Traceback Model for Identifying Sources of Distributed Attacks in Real Time
Locating sources of distributed attack is time-consuming; attackers are identified long after the attack is completed. This paper proposes a trackback model for identifying attackers and locating their distributed sources in real time. Attackers are identified by monitoring violations of malicious e...
| Main Authors: | Ahmed, Abdulghani Ali, Sadiq, Ali Safa, Mohamad Fadli, Zolkipli |
|---|---|
| Format: | Article |
| Language: | English |
| Published: |
Wiley
2016
|
| Subjects: | |
| Online Access: | http://umpir.ump.edu.my/id/eprint/12717/ http://umpir.ump.edu.my/id/eprint/12717/1/Traceback%20Model%20for%20Identifying%20Sources%20of%20Distributed%20Attacks%20In%20Real%20Time.pdf |
Similar Items
Investigation Model for Ddos Attack Detection in Real-Time
by: Ahmed, Abdulghani Ali
Published: (2015)
by: Ahmed, Abdulghani Ali
Published: (2015)
Filtration Model For DDoS Attack Detection in Real-Time
by: Ahmed, Abdulghani Ali
Published: (2015)
by: Ahmed, Abdulghani Ali
Published: (2015)
Precise ICMP Traceback Based On Normal Flow Filtration in Denial of Services Attack
by: Izaddoost, Alireza
Published: (2008)
by: Izaddoost, Alireza
Published: (2008)
Methods for Preventing DDoS Attacks in Cloud Computing
by: Jaber, Aws Naser, et al.
Published: (2017)
by: Jaber, Aws Naser, et al.
Published: (2017)
Host Based Intrusion Detection and Prevention Model Against DDoS Attack in Cloud Computing
by: Jaber, Aws Naser, et al.
Published: (2018)
by: Jaber, Aws Naser, et al.
Published: (2018)
Security Everywhere Cloud: An Intensive Review of DoS and DDoS Attacks in Cloud Computing
by: Mazlina, Abdul Majid, et al.
Published: (2014)
by: Mazlina, Abdul Majid, et al.
Published: (2014)
SAIRF: A similarity approach for attack intention recognition using fuzzy min-max neural network
by: Ahmed, Abdulghani Ali, et al.
Published: (2018)
by: Ahmed, Abdulghani Ali, et al.
Published: (2018)
Attack Intention Recognition: A Review
by: Ahmed, Abdulghani Ali, et al.
Published: (2017)
by: Ahmed, Abdulghani Ali, et al.
Published: (2017)
Real-time denial of service attack detection and mitigation on controller in software defined network environment / Bilal Ishfaq
by: Bilal , Ishfaq
Published: (2016)
by: Bilal , Ishfaq
Published: (2016)
A novel efficient substitution-box design based on firefly algorithm and discrete chaotic map
by: A. Ahmed, Hussam, et al.
Published: (2018)
by: A. Ahmed, Hussam, et al.
Published: (2018)
Security Scheme for Protecting Cloud Computing Services Against Bursty DDoS Attacks
by: Mazlina, Abdul Majid, et al.
Published: (2015)
by: Mazlina, Abdul Majid, et al.
Published: (2015)
An Efficient Cluster Head Election Algorithm for Client Mesh Networks using Fuzzy Logic Control
by: Adekiigbe, Adebanjo, et al.
Published: (2017)
by: Adekiigbe, Adebanjo, et al.
Published: (2017)
AIRSE : an approach for attack intention recognition based on similarity of evidences
by: Ahmed, Abdulghani Ali, et al.
Published: (2017)
by: Ahmed, Abdulghani Ali, et al.
Published: (2017)
An Energy-Efficient Cross-Layer approach for cloud wireless green communications
by: Sadiq, Ali Safa, et al.
Published: (2017)
by: Sadiq, Ali Safa, et al.
Published: (2017)
The visualization of three dimensional brain tumors' growth on distributed parallel computer systems
by: Alias, Norma, et al.
Published: (2009)
by: Alias, Norma, et al.
Published: (2009)
Real time detection of phishing websites
by: Ahmed, Abdulghani Ali, et al.
Published: (2016)
by: Ahmed, Abdulghani Ali, et al.
Published: (2016)
“What should be done to achieve greater use of cloud computing by higher education institutions”
by: Alajmi, Qasim, et al.
Published: (2016)
by: Alajmi, Qasim, et al.
Published: (2016)
Cloud Computing Technology Setups to Support: The
Learning Management System (LMS) in Higher Education
Institutions in Oman
by: Alajmi, Qasim, et al.
Published: (2016)
by: Alajmi, Qasim, et al.
Published: (2016)
MICIE: A model for identifying and collecting intrusion evidences
by: Ahmed, Abdulghani Ali, et al.
Published: (2017)
by: Ahmed, Abdulghani Ali, et al.
