IP Traceback for Flooding Attacks on Internet Threat Monitors (ITM) Using Honeypots

The Internet Threat Monitoring (ITM) is an efficient monitoring system used globally to measure, detect, characterize and track threats such as Denial of Service (DoS) and Distributed Denial of Service (DDoS) attacks and worms. To block the monitoring system in the internet the attackers are targeted the ITM system. In this paper, the authors address the flooding attack of DDoS against ITM monitors to exhaust the network resources, such as bandwidth, computing power, or operating system data structures by sending the malicious traffic.

Provided by: Academy & Industry Research Collaboration Center Topic: Security Date Added: Jan 2012 Format: PDF

Find By Topic