A Systematic Puzzle Approach of Deploying Software For Restricting Dos & DDOS Attacks

Abstract

In the network denial of service (DoS) and distributed DoS (DDoS) attacks intend to prevent legitimate clients from accessing services are considered a serious hazard to the availability and reliability of the internet services. For example, server receives huge number of junk request from malicious client. For each request, server has to waste extra CPU time for completing process of SSL handshakes .Server cannot handle requests of services from its true customers because it may not have enough resources to handle the request. As a result of this attack is vanished businesses and reputation lost. Represented an advance mechanism that refers as the software puzzle, the aim of this mechanism is to prevent DoS or DDoS attacks and provide services to valid clients. The idea is quite simple. When a client wants to acquire a service from the server, client sends a simple request to the server. After getting the client request, the server sends one puzzle challenge to client. Client must first solve a complex structure puzzle correctly and submit it to the server for accessing services. Server verifies this puzzle solution, if it is correct then server agrees to establish connection with client. To solve this puzzle by every client, prevent vulnerable connection. A software puzzle is different kinds of methods or complex structure or problem which uses sequence of steps and solving these steps client can access resources. Timestamp, data length, key length and software puzzle complexity these attributes are used for security purpose in puzzle generation process and generates puzzle dynamically. I have used the SPEKE algorithm for key generation; it provides high level security and thwarts man-in-middle attack by password. Implement the RC7 algorithm for encryption purpose. It provides best result in case of throughput and time consumption and provides high level security.

Authors and Affiliations

Gelli Naga Venkata Vinay Kumar| M.Tech (CSE), Nimra Institute Of Science & Technology, A.P., India, Md. Amanatulla| Associate Professor, Dept. of Computer Science & Engineering, Nimra Institute Of Science & Technology, A.P., India

Keywords

Related Articles

The Data Storage and Assured Sharing Methodology among Differing Groups in Cloud Computing

Cloud computing, with the qualities of inherent data sharing and low maintenance, gives a superior usage of assets. To safeguard data security, a typical approach is to encrypt data files before the customers transfe...

Condition Examine And Flaw Determination In Induction Motor- An Exploration

Induction motor notably three phase induction motor plays dynamic role in the industry due to their advantages over other electrical motors. Therefore, there is anextreme demand for their intenseand secure operation....

She–PWM Cascaded Seven level Inverter With Adjustable DC Voltage Levels Control For D-Statcom Applications

In this paper presents a new multilevel selective harmonic elimination pulse-width modulation (MSHE–PWM) technique for transformer less static synchronous compensator (STATCOM) system employing cascaded H-bridge i...

A Technique To Sieve Annoying Communications From Osn Client Walls

Internet safety or online social network safety is the security of people and their information when using the Internet. Social media safety means protecting your personal information and terminates the untrusted inf...

Blending Cloud Mode With Well-Balanced Recognised Redundancy Elimination Technique

Data deduplication is a critical system in support dispose of excess information as an option of enthralling records; it provisions simply distinct copy of file. Together with the whole associations stockpiling patte...

Download PDF file
  • EP ID EP16792
  • DOI -
  • Views 247
  • Downloads 6

How To Cite

Gelli Naga Venkata Vinay Kumar, Md. Amanatulla (2016). A Systematic Puzzle Approach of Deploying Software For Restricting Dos & DDOS Attacks. International Journal of Science Engineering and Advance Technology, 4(9), 481-484. https://europub.co.uk/articles/-A-16792