Honeypot scheme for distributed denial-of-service attack

11Citations
Citations of this article
34Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Honeypots are physical or virtual machines successfully used as intrusion detection tools to detect worm-infected hosts. Denial of service (DoS) attack consumes the resources of a remote client or network itself, there by denying or degrading the service to the legitimate users. In a DoS defense mechanism, a honeypot acts as a detective server among the pool of servers in a specific network; where any packet received by the honeypot is most likely a packet from an attacker. This paper points out a number of drawbacks such as Legitimate Attacker and Link Unreachable problem in the existing honeypot schemes. This paper proposes a new efficient honeypot model to solve all the existing problems by opening a virtual communication port for any specific communication between an authorized client and server; and by providing facility to act as an Active Server (AS) for any honeypot. © 2008 IEEE.

Cite

CITATION STYLE

APA

Das, V. V. (2009). Honeypot scheme for distributed denial-of-service attack. In Proceedings - International Conference on Advanced Computer Control, ICACC 2009 (pp. 497–501). https://doi.org/10.1109/ICACC.2009.146

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free