Distributed defense scheme for managing DNS reflection attack in network communication systems
Domain Name System (DNS) is based on client-server architecture and employed User Packet Diagram (UDP) protocol to transport requests and responses. Due to UDP supports unreliable connection, malicious users are able to fabricate spoofed DNS requests very easily. Such DNS problems in turn affect num...
| Main Authors: | Ahmed, Dana Hasan, Hussin, Masnida, Abdullah, Azizol, Raja Mahmood, Raja Azlina |
|---|---|
| Format: | Article |
| Language: | English |
| Published: |
Faculty of Electronic and Computer Engineering, Universiti Teknikal Malaysia Melaka
2016
|
| Online Access: | http://psasir.upm.edu.my/id/eprint/53957/ http://psasir.upm.edu.my/id/eprint/53957/1/Distributed%20defense%20scheme%20for%20managing%20DNS%20reflection%20attack%20in%20network%20communication%20systems.pdf |
Similar Items
Protecting DNS from reflection amplification attacks using distributed defense scheme
by: Ahmed, Dana Hasan
Published: (2017)
by: Ahmed, Dana Hasan
Published: (2017)
Effective amplification mitigation and spoofing detection during DNS flooding attacks on internet
by: Hasan, Dana, et al.
Published: (2017)
by: Hasan, Dana, et al.
Published: (2017)
Efficient authentication mechanism for defending against reflection-based attacks on domain name system
by: Hasan, Dana, et al.
Published: (2020)
by: Hasan, Dana, et al.
Published: (2020)
On discrete event simulation of time-variance defense mechanism against low-rate denial of service
by: Hussin, Masnida, et al.
Published: (2015)
by: Hussin, Masnida, et al.
Published: (2015)
Performance evaluation of time-based black hole attack detection in mobile ad hoc networks
by: Raja Mahmood, Raja Azlina, et al.
Published: (2014)
by: Raja Mahmood, Raja Azlina, et al.
Published: (2014)
An Enhanced Mechanism To Detect Drdos Attacks On Dns Using Adaptive Thresholding Technique
by: Al Ogaili, Riyadh Rahef Nuiaa
Published: (2023)
by: Al Ogaili, Riyadh Rahef Nuiaa
Published: (2023)
Attacks on Shen et. al.’s remote user authentication scheme and defense*
by: Pathan, Al-Sakib Khan, et al.
Published: (2006)
by: Pathan, Al-Sakib Khan, et al.
Published: (2006)
Defense against adversarial attack in image recognition
by: Ng, Shi Qi
Published: (2024)
by: Ng, Shi Qi
Published: (2024)
Sensor communication model using cyber-physical system approach for green data center
by: Hussin, Masnida, et al.
Published: (2019)
by: Hussin, Masnida, et al.
Published: (2019)
Behavioral analysis and visualization of Fast-Flux DNS
by: A. Kadir, Andi Fitria, et al.
Published: (2012)
by: A. Kadir, Andi Fitria, et al.
Published: (2012)
Performance evaluation of an adaptive forwarding strategy in Named Data Networking
by: Raja Mahmood, Raja Azlina, et al.
Published: (2019)
by: Raja Mahmood, Raja Azlina, et al.
Published: (2019)
Effective black hole attacks in MANETs
by: Raja Mahmood, Raja Azlina, et al.
Published: (2013)
by: Raja Mahmood, Raja Azlina, et al.
Published: (2013)
Privacy based classification model of public data by utilizing two-steps validation approach
by: Hussin,, Masnida, et al.
Published: (2023)
by: Hussin,, Masnida, et al.
Published: (2023)
Direct numerical simulation (DNS) and large eddy simulation (LES)
by: Hoda, Asif
Published: (2011)
by: Hoda, Asif
Published: (2011)
Secure multicast group communication scheme in wireless IPv6 networks
by: Mehdizadeh, Abbas, et al.
Published: (2014)
by: Mehdizadeh, Abbas, et al.
Published: (2014)
Automatic defense against zero-day polymorphic worms in communication networks
by: Mohammed, Mohssen, et al.
Published: (2013)
by: Mohammed, Mohssen, et al.
Published: (2013)
Scalable communication infrastructure through resource provisioning approach for reliable social networking system
by: Hussin, Masnida, et al.
Published: (2019)
by: Hussin, Masnida, et al.
Published: (2019)
Efficient DNS based Load Balancing for Bursty Web Application Traffic
by: Chin, Mei Lu, et al.
Published: (2012)
by: Chin, Mei Lu, et al.
Published: (2012)
Secure group communication scheme in wireless IPv6 networks: an experimental test-bed
by: Mehdizadeh, Abbas, et al.
Published: (2012)
by: Mehdizadeh, Abbas, et al.
Published: (2012)
A site selection method of DNS using the particle swarm optimization algorithm
by: Liao, Y., et al.
Published: (2017)
by: Liao, Y., et al.
