ENGINEERING DATA-DRIVEN STRATEGIES FOR REDUCING THE COST OF CARE

Authors

  • Bhaskara Rao Arepall USA. Author

Keywords:

Distributed Denial Of Service (DDoS), Assaults, Botnets, Honeypot, Cloud Computing

Abstract

DDoS assaults present a significant menace to the Internet. With the increasing prevalence of the Internet of Things (IoT), the DDoS attack has evolved beyond a simple traffic attack. The primary focus of the attack has shifted from the network layer to the application layer. In addition, DDoS attacks utilizing botnets yield more devastating consequences. The objective of this study is to introduce a novel collaborative active defensive framework that combines Honeypot and cloud platform technologies. This framework is designed to identify and protect against future Distributed Denial of Service (DDoS) assaults inside the Internet of Things (IoT) context. The framework is capable of detecting and mitigating large volumes of malicious traffic, measured in Terabytes, in real-time.

References

The CISCO's 2019 report highlights the critical threats faced by aganists in defending their operations.

Zargar, Joshi, and Tipper's 2013 survey explores defense mechanisms against DDoS flooding attacks in IEEE Commun. Surv. Tutorials, pp. 2046-2069.

Cloudbric's blog post, "Has Your Website Been Bitten by a Zombie?", discusses a possible zombie bite on a website.

Mirkovic, J., and Reiher's 2004 publication provides a taxonomy of DDoS attack and defense mechanisms.

K. Shridhar and N. Gautam's 2014 study on cloud DDoS attacks prevention using honeypots provides valuable insights into enhancing security measures. pp. 2319–7064, 2014,

[Online]. Available:

https://www.ijsr.net/archive/v3i11/T0NUMTQxNTQ0.pdf.

N. Weiler's 2002 paper discusses the use of honeypots for distributed denial-of-service attacks in the Proceedings of the Workshop on Enabling Technologies: Infrastructure for Collaborative Enterprises.

J. Nazario's 2008 publication, "DDoS attack evolution," explores the evolution of such attacks in the field of network security.

The study by Malik and Singh provides a comprehensive review on DoS and DDoS attacks, published in the International Journal of Computer Science and Mob. Computervol. 4, no. 6, pp. 260–265, 2015.

Cloudflare provides a comprehensive explanation of a DDoS attack, which is a type of cyber attack that involves the use of malicious software to infiltrate a system https://www.cloudflare.com/learning/ddos/what-is-a-ddos-attack/.

L. Newman reported a 1.3-Tbs DDoS attack on GitHub, the largest recorded yet, as reported by wired.com in 2018 https://www.wired.com/story/github-ddos-memcached/.

C. K. Ng, L. Pan, and Y. Xiang's 2018 publication, "Honeypot Frameworks and Their Applications: A New Framework," provides an introduction to this framework Springer, Singapore, 2018, pp. 1–5.

L. Spitzner's 2001 book, Honeypots: Concepts, Approaches, and Challenges, provides a comprehensive understanding of the value of honeypots

R. Vishwakarma and A. K. Jain, “A honeypot with machine learning based detection framework for defending IoT based botnet DDoS attacks,” in Proceedings of the IEEE International Conference on Trends in Electronics and Informatics, ICOEI 2019, 2019, pp. 1019–1024.

G. Vasile and O. Cangea's 2018 study explores honeypot technology for

virtual space monitoring-conpot operation in Pet. Univ. Ploiesti Bull. Tech. Ser vol. 70, no. 1, 2018.

S. Dwiyatno, A. P. Sari, A. Irawan, and S. Safig discuss the implementation of DDoS service to generate revenue for PT. Torini Jaya Abid in 2019 vol. 2, no. 2, pp. 64–80, 2019.

R. Venkatesan, G. Ashwin Kumar, and M. Ragu Nandhan presented a novel approach to detect DDOS attacks through virtual honeypot at the IEEE International Conference on System, Computation, Automation and Networking ICSCA 2018, 2018.

The study by Rao, Sekharaiah, and Rao explores distributed denial-of-service (DDoS) defense techniques in ISP domains, published in Innovations in Computer Science and Engineering pringer, Singapore, 2019, pp. 221–230.

The Mirai Botnet, as explained by Cloudflare, is a cyber security tool designed to protect against cyber threats https://www.cloudflare.com/en-gb/learning/ddos/glossary/miraibotnet/.

CISCO's "Cloud Security Products and Solutions" (2020) provides comprehensive information on cloud security solutions https://www.cisco.com/c/en_uk/products/security/cloudsecurity/index.html.

CISCO, “CISCO Cloudlock,” 2021. https://www.cisco.com/c/en_uk/products/security/cloudlock/index.html.

Dyn, “Dyn Status Updates Oct 2016,” 2016. https://www.dynstatus.com/incidents/nlr4yrr162t8.

EVE-NG, “EVE - The Emulated Virtual Environment for Networks, Security and DevOps Professionals,” 2021. https://www.eve-ng.net/.

Kali, “The Most Advanced Penetration Testing Distribution,” 2021. https://www.kali.org/.

WMware, “Server Virtualisation Software - vSphere,” 2021. https://www.vmware.com/uk/products/vsphere.html.

V. B. S and R. Kartheek, "A Review on Effective Detection and Prevention for DDOS Attack in Cloud Virtual Environment Using Honeypot," 2023 International Conference on Computing, Communication, and Intelligent Systems (ICCCIS), Greater Noida, India, 2023, pp. 939-946, doi:

1109/ICCCIS60361.2023.10425464. keywords: {Cloud computing; Emulation; Denial-of-service attack; Hardware; Malware; Security; Information systems; honeypot; distributed denial of service (DDOS); attacks},

Downloads

Published

2024-11-19

How to Cite

Bhaskara Rao Arepall. (2024). ENGINEERING DATA-DRIVEN STRATEGIES FOR REDUCING THE COST OF CARE. INTERNATIONAL JOURNAL OF COMPUTER ENGINEERING AND TECHNOLOGY (IJCET), 15(6), 501-511. https://mylib.in/index.php/IJCET/article/view/IJCET_15_06_042