روشی برای شناسایی و جلوگیری از حملات DDoS در پردیس دانشگاه / An approach for detecting and preventing DDoS attacks in campus

روشی برای شناسایی و جلوگیری از حملات DDoS در پردیس دانشگاه An approach for detecting and preventing DDoS attacks in campus

  • نوع فایل : کتاب
  • زبان : انگلیسی
  • ناشر : Springer
  • چاپ و سال / کشور: 2018

توضیحات

رشته های مرتبط مهندسی فناوری اطلاعات، کامپیوتر
گرایش های مرتبط اینترنت و شبکه های گسترده، شبکه های کامپیوتری و امنیت اطلاعات
مجله کنترل اتوماتیک و علوم کامپیوتر – Automatic Control and Computer Sciences
دانشگاه Department of Electronics – University of BLIDA BP – Algeria

منتشر شده در نشریه اسپرینگر
کلمات کلیدی انگلیسی DoS/DDoS attacks, intrusion detection system, anomaly detection, snort

Description

1. INTRODUCTION The denial of services attacks are generally described as actions where legitimate users or Institutions are dispossessed of certain services (network connectivity, web or e-mail). The distributed denial of services attacks are mainly used for flooding a particular server with huge useless information. The botnets are the major vectors to be taken into consideration to divert the DDoS attacks. There are more than 50% colleges attacked by cyber-attacks in one year, such as viruses/worms/trojans/malware, unauthorized access or DDoS. Those attacks may cause crash of campus network (system or device), network access interruption, service system and terminal system destruction, and illegal access, extremely affecting normal operation of campus network. The main goal is to perpetrate damage on the victim. Frequently the ulterior motives are personal reasons (a significant number of DDoS attacks are effected against home computers, presumably for purposes of revenge), or prestige (successful attacks on popular Web servers gain the respect of the hacker community). However, some DDoS attacks are performed for material gain (damaging a competitor’s resources or blackmailing companies) or for political reasons (a country at war could perpetrate attacks against its enemy’s critical resources, potentially enlisting a significant portion of the entire country’s computing power for this action). In some cases, the true victim of the attack might not be the actual target of the attack packets, but others who rely on the target’s correct operation [1]. The idea behind a DOS or DDoS attack is simple – it’s to take down the server. Normally attacks such as these are done to major sites as we pointed out earlier in this article, because they are high profile and affect a large amount of customers. There are different ways this can be done but they all do the same thing. DDoS threat attacks the following services [2]: • Network Bandwidth. • Server memory. • CPU usage. • Database space. • Hard disk Space. Our approach is to develop an improved algorithm by considering previously defined methodologies of snort IDS tool by adding a new approach in snort detection engine to identify the DoS and DDOS attacks. This engine filters all the files and loads the attacked or infected files into its loader by “.conf” file command. With the help of this, an efficient detection can be done. However, security, accuracy and reliability will be the main concern during the detection process. The main objective of the study is to analyze the problems, prospective and opportunities of various aspects in IDS Snort.
اگر شما نسبت به این اثر یا عنوان محق هستید، لطفا از طریق "بخش تماس با ما" با ما تماس بگیرید و برای اطلاعات بیشتر، صفحه قوانین و مقررات را مطالعه نمایید.

دیدگاه کاربران


لطفا در این قسمت فقط نظر شخصی در مورد این عنوان را وارد نمایید و در صورتیکه مشکلی با دانلود یا استفاده از این فایل دارید در صفحه کاربری تیکت ثبت کنید.

بارگزاری