Effective amplification mitigation and spoofing detection during DNS flooding attacks on internet
Recent flooding attacks using Domain Name System (DNS) is used by cybercriminals to launch hundreds of gigabytes of attack traffic to paralyze their victims. The lack of security features in DNS protocol and adding security layers to this protocol is subject of further studying. In this reserach, we...
| Main Authors: | Hasan, Dana, Hussin, Masnida, Abdullah, Azizol |
|---|---|
| Format: | Article |
| Language: | English |
| Published: |
Medwell Journals
2017
|
| Online Access: | http://psasir.upm.edu.my/id/eprint/61618/ http://psasir.upm.edu.my/id/eprint/61618/1/Effective%20amplification%20mitigation%20and%20spoofing%20detection%20during%20DNS%20flooding%20attacks%20on%20internet.pdf |
Similar Items
Protecting DNS from reflection amplification attacks using distributed defense scheme
by: Ahmed, Dana Hasan
Published: (2017)
by: Ahmed, Dana Hasan
Published: (2017)
Distributed defense scheme for managing DNS reflection attack in network communication systems
by: Ahmed, Dana Hasan, et al.
Published: (2016)
by: Ahmed, Dana Hasan, et al.
Published: (2016)
An Enhanced Mechanism To Detect Drdos Attacks On Dns Using Adaptive Thresholding Technique
by: Al Ogaili, Riyadh Rahef Nuiaa
Published: (2023)
by: Al Ogaili, Riyadh Rahef Nuiaa
Published: (2023)
An efficient secure and energy resilient trust-based system for detection and mitigation of sybil attack detection (SAN)
by: Hussain, Muhammad Zunnurain, et al.
Published: (2024)
by: Hussain, Muhammad Zunnurain, et al.
Published: (2024)
Detection and prevention schemes for ddos, arp
spoofing, and ip fragmentation attacks in smart factory
by: Chai, Tze Uei
Published: (2023)
by: Chai, Tze Uei
Published: (2023)
Digital speech watermarking for anti-spoofing attack in speaker recognition
by: Nematollahi, Mohammad Ali, et al.
Published: (2014)
by: Nematollahi, Mohammad Ali, et al.
Published: (2014)
Efficient authentication mechanism for defending against reflection-based attacks on domain name system
by: Hasan, Dana, et al.
Published: (2020)
by: Hasan, Dana, et al.
Published: (2020)
IP spoofing defense: an introduction
by: Lee, Soon, et al.
Published: (2009)
by: Lee, Soon, et al.
Published: (2009)
Mitigation Of Syn-Flooding Attack Using High Speed Programmable Network Processor
by: Lim, Boon Ping
Published: (2006)
by: Lim, Boon Ping
Published: (2006)
Behavioral analysis and visualization of Fast-Flux DNS
by: A. Kadir, Andi Fitria, et al.
Published: (2012)
by: A. Kadir, Andi Fitria, et al.
Published: (2012)
SEDF: a spoofed email detection framework employed by a lightweight web browser plug-in for detecting the spoofed email / Al Ya@Geogiana Buja...[et al.]
by: Buja, Al Ya@Geogiana, et al.
Published: (2014)
by: Buja, Al Ya@Geogiana, et al.
Published: (2014)
Early detection and mitigation of DDoS attacks in software defined networks
by: Al-Saadi, Mustafa Yahya Zakariya
Published: (2018)
by: Al-Saadi, Mustafa Yahya Zakariya
Published: (2018)
The platform of spoof videos: The case of Tudou.com
by: Li, Siling
Published: (2012)
by: Li, Siling
Published: (2012)
IoTContact: a strategy for predicting contagious IoT nodes in mitigating ransomware attacks
by: Ibrahim, Mohammed, et al.
Published: (2021)
by: Ibrahim, Mohammed, et al.
Published: (2021)
Direct numerical simulation (DNS) and large eddy simulation (LES)
by: Hoda, Asif
Published: (2011)
by: Hoda, Asif
Published: (2011)
Detection and mitigation of ARP storm attacks using software defined networks
by: Numan, Munther, et al.
Published: (2017)
by: Numan, Munther, et al.
Published: (2017)
Narrative dissidence, spoof videos and alternative memory in China
by: Li, Siling
Published: (2015)
by: Li, Siling
Published: (2015)
IP spoofing defense : current issues, trend and challenges.
by: Lee, Soon, et al.
Published: (2009)
by: Lee, Soon, et al.
Published: (2009)
Efficient DNS based Load Balancing for Bursty Web Application Traffic
by: Chin, Mei Lu, et al.
Published: (2012)
by: Chin, Mei Lu, et al.
Published: (2012)
Texture analysis using local ternary pattern for face anti-spoofing
by: Parveen, Sajida, et al.
Published: (2016)
by: Parveen, Sajida, et al.
Published: (2016)
Mitigating sulphate attacks in geotechnical engineering
by: Chegenizadeh, Amin, et al.
Published: (2017)
by: Chegenizadeh, Amin, et al.
