Packet Marking Based Cooperative Attack Response Service for Effectively Handling Suspicious Traffic

Author(s):  
Gaeil An ◽  
Joon S. Park
1996 ◽  
Vol 26 (6) ◽  
pp. 967-972 ◽  
Author(s):  
René I. Alfaro ◽  
G.K. Kiss ◽  
A. Yanchuk

The intensity of the traumatic resin response in white spruce, Piceaglauca (Moench) Voss, to attack by the white pine weevil, Pissodesstrobi Peck, was studied in trees with different severities of attack. The response level was highest in trees where the attacks failed, i.e., where eggs were laid but the brood was killed and no adults emerged. Successfully attacked trees had, on average, only 62% of the response intensity of trees with failed attacks. Response intensity in trees that had been subjected only to feeding was much lower, at 42% of the failed attack response. Healthy unattacked trees showed no or little traumatic resin response. Response intensity varied in a nonlinear fashion with the number of eggs laid, increasing rapidly from zero in healthy trees, being highest in trees having between 10 and 60 egg punctures, and progressively lower again in trees with higher numbers of egg punctures. For a given number of egg punctures, resistant white spruce trees had a consistently higher traumatic resin response than susceptible trees. The number of eggs laid on a leader was inversely related to the intensity of the traumatic resin response and to the timing of the attack. Fewer eggs were laid on leaders with high traumatic resin response or attacked late in the season than on leaders with lower resin response or attacked early in the season.


Author(s):  
P. Vetrivelan ◽  
M. Jagannath ◽  
T. S. Pradeep Kumar

The Internet has transformed greatly the improved way of business, this vast network and its associated technologies have opened the doors to an increasing number of security threats which are dangerous to networks. The first part of this chapter presents a new dimension of denial of service attacks called TCP SYN Flood attack has been witnessed for severity of damage and second part on worms which is the major threat to the internet. The TCP SYN Flood attack by means of anomaly detection and traces back the real source of the attack using Modified Efficient Packet Marking algorithm (EPM). The mechanism for detecting the smart natured camouflaging worms which is sensed by means of a technique called Modified Controlled Packet Transmission (MCPT) technique. Finally the network which is affected by these types of worms are detected and recovered by means of Modified Centralized Worm Detector (MCWD) mechanism. The Network Intrusion Detection and Prevention Systems (NIDPS) on Flooding and Worm Attacks were analyzed and presented.


Sign in / Sign up

Export Citation Format

Share Document