• DocumentCode
    2159154
  • Title

    Design and implementation of a new roaming honeypots defense strategy

  • Author

    Zeng-gang, Xiong ; Xue-min, Zhang

  • Author_Institution
    Sch. of Comput. & Inf. Sci., Xiaogan Univ., Xiaogan, China
  • Volume
    4
  • fYear
    2010
  • fDate
    26-28 Feb. 2010
  • Firstpage
    535
  • Lastpage
    538
  • Abstract
    This paper presents a DDoS (Distributed Denial of Service) two stage defense model based on roaming honeypot. The model can accurately identify the early features of DDoS attacks, and can automatically select effective detection features according to different types of DDoS attacks to accurately determine the legitimacy of IP flows with a smaller consumption, so that to a smaller consumption roam and avoid being attacked.
  • Keywords
    IP networks; Internet; distributed processing; feature extraction; security of data; DDoS attacks; DDoS two stage defense model; IP flows legitimacy; distributed denial of service; effective detection features; roaming honeypots defense strategy; smaller consumption roam; Authentication; Cities and towns; Computer crime; Distributed computing; Game theory; IP networks; Information science; Information security; Network servers; Object oriented modeling; DDoS; network security; roaming honeypot;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Computer and Automation Engineering (ICCAE), 2010 The 2nd International Conference on
  • Conference_Location
    Singapore
  • Print_ISBN
    978-1-4244-5585-0
  • Electronic_ISBN
    978-1-4244-5586-7
  • Type

    conf

  • DOI
    10.1109/ICCAE.2010.5451592
  • Filename
    5451592