Published: (2017)
802.11 MAC layer sniffer using spoof detection algorithm / Azwan Abdul Satar
by: Abdul Satar, Azwan
Published: (2007)
by: Abdul Satar, Azwan
Published: (2007)
Detecting and mitigating botnet attacks using deep
learning in software-defined networks
by: Muhammad Waqas, Nadeem
Published: (2023)
by: Muhammad Waqas, Nadeem
Published: (2023)
Proof of Concept: Network Vulnerability through Wi-Fi Spoofing
by: Cheong, Philip Zhi Qiang
Published: (2017)
by: Cheong, Philip Zhi Qiang
Published: (2017)
A site selection method of DNS using the particle swarm optimization algorithm
by: Liao, Y., et al.
Published: (2017)
by: Liao, Y., et al.
Published: (2017)
An Integrated Flood Warning and Response Model for Effective Flood Disaster Mitigation Management
by: Ruzaini, Abdullah Arshah, et al.
Published: (2018)
by: Ruzaini, Abdullah Arshah, et al.
Published: (2018)
Mitigating data spoofing risks in Near Field Communication (NFC) read/write mode: an investigation into access control vulnerabilities and post-compromise recovery strategy
by: Megat Khalid, Puteri Shariza, et al.
Published: (2024)
by: Megat Khalid, Puteri Shariza, et al.
Published: (2024)
Performance evaluation of time-based black hole attack detection in mobile ad hoc networks
by: Raja Mahmood, Raja Azlina, et al.
Published: (2014)
by: Raja Mahmood, Raja Azlina, et al.
Published: (2014)
Hybrid multi-level detection and mitigation of clone attacks in mobile wireless sensor network (MWSN)
by: Shaukat, Haafizah Rameeza, et al.
Published: (2020)
by: Shaukat, Haafizah Rameeza, et al.
Published: (2020)
Assessment on the efficiency of flood mitigation measures
by: Zuriyati Yusof,, et al.
Published: (2023)
by: Zuriyati Yusof,, et al.
Published: (2023)
Green Wall as Urban Flood Mitigation
by: Mah, D.Y.S., et al.
Published: (2017)
by: Mah, D.Y.S., et al.
Published: (2017)
Enhanced IP spoofing defense through clustered interdomain packet filtering strategy
by: Lee, Soon
Published: (2011)
by: Lee, Soon
Published: (2011)
Flooding Distributed Denial of Service Attacks-A Review
by: Wan Mohd Ghazali, Khadijah, et al.
Published: (2011)
by: Wan Mohd Ghazali, Khadijah, et al.
Published: (2011)
Deep learning in distributed denial-ofservice attacks detection method for Internet of Things networks
by: Firas Mohammed Aswad, Firas Mohammed Aswad, et al.
Published: (2023)
by: Firas Mohammed Aswad, Firas Mohammed Aswad, et al.
Published: (2023)
Deep learning in distributed denial-ofservice attacks detection method for Internet of Things networks
by: Mohammed Aswad, Firas, et al.
Published: (2023)
by: Mohammed Aswad, Firas, et al.
Published: (2023)
Deep learning in distributed denial-ofservice attacks detection method for Internet of Things networks
by: Mohammed Aswad, Firas, et al.
Published: (2023)
by: Mohammed Aswad, Firas, et al.
Published: (2023)
Deep learning in distributed denial-ofservice attacks detection method for Internet of Things networks
by: Mohammed Aswad, Firas, et al.
Published: (2023)
by: Mohammed Aswad, Firas, et al.
Published: (2023)
Deep learning in distributed denial-ofservice attacks detection method for Internet of Things networks
by: Mohammed Aswad, Firas, et al.
Published: (2023)
by: Mohammed Aswad, Firas, et al.
Published: (2023)
Deep learning in distributed denial-ofservice attacks detection method for Internet of Things networks
by: Mohammed Aswad, Firas, et al.
Published: (2023)
by: Mohammed Aswad, Firas, et al.
Published: (2023)
Danger theory based node replication attack detection and mitigation in cluster mobile wireless sensor nodes
by: Shaukat, Haafizah Rameeza
Published: (2014)
by: Shaukat, Haafizah Rameeza
Published: (2014)
Similar Items
-
Protecting DNS from reflection amplification attacks using distributed defense scheme
by: Ahmed, Dana Hasan
Published: (2017) -
Distributed defense scheme for managing DNS reflection attack in network communication systems
by: Ahmed, Dana Hasan, et al.
Published: (2016) -
An Enhanced Mechanism To Detect Drdos Attacks On Dns Using Adaptive Thresholding Technique
by: Al Ogaili, Riyadh Rahef Nuiaa
Published: (2023) -
An efficient secure and energy resilient trust-based system for detection and mitigation of sybil attack detection (SAN)
by: Hussain, Muhammad Zunnurain, et al.
Published: (2024) -
Detection and prevention schemes for ddos, arp
spoofing, and ip fragmentation attacks in smart factory
by: Chai, Tze Uei
Published: (2023)