Open Access Open Access  Restricted Access Subscription Access

Flooding Attacks to Internet Threat Monitors (ITM): Modeling and Counter Measures Using Botnet and Honeypots


Affiliations
1 Department of Computer Science and Engineering, Rayalaseema University, Kurnool, India
2 Departmentof Computer Science and Engineering, SVUCE, SV University, Tirupati, India
3 Department of Computer Science and Engineering, Sree vidyanikethan Engg. College, Tirupati, India
 

The Internet Threat Monitoring (ITM),is a globally scoped Internet monitoring system whose goal is to measure, detect, characterize, and track threats such as distribute denial of service(DDoS) attacks and worms. To block the monitoring system in the internet the attackers are targeted the ITM system. In this paper we address flooding attack against ITM system in which the attacker attempt to exhaust the network and ITM's resources, such as network bandwidth, computing power, or operating system data structures by sending the malicious traffic. We propose an information-theoretic frame work that models the flooding attacks using Botnet on ITM. Based on this model we generalize the flooding attacks and propose an effective attack detection using Honeypots.

Keywords

Internet Threat Monitors (ITM), DDoS, Flooding Attack, Botnet and Honeypot.
User
Notifications
Font Size

Abstract Views: 232

PDF Views: 129




  • Flooding Attacks to Internet Threat Monitors (ITM): Modeling and Counter Measures Using Botnet and Honeypots

Abstract Views: 232  |  PDF Views: 129

Authors

K. Munivara Prasad
Department of Computer Science and Engineering, Rayalaseema University, Kurnool, India
A. Rama Mohan Reddy
Departmentof Computer Science and Engineering, SVUCE, SV University, Tirupati, India
M. Ganesh Karthik
Department of Computer Science and Engineering, Sree vidyanikethan Engg. College, Tirupati, India

Abstract


The Internet Threat Monitoring (ITM),is a globally scoped Internet monitoring system whose goal is to measure, detect, characterize, and track threats such as distribute denial of service(DDoS) attacks and worms. To block the monitoring system in the internet the attackers are targeted the ITM system. In this paper we address flooding attack against ITM system in which the attacker attempt to exhaust the network and ITM's resources, such as network bandwidth, computing power, or operating system data structures by sending the malicious traffic. We propose an information-theoretic frame work that models the flooding attacks using Botnet on ITM. Based on this model we generalize the flooding attacks and propose an effective attack detection using Honeypots.

Keywords


Internet Threat Monitors (ITM), DDoS, Flooding Attack, Botnet and Honeypot.