Published: (2017)
Model of Improved a Kernel Fast Learning Network Based on Intrusion Detection System
by: Ali, Mohammed Hasan, et al.
Published: (2019)
by: Ali, Mohammed Hasan, et al.
Published: (2019)
Understanding the root of attack in android malware
by: Rahiwan Nazar, Romli, et al.
Published: (2018)
by: Rahiwan Nazar, Romli, et al.
Published: (2018)
A comparative analysis of metaheuristic algorithms in fuzzy modelling for phishing attack detection
by: Noor Syahirah, Nordin, et al.
Published: (2021)
by: Noor Syahirah, Nordin, et al.
Published: (2021)
A framework for identifying skylines over incomplete data
by: Aljuboori, Ali A. Alwan, et al.
Published: (2014)
by: Aljuboori, Ali A. Alwan, et al.
Published: (2014)
Botnet Detection Using a Feed-Forward Backpropagation Artificial Neural Network
by: Ahmed, Abdulghani Ali
Published: (2019)
by: Ahmed, Abdulghani Ali
Published: (2019)
IDS for Improving DDoS attack recognition based on attack profiles and network traffic features
by: Sallam, Amer A., et al.
Published: (2020)
by: Sallam, Amer A., et al.
Published: (2020)
Design of a collaborative system for real time haptic feedback in distributed virtual environments over IP networks
by: Yap, Kian Meng *
Published: (2011)
by: Yap, Kian Meng *
Published: (2011)
Dynamic reciprocal authentication protocol for mobile cloud computing
by: Ahmed, Abdulghani Ali, et al.
Published: (2021)
by: Ahmed, Abdulghani Ali, et al.
Published: (2021)
Response Option for Attacks Detected by Intrusion Detection System
by: Shahid, Anwar, et al.
Published: (2015)
by: Shahid, Anwar, et al.
Published: (2015)
Framework for real time cloud rendering
by: Rana, Muhammad Azam, et al.
Published: (2004)
by: Rana, Muhammad Azam, et al.
Published: (2004)
Stock prediction by applying hybrid Clustering-GWO-NARX neural network technique
by: Das, Debashish, et al.
Published: (2017)
by: Das, Debashish, et al.
Published: (2017)
Detection of distributed denial-of-service (DDoS) attack with hyperparameter tuning based on machine learning approach
by: Wan Nurulsafawati, Wan Manan, et al.
Published: (2023)
by: Wan Nurulsafawati, Wan Manan, et al.
Published: (2023)
Detection Of Distributed Denial-Of-Service (Ddos) Attack With Hyperparameter Tuning Based On Machine Learning Approach
by: Choo, Yong Han
Published: (2023)
by: Choo, Yong Han
Published: (2023)
Quantitative Computational Framework For Analyzing Evidence To Identify Attack Intention And Strategy In Network Forensics
by: Mosa, Mohammad Rasmi Hassun
Published: (2013)
by: Mosa, Mohammad Rasmi Hassun
Published: (2013)
Detection of black hole attacks in mobile ad hoc networks via HSA-CBDS method
by: Fahad, Ahmed Mohammed, et al.
Published: (2019)
by: Fahad, Ahmed Mohammed, et al.
Published: (2019)
Statistical Based Real-Time Selective Herbicide Weed Classifier
by: Ahmed, Irshad, et al.
Published: (2007)
by: Ahmed, Irshad, et al.
Published: (2007)
Real-time whiteboard / Ng Yih Young
by: Ng , Yih Young
Published: (2002)
by: Ng , Yih Young
Published: (2002)
Data mining techniques for effective detection of distributed denial-of-service attacks
by: Lee, Yuen Hui
Published: (2024)
by: Lee, Yuen Hui
Published: (2024)
Real time astrocyte in spiking neural network
by: Abdul-Rahman Abed, Bassam, et al.
Published: (2015)
by: Abdul-Rahman Abed, Bassam, et al.
Published: (2015)
Development of a real time expert system for 11KV distribution automation
by: Uddin,, Md. Safi, et al.
Published: (2006)
by: Uddin,, Md. Safi, et al.
Published: (2006)
Tracing Technique for Blaster Attack
by: Selamat, S. R., et al.
Published: (2009)
by: Selamat, S. R., et al.
Published: (2009)
Similar Items
-
Investigation Model for Ddos Attack Detection in Real-Time
by: Ahmed, Abdulghani Ali
Published: (2015) -
Filtration Model For DDoS Attack Detection in Real-Time
by: Ahmed, Abdulghani Ali
Published: (2015) -
Precise ICMP Traceback Based On Normal Flow Filtration in Denial of Services Attack
by: Izaddoost, Alireza
Published: (2008) -
Methods for Preventing DDoS Attacks in Cloud Computing
by: Jaber, Aws Naser, et al.
Published: (2017) -
Host Based Intrusion Detection and Prevention Model Against DDoS Attack in Cloud Computing
by: Jaber, Aws Naser, et al.
Published: (2018)