Ant-based distributed denial of service detection technique using roaming virtual honeypots

Journal article


Authors/Editors


Research Areas

No matching items found.


Publication Details

Author list: Selvaraj R, Kuthadi VM, Marwala T

Publisher: Institution of Engineering and Technology (IET)

Place: HERTFORD

Publication year: 2016

Journal: IET Communications (1751-8628)

Journal acronym: IET COMMUN

Volume number: 10

Issue number: 8

Start page: 929

End page: 935

Number of pages: 7

ISSN: 1751-8628

eISSN: 1751-8636

Languages: English-Great Britain (EN-GB)


View in Web of Science | View on publisher site | View citing articles in Web of Science


Abstract

Nowadays, distributed denial of service (DDoS) becomes a major challenge in the network as it affects the network at multi-level. This leads to traffic overhead and wastage of bandwidth utilisation. In order to overcome these issues, ant-based DDoS detection technique using roaming virtual honeypots is proposed. In this technique, virtual roaming honeypot along with the multi-level secure architecture is used to collect the information about the various intruders at different levels in the network. Ant colony optimisation technique is used to detect the intruders based on the pheromone deposit on that considered area. A multi-level IP log table is used to detect the intruders at different levels of the network. Once the affected area is found, the information is sent to multi-level architecture to limit the spread of the affected area to the honeypot. This information is sent to the honeypot to make a defence system against the attackers. The advantage of the proposed technique is that it provides a full defence against DDoS at multi-level without creating any traffic overhead.


Keywords

ant-based DDoS detection technique, ant-based distributed denial-of-service detection technique, ant colony optimisation, ant colony optimisation technique, bandwidth utilisation wastage, computer network security, defence system, intruder detection, IP networks, multilevel IP log table, multilevel secure architecture, pheromone deposit, roaming virtual honeypots, telecommunication traffic, traffic overhead


Documents

No matching items found.


Last updated on 2021-07-05 at 03:59