A Survey On Various Defense Mechanisms Against Application Layer Distributed Denial Of Service Attack
Journal Title: International Journal on Computer Science and Engineering - Year 2011, Vol 3, Issue 11
Abstract
The severity of application layer Distributed Denial of Service attack has become a major threat to network operators nowadays. Application layer Distributed Denial of Service attack causes unavailability of resources, revenue loss, and customer churns etc and is one of the most difficult problems to defend against in the internet. The goal of paper is to understand various techniques proposed recently to defend against specifically application layer Distributed Denial of Service attack. The next step in the path would be to come up with a better solution to solve this problem. Undoubtedly the following discussed techniques are extremely good. A collaborative approach using few of them can be a better solution.
Authors and Affiliations
Ms. Anuja R. Zade , Dr. Suhas . H. Patil
Suggestion of True Popular Items
Making of suggestion of items using user’s feedback creates some problems in the actual ranking of the items. It populates some items while it suppresses some thers. In short, it affects the original popularity of the i...
TRAFFIC ANALYSIS OF DSR, AODV AND OLSR USING TCP AND UDP
Mobile Ad-hoc Network (MANET) is a collection of wireless mobile nodes dynamically forming a temporary network without the aid of any established infrastructure or centralized administration. Routing protocols in MANET h...
A GA Approach to Static Task Scheduling in Grid based Systems
Static task scheduling in computational grids is very important because of the optimal usage of computing time for scheduling algorithms. Given a set of resources, a static scheduler computes the execution schedule befor...
Biometric Template Security Using Invisible Watermarking With Minimum Degradation in Quality of Template
In this paper, we present an approach to enhance the Biometric Template Security by using Invisible Watermarking. For embedding the watermark in the Biometric Template, we used Parity Checker Method [2]. The use of Parit...
Design of MIMO Space-Time Code for High Data Rate Wireless Communication
Multiple-input and multiple-output, or MIMO, is the use of multiple antennas at both the transmitter and receiver to improve communication performance. MIMO technology has attracted attention in wireless communications,...