A Rule-Based Technique to Detect Router Advertisement Flooding Attack Against BioBizz Web Application

被引:2
作者
Aleesa, Ahmed Marwan [1 ]
Hassan, Rosilah [1 ]
Kamal, Saif Uldun Mostfa [1 ]
机构
[1] Univ Kebangsaan Malaysia, Fac Informat Sci & Technol FTSM, Res Ctr Software Technol & Management SOFTAM, Ukm Bangi 43600, Selangor, Malaysia
关键词
DDoS; BioBizz; IPv6; Router Advertisement Attack; Detection;
D O I
10.1166/asl.2016.7744
中图分类号
O [数理科学和化学]; P [天文学、地球科学]; Q [生物科学]; N [自然科学总论];
学科分类号
07 ; 0710 ; 09 ;
摘要
Distributed Denials of Service (DDoS) attacks are rapidly becoming a popular attack vector used by hackers and hack activists. With the proliferation of botnets, there has been a massive increase of DDoS attacks and more and more organizations, not only large enterprises and service providers, are seeking a solution. One of these solution is to detect the attack when it happens, A BioBizz website has been created to develop a communication medium for ukm reasearcher and connect them with the companies and costumers, the website will include the sensitive information about the researcher, companies and costumers and connect between these three parties. The main aim of this research is to develop a BioBizz web base application ships with a security technique in order to detect IPv6 DDOS flooding attacks of BioBizz website. The threshold-based technique for detecting IPv6 DDoS against victim machine for proposed aggregation based techniques to detect IPv6 DDoS anomalies, verify and validate the proposed techniques in term of accuracy detection and compare it with other existing approach.
引用
收藏
页码:1887 / 1891
页数:5
相关论文
共 18 条
[1]  
Ahmed A. S., 2012, Proceedings of the 2012 8th International Conference on Information Science and Digital Content Technology (ICIS and IDCTA), P218
[2]  
Al-Hemyari Abdulmalek, 2013, Journal of Theoretical and Applied Information Technology, V55, P109
[3]  
[Anonymous], 2014, BOOK GNS3
[4]  
Asmak Ismail NurulHalimatul., 2012, Journal of Theoretical and Applied Information Technology, V41, P220
[5]  
Calvet J., 2010, P 3 INT C CYB SEC EX
[6]  
Choudhary A. R., 2009, COLLABORATIVE COMPUT
[7]  
Choudhary A R., 2010, IEEE INT C TECHN HOM
[8]  
Cup K., 2014, DATA INFORM COMPUTER
[9]  
Das D., 2011, P INT C COMM COMP SE
[10]  
Elhamahmy M., 2010, INT J ARTIFICIAL INT