Indonesi
an
Journa
l
of El
ect
ri
cal Engineer
ing
an
d
Comp
ut
er
Scie
nce
Vo
l.
9
, No
.
3
,
Ma
rch
201
8
,
pp.
543
~
545
IS
S
N:
25
02
-
4752
,
DOI: 10
.11
591/
ijeecs
.
v9.i
3
.
pp
543
-
545
543
Journ
al h
om
e
page
:
http:
//
ia
es
core.c
om/j
ourn
als/i
ndex.
ph
p/ij
eecs
Incursi
on
Recogn
ition
M
ec
h
anis
m
Based
On Secu
re Netw
or
k
System
A.
M
ohamed
Divan
M
asood
1
, S
.
K. M
ut
h
usundar
2
1
Inform
at
ion
T
e
chnol
og
y
,
AM
ET
Univer
si
t
y
,
Ch
enna
i
,
Ind
ia
2
Depa
rtment of
computer
sci
ence,
Sri
Muthukum
ara
n
Inst
it
ut
e
of
Te
chno
log
y
,
Ind
ia
Art
ic
le
In
f
o
ABSTR
A
CT
Art
ic
le
history:
Re
cei
ved
N
ov
21
, 201
7
Re
vised
Jan
2
9
, 201
8
Accepte
d
Fe
b
1
7
, 201
8
I
nte
rne
t
base
d
computing
dissim
il
ar
servic
es
such
as
serve
r
storage
an
d
appl
i
ca
t
ions
are
share
d
on
th
e
in
te
rne
t.
Thi
s
m
ak
es
cl
oud
computing
one
of
the
m
ost
prom
isi
ng
and
ra
pidly
g
rowing
te
chnol
o
gie
s.
As
it
re
li
es
on
sharing
computer
re
source
s,
it
is
prone
t
o
var
ious
sec
urity
risks.
Indi
vidua
l
suc
h
sec
urity
issue
is
Distributed
De
nia
l
of
Servi
ce
s
at
t
ac
k
on
cl
ou
d.
A
DD
os
assault
ca
n
beg
i
n
from
any
p
la
c
e
in
the
s
y
stem
a
nd
norm
al
l
y
ove
rpowers
the
ca
sual
t
y
serve
r
b
y
send
ing
count
l
ess.
Thi
s
p
ape
r
d
ea
ls
wi
th
th
e
pr
e
vent
ion
o
f
DD
os
at
ta
cks
an
d
how
hone
y
po
t
appr
oa
ch
c
an
be
used
in
cl
oud
computing
to
coun
te
r
DD
os a
t
ta
cks
.
Ke
yw
or
d
s
:
DDos
Distrib
uted De
nial o
f
Se
rv
ic
e
s
Copyright
©
201
8
Instit
ut
e
o
f Ad
vanc
ed
Engi
n
ee
r
ing
and
S
cienc
e
.
Al
l
rights re
serv
ed
.
Corres
pond
in
g
Aut
h
or
:
A.
M
oh
am
ed Diva
n
Ma
s
ood
,
Inform
at
ion
Te
chnolo
gy,
AMET
Un
i
versi
ty
, Ch
en
nai,
I
nd
ia
.
1.
INTROD
U
CTION
Den
ia
l
of
se
rv
i
ce
(DoS
)
at
ta
cks
ha
s
bee
n
one
of
t
he
m
ajo
r
netw
ork
sec
ur
i
ty
pr
oble
m
s
ov
er
t
he
la
st
decad
e
s.
D
oS
at
ta
cks
can
usual
ly
be
m
ou
nt
ed
on
ha
rdwa
re
de
vices
su
c
h
as
r
oute
rs
a
nd
fire
wall
s
to
sen
d
sp
oo
fin
g
m
essages
t
o
the
ta
r
ge
t
netw
ork
[
1].
Th
us
,
m
et
ho
ds
f
or
de
feati
ng
su
c
h
DoS
at
ta
cks
a
re
highly
r
el
at
ed
to
the
vulne
rabi
li
t
ie
s
in
the
ha
rdwar
e
de
vices
[2
]
.
