AN INVESTIGATION OF SECURITY TECHNIQUES FOR CONCEALED DDOS EXPOSURE ATTACKS
Journal Title: ICTACT Journal on Communication Technology - Year 2018, Vol 9, Issue 1
Abstract
Due to the influence of the multi-level system, the DDoS became a significant investigation in modern days. This encourages us to reduce the data loss and service overheads. In order to investigate these issues, an investigation of the DDoS attack and their related security techniques were analyzed in this paper. So, in this investigation, various data about the intruders will be collected by employing a secured multi-layered design with nomadic honeypots. Our proposed Subterranean Optimization procedure is utilized to distinguish the gatecrashers in view of the pheromone store on that considered zone. A multi-degree IP log table is utilized to distinguish the gatecrashers at diverse ranges of the device. Once the prompted range is found, the information is sent to multi-degree engineering to restrain the spreading of the stimulated region within the honeypot. This statistics will be dispatched to the honeypot to make a guard framework towards the attackers. The advantage of this proposed strategy is that it gives a complete barrier against DDoS at multilevel without making any overhead.
Authors and Affiliations
Praghash K, Masthan M
AN ENERGY EFFICIENT CLUSTER-HEAD FORMATION AND MEDIUM ACCESS TECHNIQUE IN MULTI-HOP WBAN
In the present era, Wireless Body Area Network (WBAN) has emerged as one of the most desired healthcare technologies. Along with healthcare, its application area includes sports, entertainment, battlefield etc. Any time...
CERTIFICATE REVOCATION SCHEME BASED ON WEIGHTED VOTING GAME AND RATIONAL SECURE MULTIPARTY COMPUTING
The Mobile Adhoc Network consists of deployed mobile nodes which lead to the frequent changes in network topology. Due to topology changes, required infrastructure is unavailable for communication. Moreover, malicious no...
COOPERATIVE SPECTRUM SENSING SCHEME USING FUZZY LOGIC TECHNIQUE
In communication system spectrum has a crucial role and wireless technologies are increasing rapidly it is required to make efficient use of spectrum to satisfy the spectrum scarcity problem. Using spectrum efficiently c...
IMPROVEMENT OF FAR FIELD RADIATION PATTERN OF LINEAR ARRAY ANTENNA USING GENETIC ALGORITHM
In this paper, the beam pattern of Linear Array Antennas with isotropic elements is examined. The design goal is to reduce the sidelobe level with a minimum beamwidth increase for the far field radiation pattern of the a...
A MULTI AWARE MULTI-LEVELS HETEROGENOUS ROUTING (MAMHR) PROTOCOL FOR WIRELESS SENSOR NETWORKS
Wireless Sensor Networks (WSNs) are generally set out in a remote workplace, since the sensor nodes are tiny in size, cost-proficient, low-power gadgets, and have restricted battery supply. Due to the constrained availab...