Ant-based distributed denial of service detection technique using roaming virtual honeypots
Journal article
Authors/Editors
Research Areas
No matching items found.
Publication Details
Author list: Selvaraj R, Kuthadi VM, Marwala T
Publisher: Institution of Engineering and Technology (IET)
Place: HERTFORD
Publication year: 2016
Journal: IET Communications (1751-8628)
Journal acronym: IET COMMUN
Volume number: 10
Issue number: 8
Start page: 929
End page: 935
Number of pages: 7
ISSN: 1751-8628
eISSN: 1751-8636
Languages: English-Great Britain (EN-GB)
View in Web of Science | View on publisher site | View citing articles in Web of Science
Abstract
Nowadays, distributed denial of service (DDoS) becomes a major challenge in the network as it affects the network at multi-level. This leads to traffic overhead and wastage of bandwidth utilisation. In order to overcome these issues, ant-based DDoS detection technique using roaming virtual honeypots is proposed. In this technique, virtual roaming honeypot along with the multi-level secure architecture is used to collect the information about the various intruders at different levels in the network. Ant colony optimisation technique is used to detect the intruders based on the pheromone deposit on that considered area. A multi-level IP log table is used to detect the intruders at different levels of the network. Once the affected area is found, the information is sent to multi-level architecture to limit the spread of the affected area to the honeypot. This information is sent to the honeypot to make a defence system against the attackers. The advantage of the proposed technique is that it provides a full defence against DDoS at multi-level without creating any traffic overhead.
Keywords
ant-based DDoS detection technique, ant-based distributed denial-of-service detection technique, ant colony optimisation, ant colony optimisation technique, bandwidth utilisation wastage, computer network security, defence system, intruder detection, IP networks, multilevel IP log table, multilevel secure architecture, pheromone deposit, roaming virtual honeypots, telecommunication traffic, traffic overhead
Documents
No matching items found.