Detailed Information

Cited 0 time in webofscience Cited 0 time in scopus
Metadata Downloads

A Hybrid Defense Technique for ISP Against the Distributed Denial of Service Attacks

Full metadata record
DC Field Value Language
dc.contributor.authorMoon, Young Hoon-
dc.contributor.authorChoi, Suk Bong-
dc.contributor.authorKim, Huy Kang-
dc.contributor.authorYoo, Changsok-
dc.date.accessioned2021-09-05T06:02:06Z-
dc.date.available2021-09-05T06:02:06Z-
dc.date.created2021-06-15-
dc.date.issued2014-09-
dc.identifier.issn1935-0090-
dc.identifier.urihttps://scholar.korea.ac.kr/handle/2021.sw.korea/97638-
dc.description.abstractAs malicious traffic from botnets now threatens the network infrastructure of Internet Service Providers (ISPs), the importance of controlling botnets is greater than ever before. However, it is not easy to handle rapidly evolving botnets efficiently because of the highly evolved detection avoidance techniques used by botnet makers. Further, nowadays, Distributed Denial of Service (DDoS) attacks can compromise not only specific target sites but also the entire network infrastructure, as high-bandwidth Internet services are now being provided. Thus, ISPs are deploying their own defense systems to prevent DDoS attacks and protect their network infrastructure. However, the new problem ISPs confront is that botnet masters also try to destroy their defense systems to make their attack successful. ISPs can mitigate DDoS through botnet-specific management by taking preemptive measures, such as the proactive reverse engineering of suspicious code and the use of honeypots. This paper illustrates an advanced DDoS defense technique for the use of ISPs with a real case study of the technique's implementation. This technique was proven very effective method for controlling botnets, and we could confirm this effectiveness in a real ISP environment.-
dc.languageEnglish-
dc.language.isoen-
dc.publisherNATURAL SCIENCES PUBLISHING CORP-NSP-
dc.subjectDDOS-
dc.subjectBOTNETS-
dc.titleA Hybrid Defense Technique for ISP Against the Distributed Denial of Service Attacks-
dc.typeArticle-
dc.contributor.affiliatedAuthorKim, Huy Kang-
dc.identifier.doi10.12785/amis/080530-
dc.identifier.scopusid2-s2.0-84896880773-
dc.identifier.wosid000338123400030-
dc.identifier.bibliographicCitationAPPLIED MATHEMATICS & INFORMATION SCIENCES, v.8, no.5, pp.2347 - 2359-
dc.relation.isPartOfAPPLIED MATHEMATICS & INFORMATION SCIENCES-
dc.citation.titleAPPLIED MATHEMATICS & INFORMATION SCIENCES-
dc.citation.volume8-
dc.citation.number5-
dc.citation.startPage2347-
dc.citation.endPage2359-
dc.type.rimsART-
dc.type.docTypeArticle-
dc.description.journalClass1-
dc.description.journalRegisteredClassscopus-
dc.relation.journalResearchAreaMathematics-
dc.relation.journalResearchAreaPhysics-
dc.relation.journalWebOfScienceCategoryMathematics, Applied-
dc.relation.journalWebOfScienceCategoryPhysics, Mathematical-
dc.subject.keywordPlusDDOS-
dc.subject.keywordPlusBOTNETS-
dc.subject.keywordAuthorSecurity-
dc.subject.keywordAuthorBotnet-
dc.subject.keywordAuthorInternet Service Provider-
dc.subject.keywordAuthorDistributed Denial of Service attack-
Files in This Item
There are no files associated with this item.
Appears in
Collections
School of Cyber Security > Department of Information Security > 1. Journal Articles

qrcode

Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.

Altmetrics

Total Views & Downloads

BROWSE