Kullanım Kılavuzu
Neden sadece 3 sonuç görüntüleyebiliyorum?
Sadece üye olan kurumların ağından bağlandığınız da tüm sonuçları görüntüleyebilirsiniz. Üye olmayan kurumlar için kurum yetkililerinin başvurması durumunda 1 aylık ücretsiz deneme sürümü açmaktayız.
Benim olmayan çok sonuç geliyor?
Birçok kaynakça da atıflar "Soyad, İ" olarak gösterildiği için özellikle Soyad ve isminin baş harfi aynı olan akademisyenlerin atıfları zaman zaman karışabilmektedir. Bu sorun tüm dünyadaki atıf dizinlerinin sıkça karşılaştığı bir sorundur.
Sadece ilgili makaleme yapılan atıfları nasıl görebilirim?
Makalenizin ismini arattıktan sonra detaylar kısmına bastığınız anda seçtiğiniz makaleye yapılan atıfları görebilirsiniz.
 Görüntüleme 4
Honeynet based Defensive mechanism Against DDoS Attacks
2020
Dergi:  
International Journal of Information Security Science
Yazar:  
Özet:

Internet we are using today is expanding faster than we could have imagined. Since the dawn of the Internet, there has been an exponential increase in the number of web sites and so the quantity of data on these websites. According to a recent data released by Google, As of October 2018, there are more than 1.9 billion websites on the Internet and more than 85,000 sites have been hacked or overrun by the hackers on all over the globe. It’s being such a huge and frightening numbers. Most of the hackers attack the web sites to collect useful information and also to make other legitimate users devoid of the information or services they required. It is called a Denial of service DoS . It has another important other version known as Distributed Denial of Service DDoS where attackers attacks in a distributed manner from various distributed locations. To curtail this problem in 1991 Honeypot was introduced which takes all attacks on itself and studies the attack pattern. But as time passes on various types of honeypots were introduced like honeytoken and honeynet. Honeypots allow all the attacks on itself and make attackers think that they have the access of real system and meanwhile honeypots will study all the attack pattern of attackers. Before honeypots, a filtering algorithm is used which with the help of pre-defined sink server will predict whether a given packet is malicious or not, here help of ISP service provider can also be taken if sink server doesn’t have any information about the sender of given data packets. Then to further enhance the capability of honeynet cloud, a various different type of services can be deployed at honeynet clouds like HTTP, CBR and FTP. Here we have used NS2 simulator to run our above-proposed work and the results are taken in the form of graphs like throughput of all three different types of honeypots, bandwidth and packet loss of all services provided by destination servers. Detection rate of malicious packets are calculated and comparison has be done between different services provided by honeynet cloud.

Anahtar Kelimeler:

0
2020
Yazar:  
Atıf Yapanlar
Bilgi: Bu yayına herhangi bir atıf yapılmamıştır.
Benzer Makaleler










International Journal of Information Security Science

Alan :   Mühendislik

Dergi Türü :   Uluslararası

Metrikler
Makale : 62
Atıf : 6
International Journal of Information Security Science