DocumentCode
2159154
Title
Design and implementation of a new roaming honeypots defense strategy
Author
Zeng-gang, Xiong ; Xue-min, Zhang
Author_Institution
Sch. of Comput. & Inf. Sci., Xiaogan Univ., Xiaogan, China
Volume
4
fYear
2010
fDate
26-28 Feb. 2010
Firstpage
535
Lastpage
538
Abstract
This paper presents a DDoS (Distributed Denial of Service) two stage defense model based on roaming honeypot. The model can accurately identify the early features of DDoS attacks, and can automatically select effective detection features according to different types of DDoS attacks to accurately determine the legitimacy of IP flows with a smaller consumption, so that to a smaller consumption roam and avoid being attacked.
Keywords
IP networks; Internet; distributed processing; feature extraction; security of data; DDoS attacks; DDoS two stage defense model; IP flows legitimacy; distributed denial of service; effective detection features; roaming honeypots defense strategy; smaller consumption roam; Authentication; Cities and towns; Computer crime; Distributed computing; Game theory; IP networks; Information science; Information security; Network servers; Object oriented modeling; DDoS; network security; roaming honeypot;
fLanguage
English
Publisher
ieee
Conference_Titel
Computer and Automation Engineering (ICCAE), 2010 The 2nd International Conference on
Conference_Location
Singapore
Print_ISBN
978-1-4244-5585-0
Electronic_ISBN
978-1-4244-5586-7
Type
conf
DOI
10.1109/ICCAE.2010.5451592
Filename
5451592
Link To Document