Defeating Internet Attacks Using Risk Awareness and Active Honeypots
IWIA '04 Proceedings of the Second IEEE International Information Assurance Workshop (IWIA'04)
DDoS attacks and defense mechanisms: classification and state-of-the-art
Computer Networks: The International Journal of Computer and Telecommunications Networking
Design of network security projects using honeypots
Journal of Computing Sciences in Colleges
Evaluation of a low-rate DoS attack against iterative servers
Computer Networks: The International Journal of Computer and Telecommunications Networking
Honeypot back-propagation for mitigating spoofing distributed Denial-of-Service attacks
Journal of Parallel and Distributed Computing - Special issue: Security in grid and distributed systems
Data base support for intrusion detection with honeynets
TELE-INFO'07 Proceedings of the 6th WSEAS Int. Conference on Telecommunications and Informatics
Intrusion Prevention in Information Systems: Reactive and Proactive Responses
Journal of Management Information Systems
An efficient analytical solution to thwart DDoS attacks in public domain
Proceedings of the International Conference on Advances in Computing, Communication and Control
A cost-based analysis of intrusion detection system configuration under active or passive response
Decision Support Systems
Honeypot back-propagation for mitigating spoofing distributed denial-of-service attacks
IPDPS'06 Proceedings of the 20th international conference on Parallel and distributed processing
Mathematical foundations for the design of a low-rate dos attack to iterative servers (short paper)
ICICS'06 Proceedings of the 8th international conference on Information and Communications Security
Assessment of a vulnerability in iterative servers enabling low-rate dos attacks
ESORICS'06 Proceedings of the 11th European conference on Research in Computer Security
Low rate dos attack to monoprocess servers
SPC'06 Proceedings of the Third international conference on Security in Pervasive Computing
DarkNOC: dashboard for honeypot management
LISA'11 Proceedings of the 25th international conference on Large Installation System Administration
Queuing algorithms performance against buffer size and attack intensities in DDOS attacks
ADCONS'11 Proceedings of the 2011 international conference on Advanced Computing, Networking and Security
Hi-index | 0.00 |
Distributed Denial-of-Service attacks are still a big threat the Internet. Several proposals for coping with the attacks have been made in the recent past, but neither of them are successful themselves alone. In this paper, we present a system that helps the defence in depth of a network from DDoS attacks. In addition to state-of-art active and passive security defences, we propose honeypot for such attacks. The goal is to convincingly simulate the success of the compromise of a system to a potential DDoS attacker. Thereby, we can implement the lessons learned by the honeypot in our other systems to harden them against such attacks. On the other hand, we protect the rest of our network infrastructure form the impact of such an attack.