Honeypots are physical or virtual machines successfully used as intrusion detection tools to detect worm-infected hosts. Denial of service (DoS) attack consumes the resources of a remote client or network itself, there by denying or degrading the service to the legitimate users. In a DoS defense mechanism, a honeypot acts as a detective server among the pool of servers in a specific network; where any packet received by the honeypot is most likely a packet from an attacker. This paper points out a number of drawbacks such as Legitimate Attacker and Link Unreachable problem in the existing honeypot schemes. This paper proposes a new efficient honeypot model to solve all the existing problems by opening a virtual communication port for any specific communication between an authorized client and server; and by providing facility to act as an Active Server (AS) for any honeypot. © 2008 IEEE.
CITATION STYLE
Das, V. V. (2009). Honeypot scheme for distributed denial-of-service attack. In Proceedings - International Conference on Advanced Computer Control, ICACC 2009 (pp. 497–501). https://doi.org/10.1109/ICACC.2009.146
Mendeley helps you to discover research relevant for your work.