Open Access Open Access  Restricted Access Subscription Access
Open Access Open Access Open Access  Restricted Access Restricted Access Subscription Access

An Investigation of Security Techniques for Concealed DDOS Exposure Attacks


Affiliations
1 Department of Information and Communication Engineering, Anna University, Chennai, India
2 Department of Computer Science and Engineering, Manonmaniam Sundaranar University, India
3 Department of Computer Science and Engineering, Francis Xavier Engineering College, India
     

   Subscribe/Renew Journal


Due to the influence of the multi-level system, the DDoS became a significant investigation in modern days. This encourages us to reduce the data loss and service overheads. In order to investigate these issues, an investigation of the DDoS attack and their related security techniques were analyzed in this paper. So, in this investigation, various data about the intruders will be collected by employing a secured multi-layered design with nomadic honeypots. Our proposed Subterranean Optimization procedure is utilized to distinguish the gatecrashers in view of the pheromone store on that considered zone. A multi-degree IP log table is utilized to distinguish the gatecrashers at diverse ranges of the device. Once the prompted range is found, the information is sent to multi-degree engineering to restrain the spreading of the stimulated region within the honeypot. This statistics will be dispatched to the honeypot to make a guard framework towards the attackers. The advantage of this proposed strategy is that it gives a complete barrier against DDoS at multilevel without making any overhead.

Keywords

DDoS Attack, Subterranean Optimization Procedure, Service Denial Attacks.
Subscription Login to verify subscription
User
Notifications
Font Size

  • A. Masood and J. Jim, “Static Analysis for Web Service Security-Tools and Techniques for a Secure Development Lifecycle”, Proceedings of IEEE International Symposium on Technologies for Homeland Security, pp. 121-124, 2015.
  • Jawad Hussain Awan et.al., “Security Strategies to Overcome Cyber Measures, Factors and Barriers”, Engineering Science And Technology International Research Journal, Vol. 1, No. 1, pp. 51-58, 2017.
  • M. Dabbagh et al., “Software-Defined Networking Security: Pros and Cons”, IEEE Communications Magazine, Vol. 53, No. 6, pp. 73-79, 2015.
  • Kianoosh G. Boroojeni, M. Hadi Amini and S.S. Iyengar, “Overview of the Security and Privacy Issues in Smart Grids”, Proceedings of Smart Grids: Security and Privacy Issues, pp. 1-16, 2017.
  • M. Wang and Zheng Yan, “Security in D2D Communications: A Review”, Proceedings of IEEE Trustcom/BigDataSE/ISPA, pp. 63-69, 2015.
  • M. Aamir and M.A. Zaidi, “A Survey on DDoS Attack and Defense Strategies: from Traditional Schemes to Current Techniques”, Interdisciplinary Information Sciences, Vol. 19, No. 2, pp. 173-200, 2013.
  • Chelsea Montgomery, “New Security for a New Era: An Investigation into Law Enforcement Cybersecurity Threats, Obstacles, and Community Applications”, Master Thesis, Department of Science of Cybersecurity, Utica College, 2017
  • A.B. Fernandes, et al., “Security Issues in Cloud Environments: A Survey”, International Journal of Information Security, Vol. 13, No. 2, pp.113-120, 2014.
  • W. Ding, Z. Yan, and R.H. Deng. “A Survey on Future Internet Security Architectures”, IEEE Access, Vol. 4, pp. 4374-4393, pp. 4374-4393, 2016.
  • Claude Fachkha, “Security Monitoring of the Cyber Space”, Available at: https://arxiv.org/ftp/arxiv/papers/1608/1608.01468.pdf
  • P. Ravi Kumar, P. Herbert Raj and P. Jelciana, “Exploring Security Issues and Solutions in Cloud Computing ServicesA Survey”, Cybernetics and Information Technologies, Vol. 17, No. 4, pp. 23-31, 2017.
  • Parnian Najafi Borazjani, “Security Issues in Cloud Computing”, Proceedings of International Conference on Green, Pervasive, and Cloud Computing, pp. 32-36, 2017.
  • Mohammad Masdari and Marzie Jalali, “A Survey and Taxonomy of DoS Attacks in Cloud Computing”, Security and Communication Networks, Vol. 9, No. 16, pp. 37243751, 2016.
  • R. Kavitha and G. Padmavathi, “Advanced Random Time Queue Blocking with Traffic Prediction for Defense of LowRate DoS Attacks against Application Servers”, International Journal of Communication Networks and Information Security, Vol. 9, No. 1, pp. 127-132, 2017.
  • Ji Min Park, “Finding Effective Responses against CyberAttacks for Divided Nations”, Master Thesis, Naval Postgraduate School, 2015.
  • Quan Jia, Kun Sun and Angelos Stavrou, “Motag: Moving Target Defense against Internet Denial of Service Attacks”, Proceedings of 22nd International Conference on Computer Communications and Networks, pp. 227-231, 2013.
  • Sunil Chaudhary, et al., “Applying Finite State Process Algebra to Formally Specify a Computational Model of Security Requirements in the Key2phone-Mobile Access Solution”, Proceedings of International Workshop on Formal Methods for Industrial Critical Systems, pp. 23-27, 2015.
  • Karanpreet Singh, Paramvir Singh and Krishan Kumar, “Application Layer HTTP-GET Flood DDoS Attacks: Research Landscape and Challenges”, Computers and Security, Vol. 65, pp. 344-372, 2017.
  • Huangxin Wang et al., “A Moving Target DDoS Defense Mechanism”, Computer Communications, Vol. 46, pp. 1021, 2014.

Abstract Views: 238

PDF Views: 1




  • An Investigation of Security Techniques for Concealed DDOS Exposure Attacks

Abstract Views: 238  |  PDF Views: 1

Authors

K. Praghash
Department of Information and Communication Engineering, Anna University, Chennai, India
M. Masthan
Department of Computer Science and Engineering, Manonmaniam Sundaranar University, India
R. Ravi
Department of Computer Science and Engineering, Francis Xavier Engineering College, India

Abstract


Due to the influence of the multi-level system, the DDoS became a significant investigation in modern days. This encourages us to reduce the data loss and service overheads. In order to investigate these issues, an investigation of the DDoS attack and their related security techniques were analyzed in this paper. So, in this investigation, various data about the intruders will be collected by employing a secured multi-layered design with nomadic honeypots. Our proposed Subterranean Optimization procedure is utilized to distinguish the gatecrashers in view of the pheromone store on that considered zone. A multi-degree IP log table is utilized to distinguish the gatecrashers at diverse ranges of the device. Once the prompted range is found, the information is sent to multi-degree engineering to restrain the spreading of the stimulated region within the honeypot. This statistics will be dispatched to the honeypot to make a guard framework towards the attackers. The advantage of this proposed strategy is that it gives a complete barrier against DDoS at multilevel without making any overhead.

Keywords


DDoS Attack, Subterranean Optimization Procedure, Service Denial Attacks.

References