I
n
t
h
is
pa
per,
we
in
vestigat
e
the
pote
nt
ia
l
at
ta
cks
sp
ec
ific
t
o
the
ha
rdwar
e
i
nfrastr
uctu
re
of
the
net
wor
k
and
al
s
o
cat
eg
or
iz
e
the
c
ount
erm
easur
es
ag
ai
ns
t
DoS
at
ta
cks
that
can
be
im
ple
m
ented
on
ha
rdwar
e
de
vices
[
3].
Mor
eo
ver,
we
analy
ze
the
adv
a
ntage
s
of
the
em
erg
ing
sil
ic
on
ph
ysi
cal
unso
l
vab
le
f
unct
ions
and
disc
us
s
the
po
te
ntial
of
integrati
ng
them
into
auth
entic
at
ion
m
eth
ods
in
order t
o de
fend
ag
ai
nst
DoS
att
acks [4].
Re
centl
y
us
ed
as
an
at
ta
ckin
g
platf
or
m
to
form
la
rg
er
sc
al
e
of
flo
od
i
ng
DDoS
at
ta
cks
,
and
at
t
ack
flo
ws
bec
om
e
m
or
e
distribu
te
d
an
d
eve
n
m
o
re
har
m
fu
l
m
akin
g
it
increasing
ly
hard
to
be
detect
ed
eff
ec
ti
vely
DDoS at
ta
cks a
re id
e
ntifie
d, i
f
a se
r
ver
or
ne
twork
is alrea
dy
d
ow
n or
ex
ha
us
te
d f
or a
whil
e
[5
]
.
It
is
dif
ficult
to
disti
nguis
h
th
e
le
gitim
at
e
pack
et
s
on
norm
al
traff
ic
a
nd
pa
ckets
se
nt
by
com
pu
te
rs
is
Me
dia
Access
Delay
and
T
hro
ughp
ut
An
al
ysi
s
of
V
oice
Cod
ec
with
Si
le
nce
Sup
pr
ess
ion
on
W
i
rele
ss
Ad
Ho
c
Netw
ork
[
6].
Hen
ce
,
ther
e
is
a
la
g
in
DD
oS
at
ta
ck
detect
ion
.
As
la
r
ge
nu
m
ber
of
pa
ckets
is
tran
s
m
itted,
m
or
e
tim
e
is
r
equ
i
red
t
o
anal
yz
e
each
inco
m
ing
pac
ket
is
Op
ti
m
al
Sched
ulin
g
Ba
se
d
on
Insta
nce
Niche
f
or
Chan
nel
Assi
gn
m
ent
in
Ad
-
H
oc
Netw
ork
O
pti
m
al
Sche
du
li
ng
Ba
se
d
O
n
In
sta
nce
Niche
f
or
C
hannel
Assignm
ent in Ad
-
H
oc Net
work
[
7]
.
Evaluation Warning : The document was created with Spire.PDF for Python.
IS
S
N
:
2502
-
4752
Ind
on
esi
a
n
J
E
le
c Eng &
Co
m
p
Sci,
Vol
.
9
,
No.
3
,
Ma
rc
h
201
8
:
543
–
545
544
2.
PROP
OSE
D
SY
STE
M
An
e
ff
ic
ie
nt
hop
-
by
-
ho
p
ho
ne
y
po
t
m
echani
s
m
is
pr
opos
e
d
into
m
it
igate
the
spo
of
in
g
distrib
uted
DoS att
acks.
Here b
a
ck p
ropa
gation i
s p
e
rfo
r
m
ed
to trace
ba
ck
the
roo
t
of a
tt
acks.
I
n
a
ddit
ion
,
roam
ing
hon
ey
po
ts
sch
em
e
pr
ovides
acc
ur
a
te
at
ta
ck
sig
na
t
ur
es
Total
e
nergy
E
ff
ic
ie
nc
y
of
cel
lular
la
rg
e
scal
e
a
nten
na
syst
e
m
m
ulti
pl
e
acce
ss
m
ob
il
e
netw
orks
[
8].
O
n
receivin
g
at
ta
ck
pac
kets,
the
ro
am
ing
honey
pot
trig
ge
rs
th
e
act
ivati
on
of
a
tree
of
honey
po
t
sessio
ns
r
oote
d
at
the
ho
ne
y
pot
un
der
the
at
ta
ck
to
w
a
rd
at
ta
ck
s
ourc
es.
