2017 International Conference on Software Security and Assurance (ICSSA) 2017
DOI: 10.1109/icssa.2017.19
|View full text |Cite
|
Sign up to set email alerts
|

Software-Based Platform for Education and Training of DDoS Attacks Using Virtual Networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0
1

Year Published

2020
2020
2024
2024

Publication Types

Select...
2
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(2 citation statements)
references
References 17 publications
0
1
0
1
Order By: Relevance
“…Early detection plays a fundamental role in preventing the fatal impact of DDoS attacks on server resources. One of the basic actions taken to prevent DDoS attacks is to install an Intrusion Detection System (IDS) on the server to monitor the flow of data packets that enter the internal network or vice versa [3]. Detection techniques in common IDS are far from perfect when compared to a variety of modern techniques and tools used by attackers because IDS still uses signature-based detection or anomaly-based detection models [4].…”
Section: Introductionmentioning
confidence: 99%
“…Early detection plays a fundamental role in preventing the fatal impact of DDoS attacks on server resources. One of the basic actions taken to prevent DDoS attacks is to install an Intrusion Detection System (IDS) on the server to monitor the flow of data packets that enter the internal network or vice versa [3]. Detection techniques in common IDS are far from perfect when compared to a variety of modern techniques and tools used by attackers because IDS still uses signature-based detection or anomaly-based detection models [4].…”
Section: Introductionmentioning
confidence: 99%
“…Deteksi dini memegang peran fundamental dalam mencegah dampak fatal serangan DDoS terhadap sumberdaya server. Salah satu tindakan dasar yang dilaksanakan untuk mencegah serangan DDoS adalah memasang Intrusion Detection System (IDS) pada server untuk memonitor aliran paket data yang masuk dalam jaringan internal ataupun sebaliknya (Fuertes et al, 2017). Teknik deteksi pada common IDS/IPS jauh dari sempurna apabila dibandingkan dengan variasi teknik dan tools modern yang digunakan oleh attacker karena IDS masih menggunakan model signature-based detection ataupun anomaly-based detection (Chowdhury, 2017).…”
unclassified