Published: (2017)
Model klasifikasi berasaskan privasi data awam dengan menggunakan pendekatan pengesahan dua peringkat
by: Masnida Hussin,, et al.
Published: (2022)
by: Masnida Hussin,, et al.
Published: (2022)
Performance evaluation of intrusion detection system using selected features and machine learning classifiers
by: Raja Mahmood, Raja Azlina, et al.
Published: (2021)
by: Raja Mahmood, Raja Azlina, et al.
Published: (2021)
A lightweight graph-based pattern recognition scheme in mobile ad hoc networks.
by: Raja Mahmood, Raja Azlina, et al.
Published: (2012)
by: Raja Mahmood, Raja Azlina, et al.
Published: (2012)
Adaptive resource allocation for reliable performance in heterogeneous distributed systems.
by: Hussin, Masnida, et al.
Published: (2013)
by: Hussin, Masnida, et al.
Published: (2013)
Attacks on SVD-Based watermarking schemes
by: Huo-Chong, Ling, et al.
Published: (2008)
by: Huo-Chong, Ling, et al.
Published: (2008)
Effectiveness of enhanced tight finite scheme in quantum key distribution protocol for network communication
by: Khalid, Roszelinda, et al.
Published: (2014)
by: Khalid, Roszelinda, et al.
Published: (2014)
Independent attacks in imperfect settings: a case for two-way quantum key distribution scheme
by: Shamsul Shaari, Jesni, et al.
Published: (2010)
by: Shamsul Shaari, Jesni, et al.
Published: (2010)
An efficient secure and energy resilient trust-based system for detection and mitigation of sybil attack detection (SAN)
by: Hussain, Muhammad Zunnurain, et al.
Published: (2024)
by: Hussain, Muhammad Zunnurain, et al.
Published: (2024)
An accuracy of attack detection using attack recognition technique in multi-factor authentication scheme
by: Mohd Ariffin, Noor Afiza, et al.
Published: (2019)
by: Mohd Ariffin, Noor Afiza, et al.
Published: (2019)
Impact of node inter-domain movement on MANETs performance
by: Raja Mahmood, Raja Azlina, et al.
Published: (2015)
by: Raja Mahmood, Raja Azlina, et al.
Published: (2015)
Deep learning in distributed denial-ofservice attacks detection method for Internet of Things networks
by: Firas Mohammed Aswad, Firas Mohammed Aswad, et al.
Published: (2023)
by: Firas Mohammed Aswad, Firas Mohammed Aswad, et al.
Published: (2023)
Deep learning in distributed denial-ofservice attacks detection method for Internet of Things networks
by: Mohammed Aswad, Firas, et al.
Published: (2023)
by: Mohammed Aswad, Firas, et al.
Published: (2023)
Deep learning in distributed denial-ofservice attacks detection method for Internet of Things networks
by: Mohammed Aswad, Firas, et al.
Published: (2023)
by: Mohammed Aswad, Firas, et al.
Published: (2023)
Deep learning in distributed denial-ofservice attacks detection method for Internet of Things networks
by: Mohammed Aswad, Firas, et al.
Published: (2023)
by: Mohammed Aswad, Firas, et al.
Published: (2023)
Deep learning in distributed denial-ofservice attacks detection method for Internet of Things networks
by: Mohammed Aswad, Firas, et al.
Published: (2023)
by: Mohammed Aswad, Firas, et al.
Published: (2023)
Deep learning in distributed denial-ofservice attacks detection method for Internet of Things networks
by: Mohammed Aswad, Firas, et al.
Published: (2023)
by: Mohammed Aswad, Firas, et al.
Published: (2023)
Cloud computing security threat with quantum key distribution defense model
by: Khalid, Roszelinda, et al.
Published: (2015)
by: Khalid, Roszelinda, et al.
Published: (2015)
A performance optimization model of task scheduling towards green cloud computing
by: Hussin, Masnida, et al.
Published: (2016)
by: Hussin, Masnida, et al.
Published: (2016)
A performance modeling framework for energy-based scheduling in cloud
by: Hussin, Masnida, et al.
Published: (2015)
by: Hussin, Masnida, et al.
Published: (2015)
In defense of (extreme) monism
by: Garner, Jeremy
Published: (2016)
by: Garner, Jeremy
Published: (2016)
Similar Items
-
Protecting DNS from reflection amplification attacks using distributed defense scheme
by: Ahmed, Dana Hasan
Published: (2017) -
Effective amplification mitigation and spoofing detection during DNS flooding attacks on internet
by: Hasan, Dana, et al.
Published: (2017) -
Efficient authentication mechanism for defending against reflection-based attacks on domain name system
by: Hasan, Dana, et al.
Published: (2020) -
On discrete event simulation of time-variance defense mechanism against low-rate denial of service
by: Hussin, Masnida, et al.
Published: (2015) -
Performance evaluation of time-based black hole attack detection in mobile ad hoc networks
by: Raja Mahmood, Raja Azlina, et al.
Published: (2014)