2016
DOI: 10.1016/j.procs.2016.03.103
|View full text |Cite
|
Sign up to set email alerts
|

DDoS Attack Analyzer: Using JPCAP and WinCap

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2018
2018
2023
2023

Publication Types

Select...
3
1

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(3 citation statements)
references
References 1 publication
0
3
0
Order By: Relevance
“…The Java Agent Development framework (JADE) is a library implemented in Java for the development and execution of intelligent agents [24]. JPCAP is a project that was developed to detect intruder activity in a network based on the existing signatures of intrusion attacks or abnormal behaviors [25]. Aglets (agent applets) are mobile Java agents that can move from one host to another [26].…”
Section: Resultsmentioning
confidence: 99%
“…The Java Agent Development framework (JADE) is a library implemented in Java for the development and execution of intelligent agents [24]. JPCAP is a project that was developed to detect intruder activity in a network based on the existing signatures of intrusion attacks or abnormal behaviors [25]. Aglets (agent applets) are mobile Java agents that can move from one host to another [26].…”
Section: Resultsmentioning
confidence: 99%
“…In [ 51 ], it has been proposed that to overcome the limitations of capturing high volume traffic resulting from DoS cyber-attacks, simulated senors can be adopted in controlled conditions. However, in the end, whether in real or virtual environments, the meeting point will always be a network interface in listening mode that adequately supports a large number of frames and thus a tool that can sense and store them.…”
Section: Proposed Methodologymentioning
confidence: 99%
“…Some of the tools used in DDoS attack simulation include NS2, LOIC, XOIC, HULK, PyLoris, DAVOSET and DDoS flowgen. • TCP floods done by randomizing all the 32-bits of the source IP address • Flood packets generated via random control flags WinCap and JpCap [18] TCP,UDP,ICMP TCP dump, UDP and ICMP dump…”
Section: Overview Of Ddos Attack Simulation Methods and Toolsmentioning
confidence: 99%