T
o
reduce
t
he
delay
progressi
ve
back
pr
op
a
gation
is
use
d
to
ha
nd
le
l
ow
-
rate
at
ta
cks
su
c
h
a
s
on
–
off
at
ta
ck
s
with
sh
ort
bursts.
Howe
ver
the
re
is
no
secu
rity
syst
e
m
to
protect
the
honey
po
ts
f
r
om
un
know
n
at
ta
cks
f
al
se
neg
at
ives
false
posit
ives
and
as
a
re
sul
t
hap
pe
ning.
I
f
an
at
ta
cke
r
breaks
i
nto
ho
ne
y
po
t
it
will
br
ea
k
the
hone
y
po
t
connecti
ons a
nd m
ake it a b
ounce
r.
We h
a
ve
pr
opose
d
A
DTR
VH
wh
e
re th
e
virtua
l ro
am
ing
h
on
ey
p
ot is u
se
d
al
ong
with t
he
m
ul
ti
-
le
vel
secur
e
arc
hitec
ture
t
o
c
ollec
t t
he
in
f
or
m
at
ion
r
e
gardin
g vari
ou
s
intr
uders
a
t diff
e
re
nt leve
ls i
n
the
n
et
work.
3.
ARCHITE
CT
UR
E
DI
AGR
AM
4.
RESU
LT
A
N
D DIS
CUSSI
ON
The
prese
nt
inv
entio
n
f
ur
t
he
r
co
ntem
plate
s
that
in
so
m
e
instances
it
m
ay
be
desir
ou
s
to
disabl
e
certai
n
ta
sks
r
egardless
of
m
e
m
or
y
or
pr
oc
essor
util
iz
at
ion
.
Su
c
h
a
n
in
s
ta
nce
c
ou
l
d
occ
ur,
f
or
exam
ple,
if
a
us
er
wish
e
d
to
disable
al
l
att
ack
sign
at
ur
e
s
m
ade
irrelevant
by
the
netw
ork
inf
or
m
at
ion
disco
ve
red
on
the
netw
ork
.
Alth
ough
the
pr
e
se
nt
inve
ntio
n
ha
s
bee
n
de
scri
bed
i
n
detai
l,
it
sh
ould
be
under
st
ood
th
at
var
i
ou
s
change
s
,
substi
tuti
on
s
a
nd
al
te
rati
on
s
c
an
be
m
ade
thereto
without
de
pa
rting
from
the
spi
rit
and
sc
ope
of
t
he
inv
e
ntion as
de
fine
d by the a
ppen
de
d
cl
ai
m
s.
5.
CONCL
US
I
O
N
In
this
wor
k,
we
in
vestigat
e
d
the
idea
of
nectar
pots
ins
ide
an
d
out
a
nd
per
cei
ved
h
ow
it
m
ay
be
valua
ble
to
the
fiel
d
of
syst
em
secur
it
y.
The
idea
of
necta
r
po
ts
is
an
ess
entia
l
exp
an
sio
n
to
the
secu
rity
fiel
d.
Nectar
po
ts
off
er
a
hosti
le
wa
y
to
deal
with
interr
up
ti
on
re
cogniti
on
an
d
sh
ir
king.
Abo
ve
al
l
they
fill
i
n
as
a
le
arn
in
g
a
ppar
at
us
f
or
f
ram
ewor
k
ove
rse
ers
a
nd
f
ur
t
he
rm
or
e
inclu
de
d
c
on
si
der
i
ng
iss
ues
c
on
c
ern
i
ng
interr
up
ti
on
lo
cat
ion
f
ram
ewo
r
ks
the
diff
ic
ulti
es
that
these
fr
am
ewo
r
ks
confro
nted.
T
he
W
eb
has
tu
r
ned
out
to
be
fun
dam
e
ntal
both
at
the
var
i
ou
s
le
vele
d
an
d
i
nd
i
vidu
al
le
vel
in
this
way
it
will
be
the
ci
rc
um
sta
nce
with
secur
it
y
struct
ur
e
.
