Flooding Attacks to Internet Threat Monitors (ITM): Modeling and Counter Measures Using Botnet and Honeypots

The Internet Threat Monitoring (ITM),is a globally scoped Internet monitoring system whose goal is to measure, detect, characterize, and track threats such as Distribute Denial of Service(DDoS) attacks and worms. To block the monitoring system in the internet the attackers are targeted the ITM system. In this paper, they address flooding attack against ITM system in which the attacker attempt to exhaust the network and ITM's resources, such as network bandwidth, computing power, or operating system data structures by sending the malicious traffic.
Provided by: Academy & Industry Research Collaboration Center Topic: Security Date Added: Dec 2011 Format: PDF

Find By Topic