Citations
“…This becomes a bottleneck, especially for volume-oriented DDoS attacks that will be aggravated by the computational overhead of the detection scheme. Though schemes in [8,9,[12][13][14][15] use volume-based metrics and have been successful in isolating large traffic changes (such as bandwidth flooding attacks), but slow rate, isotropic attacks cannot be detected and characterized because these attacks do not cause detectable disruptions in traffic volume. These suffer from more collateral damage.…”
Section: Related Workmentioning
confidence: 99%
“…By contrast, an anomaly-based detection system observes the normal network behavior and watches for any divergence from the normal profile. Most of DoS detection systems are anomalybased [8][9][10][11][14][15][16]. However, their normal traffic models are mainly based on flow rates.…”
Section: Related Workmentioning
confidence: 99%
See 2 more Smart Citations
“…In wired networks, various approaches exist for these attacks. But they can't be adopted for IEEE 802.16e wireless network [5][6][7][8][9][10][11][12]. WiMAX is susceptible to the attacks such as replay, DoS and MITM (man in the middle) attacks.…”
Section: Introductionmentioning
confidence: 99%