The
us
ag
e
of
necta
r
pots
and
relat
ed
de
ve
lop
m
ents
is
on
the
risin
g.
A
s
care
an
d
exci
tem
ent
for nect
ar
pots
fabrica
te
s so wi
ll
it
s u
sage i
n a relat
ion
s
hi
p
a
s a sec
ur
it
y ga
dg
et
.
REFERE
NCE
S
[1
]
Yass
er
Alosefe
r,
Om
er
Rena
.
Nec
tar
item:
a
n
el
e
ct
ronic
lo
w
partic
ipation
cl
ie
n
t
hone
y
pot
.
Th
ird
IEEE
Inte
rna
ti
ona
l
Co
nfe
re
nc
e
on
Soft
ware
T
esti
ng
,
V
eri
fi
ca
t
ion, a
nd
Vali
da
ti
on
W
ork
shops
(ICSTW
).
2010.
[2]
Xiao
a
Sun,
et
a
l.
Co
ll
e
ct
ing
Int
erne
t
Ma
lware
Based
on
C
li
en
t
-
side
Honey
pot
.
9
th
IEEE
In
te
rn
a
ti
onal
Confer
ence
for
Young Com
pute
r
Sc
ie
nt
ists (
ICVCS
2008).
2
008.
[3]
C
H
Nick
Jap,
et
a
l.
The
use
of
honey
pot
ap
proach
in
softw
are
-
based
applicati
on
prot
ec
t
io
n
for
shar
eware
progr
ams
,
IEE
E Inte
rna
ti
ona
l
Co
nfe
re
nc
e
on
Co
m
puti
ng
&
Infor
m
at
ic
s
.
(ICOCI
'06)
2006.
[4]
Jian
Boae
t
a
l.
Look
int
o
on
system
sec
urity
of
resistance
in
l
igh
t
of
Nec
tar
pot
.
IEE
E
Int
ern
atio
nal
Confer
en
ce
on
Com
pute
r
Appli
ca
t
ion
and
S
y
st
e
m
Modeli
ng
.
(IC
CAS
M).
2010.
C
l
i
en
t
F
R
O
N
T
-
END
SE
R
V
E
R
A
U
T
H
E
N
T
ICA
T
IO
N
SE
R
V
E
R
R
O
U
T
E
R
B
A
C
K
-
E
N
D
SE
R
V
E
R
Evaluation Warning : The document was created with Spire.PDF for Python.
Ind
on
esi
a
n
J
E
le
c Eng &
Co
m
p
Sci
IS
S
N:
25
02
-
4752
In
c
ur
si
on Reco
gn
it
io
n
Mec
ha
nism
Base
d O
n Sec
ur
e
(
A.M
ohame
d Diva
n Mas
ood
)
545
[5]
R
C
Jos
hi.
Nect
ar
pot
Based
Guiding
to
Dire
ct
DD
oS
Ambush
es
on
Serv
ers
a
t
ISP
Lev
el
.
IE
EE
Int
ern
a
ti
ona
l
S
y
m
posium
s on
Inform
at
ion
Pro
ce
ss
ing
(ISIP
).
2
008.
[6]
Shah
R
D,
Singh
S
K.
Media
Ac
ce
ss
Delay
and
Thr
oughput
An
aly
sis
of
Voi
ce
Codec
wit
h
Sile
nce
Suppress
ion
on
W
irel
ess A
d
Hoc
Net
work
.
Proc
e
dia
Com
pute
r
Sc
ie
nc
e
.
2016;
79
; 940
-
947.
[7]
Ariva
zha
g
an
D,
Hele
n
D.
Optimal
Sche
duli
ng
Based
On
Inst
ance
Nic
h
e
for
Channel
Assignment
in
Ad
-
Hoc
Net
work.
[8]
H.
Yang,
et
al
,
“
Total
ene
r
gy
Ef
f
ic
i
ency
of
ce
l
lul
ar l
arge
scale
ante
nna
syst
em
multi
ple
ac
ces
s mobil
e
net
works,
”
I
n
Proc.
IE
EE Onli
ne
Gre
en
Com
m
,
2013
,
pp
.
27
-
32
Evaluation Warning : The document was created with Spire.PDF for Python.