TY - JOUR
T1 - Ant-based distributed denial of service detection technique using roaming virtual honeypots
AU - Selvaraj, Rajalakshmi
AU - Kuthadi, Venu Madhav
AU - Marwala, Tshilidzi
N1 - Publisher Copyright:
© The Institution of Engineering and Technology 2016.
PY - 2016/5/19
Y1 - 2016/5/19
N2 - Nowadays, distributed denial of service (DDoS) becomes a major challenge in the network as it affects the network at multi-level. This leads to traffic overhead and wastage of bandwidth utilisation. In order to overcome these issues, ant-based DDoS detection technique using roaming virtual honeypots is proposed. In this technique, virtual roaming honeypot along with the multi-level secure architecture is used to collect the information about the various intruders at different levels in the network. Ant colony optimisation technique is used to detect the intruders based on the pheromone deposit on that considered area. A multi-level IP log table is used to detect the intruders at different levels of the network. Once the affected area is found, the information is sent to multi-level architecture to limit the spread of the affected area to the honeypot. This information is sent to the honeypot to make a defence system against the attackers. The advantage of the proposed technique is that it provides a full defence against DDoS at multi-level without creating any traffic overhead.
AB - Nowadays, distributed denial of service (DDoS) becomes a major challenge in the network as it affects the network at multi-level. This leads to traffic overhead and wastage of bandwidth utilisation. In order to overcome these issues, ant-based DDoS detection technique using roaming virtual honeypots is proposed. In this technique, virtual roaming honeypot along with the multi-level secure architecture is used to collect the information about the various intruders at different levels in the network. Ant colony optimisation technique is used to detect the intruders based on the pheromone deposit on that considered area. A multi-level IP log table is used to detect the intruders at different levels of the network. Once the affected area is found, the information is sent to multi-level architecture to limit the spread of the affected area to the honeypot. This information is sent to the honeypot to make a defence system against the attackers. The advantage of the proposed technique is that it provides a full defence against DDoS at multi-level without creating any traffic overhead.
UR - http://www.scopus.com/inward/record.url?scp=84969577528&partnerID=8YFLogxK
U2 - 10.1049/iet-com.2015.0497
DO - 10.1049/iet-com.2015.0497
M3 - Article
AN - SCOPUS:84969577528
SN - 1751-8628
VL - 10
SP - 929
EP - 935
JO - IET Communications
JF - IET Communications
IS - 8
ER -