International E-publication: Publish Projects, Dissertation, Theses, Books, Souvenir, Conference Proceeding with ISBN.  International E-Bulletin: Information/News regarding: Academics and Research

Collection system Infected systems using Stationary and Event driven IP Sinkholes

Author Affiliations

  • 1Department of Computer engineering, Qeshm international Branch, Islamic Azad University, Qeshm, IRAN
  • 2Department of Computer engineering, Qeshm international Branch, Islamic Azad University, Qeshm, IRAN

Res. J. Computer & IT Sci., Volume 3, Issue (3), Pages 1-3, June,20 (2015)

Abstract

In relation to unknown identity of net users especially internet users?today we can face the increase of attacks on many kind of services. The reason of most of attack can be begin with a simple curiosity and can be continue with a destructive targets. For prevention, discrimination and stopping the attacks, in first step, we should able to recognize time and situation of attacks occurrence. Enemy recognition and knowing his plans can be increase our success against them. There are many different methods for attack recognition and thereby detect infected systems are available but in this article, collection system infected systems using stationary and event driven IP sinkholes is simulated.

References

  1. Zhu Z., Lu G., Chen Y., Fu Z., Roberts P. and Han K., , Botnet research survey., In Computer Software and Applications, 2008. COMPSAC
  2. Mazzariello C., IRC traffic analysis for botnet detection, , In Information Assurance and Security,, 2008. ISIAS
  3. Bau J., Bursztein E., Gupta D. and Mitchell J., , State of the art: Automated black-box web application vulnerability testing,, In Security and Privacy (SP), 2010 IEEESymposium, 332-345 (2010)
  4. Axelsson S., , Intrusion detection systems: A survey and taxonomy,, 99 Technical report, (2000)
  5. Fuchsberger A., , Intrusion detection systems and intrusion prevention systems,, Information Security TechnicalReport, 10(3), 134-139 (2005)