probing attacks
Recently Published Documents


TOTAL DOCUMENTS

29
(FIVE YEARS 10)

H-INDEX

6
(FIVE YEARS 1)

2021 ◽  
Author(s):  
Movva Sai Chaithanya ◽  
Suresh Nikudiya ◽  
Varsha S Basanaik ◽  
Damodar Reddy ◽  
Hanumanthu Bhukya

Abstract Intrusion Detection Systems and Intrusion Prevention Systems are used to detect and prevent attacks/malware from entering the network/system. Honeypot is a type of Intrusion Detection System which is used to find the intruder, study the intruder and prevent the intruder to access the original system. It is necessary to build a strong honeypot because if it is compromised, the original system can be easily targeted by the attacker. To overcome such challenges an efficient honeypot is needed that can shut the attacker after extracting his attack technique and tools. In this paper, a Venus fly-trap optimization algorithm has been used for implementing the honeypot system along with Intrusion Detection System. Venus plants are a type of carnivorous plants that catch their prey intelligently. By adopting this feature we make an effective honeypot system that will intelligently interact with the attacker. A new fitness function has been proposed to identify size of the attacker. The effectiveness of the proposed fitness function has been evaluated by comparing it with state of the art. For comparison, remote-to-local attacks, probing attacks and DOS attacks are performed on both proposed and existing models. The proposed model is significant to catch/block all the intruders which were caught by the art and also the proposed model reduces the time of interaction between the attacker and honeypot system thereby giving minimum information to the attacker.


2021 ◽  
Author(s):  
Donald Q. Adams ◽  
Hemanta K. Maji ◽  
Hai H. Nguyen ◽  
Minh L. Nguyen ◽  
Anat Paskin-Cherniavsky ◽  
...  

Author(s):  
Huanyu Wang ◽  
Qihang Shi ◽  
Adib Nahiyan ◽  
Domenic Forte ◽  
Mark M. Tehranipoor

2020 ◽  
Vol 10 (1) ◽  
pp. 5142-5147 ◽  
Author(s):  
M. F. Hyder ◽  
M. A. Ismail

Intent-Based Networking (IBN) is an emerging networking paradigm while Moving Target Defense (MTD) is an active security technique. In this paper, the Intent-based Moving Target Defense (INMTD) framework using Software Defined Networks is proposed. INMTD is the first effort in exploiting IBN for the design of an efficient Moving Target Defense (MTD) framework. INMTD uses the concept of shadow servers in order to counter the first stage of cyber-attacks, i.e. reconnaissance attacks targeted against servers running in SDN networks. INMTD comprises of an MTD application running on an SDN controller. The MTD application has reconnaissance detection, MTD movement, and MTD monitoring modules. The MTD application is integrated with the intent-based northbound API of SDN controller. INMTD not only provides protection against probing attacks, but it also provides high availability due to shadow servers. The proposed framework was implemented using Mininet and ONOS SDN controller. The proposed framework was assessed in terms of defender cost, attacker’s effort, and introduced complexity in the system. The results substantiate the efficient protection against reconnaissance attacks at lower computational cost.


2020 ◽  
Vol 128 (11) ◽  
pp. 1758
Author(s):  
А.В. Борисова ◽  
Б.Д. Гармаев ◽  
И.Б. Бобров ◽  
С.С. Негодяев ◽  
И.В. Синильщиков

In this paper, the results of research of spectral features of several passive fiber optic components are presented. There are spectra of isolators, circulators, spectral filters, and WDM, that are used in quantum key distribution (QKD) systems, and contribute to the protection of these systems against active optical probing attacks. We also provide an estimate of the degree of isolation required to protect the QKD system from Trojan-horse attacks. Based on the isolation requirements and measurement data we analyzed the efficiency of the QKD system protection through the use passive isolating components. As an example, we have shown the achievement of the required isolation level (150 dB) in the considered spectral range in the system presented in the article.


Sign in / Sign up

Export Citation Format

Share Document