2018
DOI: 10.11591/eei.v7i4.1349
|View full text |Cite
|
Sign up to set email alerts
|

Defense-through-Deception Network Security Model: Securing University Campus Network from DOS/DDOS Attack

Abstract: Denial of Service (DOS) and (DDOS) Distributed Denial of Service attacks have become a major security threat to university campus network security since most of the students and teachers prepare online services such as enrolment, grading system, library etc. Therefore, the issue of network security has become a priority to university campus network management. Using online services in university network can be easily compromised. However, traditional security mechanisms approach such as Defense-In-Depth (DID) … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
17
0
1

Year Published

2020
2020
2024
2024

Publication Types

Select...
5
4

Relationship

0
9

Authors

Journals

citations
Cited by 25 publications
(18 citation statements)
references
References 6 publications
0
17
0
1
Order By: Relevance
“…In this case, study of Wi-Fi intrusion was done by a neural network classifier [18]. For training purposes, the CICIDS dataset [19] is used to validate the intrusion detection algorithm with recurrent neural networks [20,21]. The present research paper is mainly based on IoT scenarios and help in detecting vulnerability concerning the IoT.…”
Section: Related Workmentioning
confidence: 99%
“…In this case, study of Wi-Fi intrusion was done by a neural network classifier [18]. For training purposes, the CICIDS dataset [19] is used to validate the intrusion detection algorithm with recurrent neural networks [20,21]. The present research paper is mainly based on IoT scenarios and help in detecting vulnerability concerning the IoT.…”
Section: Related Workmentioning
confidence: 99%
“…On the other hand, DDoS attack packet flows produce low enough variance values close to zero due to the monotonous size of packets sent by bots to the target server [16]. The formula for calculating package size variances presented in (2). (2)…”
Section: The Variance Of Packet Size (In Bytes)mentioning
confidence: 99%
“…Distributed denial of service attacks (DDoS) is a type of attack that has a quite fatal impact on the target server [1]. DDoS attacks originate from a collection of small-sized data packet streams sourced from a large number of bot computers to produce a massive data flow directed at a target server [2]. DDoS attacks are controlled by attackers who coordinate a large number of bot/slave computers intending to shut down and deplete server resources, including CPU, memory, disk storage, and bandwidth, so that legitimate clients cannot access the allocated resources [3].…”
Section: Introductionmentioning
confidence: 99%
“…The available NSL-KDD dataset in [19][20][21] was utilized to evaluate the ANN model in this study. The NSL-KDD Dataset is the update version of 99KDD dataset [22][23][24]. The NSL-KDD was recorded according to a practical 125973 requests of a website in 2013.…”
Section: Testing Datasetmentioning
confidence: 99%