2004
DOI: 10.1023/b:jons.0000015699.50210.e3
|View full text |Cite
|
Sign up to set email alerts
|

Distributed Management Architecture for Cooperative Detection and Reaction to DDoS Attacks

Abstract: We propose a cooperative intrusion detection framework focused on countering Distributed Denial of Service (DDoS) attacks through the introduction of a distributed overlay early-warning network. Our goal is to minimize the detection and reaction time and automate responses, while involving as many networks as possible along the attack path. The proposed approach relies on building a "community" of trusted partners that will cooperate by exchanging security information so that inclusion in the attack path is de… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
16
0
1

Year Published

2006
2006
2018
2018

Publication Types

Select...
5
3
1

Relationship

0
9

Authors

Journals

citations
Cited by 26 publications
(17 citation statements)
references
References 18 publications
0
16
0
1
Order By: Relevance
“…The existing wireless network routing protocols are not able to find the routes lengthy than two or more hops if there is no mechanism for defending wormhole attacks which disrupts communication severely. [11,15,19]. Wormhole helps in the networking services as it offers a lengthy network link to the link layer and up which is useful for the attacker to use that link.…”
Section: Threats To Wireless Lanmentioning
confidence: 99%
“…The existing wireless network routing protocols are not able to find the routes lengthy than two or more hops if there is no mechanism for defending wormhole attacks which disrupts communication severely. [11,15,19]. Wormhole helps in the networking services as it offers a lengthy network link to the link layer and up which is useful for the attacker to use that link.…”
Section: Threats To Wireless Lanmentioning
confidence: 99%
“…Based on whether to take into account the relationship between traffic, multinodes detection can be further differentiated between distributed detection and network-wide detection. Distributed detection [3][4][5][6][7][8][9][10] is to select some nodes in the network to construct subdetection networks. First, each node deploys simple and fast local detection by selfcollected information; second, exchange detecting results of each node through a certain communication mechanism; then, synthesize the results of partial or all nodes to determine whether anomaly occurs.…”
Section: Related Workmentioning
confidence: 99%
“…propose a cooperative intrusion detection framework [1,2,3], focused on countering DDoS. This platform enables cooperate entities through the network.…”
Section: Related Workmentioning
confidence: 99%