Open Access Open Access  Restricted Access Subscription Access

Enhanced Secure Technique for Detecting Attacks in Network

K. Thamizhmaran

Abstract


Recent research years of development of network mainly affected denial of service attacks are a virulent. Distributed rejection of service attackers infiltrate enormous quantities of computers by misusing software vulnerabilities, to set up distributed attack networks.These accidental computers are then summoned to wage a coordinated, large-scale enormous attack against at least one more victim systems. As specific counter measures are developed, attackers enhance existing denial attack tools, developing new and derivative developed techniques and attack tools. As opposed to respond to new attacks with explicit countermeasures, it is attractive to create comprehensive distributed denial solutions that shield against known and future attack variations. However, this requires a comprehensive understanding of the scope and techniques used in different attacks. This paper attempts a comprehensive scoping of the distributed denial problem. We propose new scientific categorizations to sort distinctive attack networks, to order the various procedures utilized in an attack, and to depict the characteristics of the software instruments utilized in setting up an attack network. The group of systems that is used to perform the denial attack is known as the Botnets. This paper introduces the overview of the state of art in denial attacks detection strategies.

 

Keywords: Network, denial attack, Layer, Routing, Detection scheme.


Full Text:

PDF

References


Simmonds, A., Sandilands, P., & Van Ekert, L. (2004, October). An ontology for network security attacks. In Asian Applied Computing Conference (pp. 317-323). Springer, Berlin, Heidelberg.

Zapata, M. G. (2002). Secure ad hoc on-demand distance vector routing. ACM SIGMOBILE Mobile Computing and Communications Review, 6(3), 106-107.

Hu, Y. C., Perrig, A., & Johnson, D. B. (2006). Wormhole attacks in wireless networks. IEEE journal on selected areas in communications, 24(2), 370-380.

Wang, Z. Z., Guan, Y., Lu, J. D., & Chen, Y. C. (2007). Routing Security Mechanism Based on Neighbor Nodes Monitoring and Detecting for MANET. Jisuanji Gongcheng/ Computer Engineering, 33(18), 148-150.

Mishra, R., Sharma, S., & Agrawal, R. (2010, June). Vulnerabilities and security for ad-hoc networks. In 2010 International Conference on Networking and Information Technology (pp. 192-196). IEEE.

Zargar, S. T., Joshi, J., & Tipper, D. (2013). A survey of defense mechanisms against distributed denial of service (DDoS) flooding attacks. IEEE communications surveys & tutorials, 15(4), 2046-2069.

Ozcelik, I., Fu, Y., & Brooks, R. R. (2013, March). DoS detection is easier now. In 2013 Second GENI Research and Educational Experiment Workshop (pp. 50-55). IEEE.

Bhuyan, M. H., Kashyap, H. J., Bhattacharyya, D. K., &Kalita, J. K. (2014). Detecting distributed denial of service attacks: methods, tools and future directions. The Computer Journal, 57(4), 537-556.

Chetan, et al.(2014). Enhanced secured mobile network oriented Detection mechanisms for android applications.International journal of mathematical and computational engineering, 1(1).

Aamir, M., &Arif, M. (2013). Study and performance evaluation on recent DDoS trends of attack & defense. International Journal of Information Technology and Computer Science, 5(8), 54-65.

Wang, C., Miu, T. T., Luo, X., & Wang, J. (2017). Skyshield: A sketch-based defense system against application layer ddos attacks. IEEE Transactions on Information Forensics and Security, 13(3), 559-573.


Refbacks

  • There are currently no refbacks.