مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

Persian Verion

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

video

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

sound

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

Persian Version

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View:

510
مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

Download:

0
مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

Cites:

Information Journal Paper

Title

Distributed Denial of Service attacks identification using payload signature production

Pages

  39-48

Abstract

 With the development of new information and communication technologies and the pervasive use of cyberspace, distributed denial of service (DDOS) attacks are a serious threat to online organizations. These attacks can have destructive effects, for example, on one of its effects can be in terms of the public face of the trademark and its revenue. A good way to deal with DDOS attacks is to save a Signature for each attack. Today, most organizations and institutions, both national and military (military and law enforcement) face such attacks, so in this study, while trying to identify Intrusion Detection systems in the proposed method to produce the necessary Signatures to explain. Using this method, any attack can be detected as soon as this Signature is found in traffic. However, this process is not easy and the Signature production process is usually time consuming and requires a lot of effort. To help solve this challenge of generating Signature problems, in this research, we propose an automated method for generating data-based Signatures for DDOS attacks. This study also examines the relationships between different data packets of the same attack. In fact, data packet-based digital Signatures are used for attacks whose pattern and core are the same, with only minor differences in the structure of the attack. The research concludes with a proposal for a Signature generation algorithm and its validation using applied tools.

Cites

  • No record.
  • References

  • No record.
  • Cite

    APA: Copy

    Tohidian, younes, JAHANSHIRI, JAVAD, Shoraka, Hadi, & Zahed, Amir Hossein. (2021). Distributed Denial of Service attacks identification using payload signature production. INFORMATION AND COMMUNICATION TECHNOLOGY IN POLICING, 1(4 ), 39-48. SID. https://sid.ir/paper/382553/en

    Vancouver: Copy

    Tohidian younes, JAHANSHIRI JAVAD, Shoraka Hadi, Zahed Amir Hossein. Distributed Denial of Service attacks identification using payload signature production. INFORMATION AND COMMUNICATION TECHNOLOGY IN POLICING[Internet]. 2021;1(4 ):39-48. Available from: https://sid.ir/paper/382553/en

    IEEE: Copy

    younes Tohidian, JAVAD JAHANSHIRI, Hadi Shoraka, and Amir Hossein Zahed, “Distributed Denial of Service attacks identification using payload signature production,” INFORMATION AND COMMUNICATION TECHNOLOGY IN POLICING, vol. 1, no. 4 , pp. 39–48, 2021, [Online]. Available: https://sid.ir/paper/382553/en

    Related Journal Papers

    Related Seminar Papers

  • No record.
  • Related Plans

  • No record.
  • Recommended Workshops






    Move to top
    telegram sharing button
    whatsapp sharing button
    linkedin sharing button
    twitter sharing button
    email sharing button
    email sharing button
    email sharing button
    sharethis sharing button