AN INVESTIGATION OF SECURITY TECHNIQUES FOR CONCEALED DDOS EXPOSURE ATTACKS
Journal Title: ICTACT Journal on Communication Technology - Year 2018, Vol 9, Issue 1
Abstract
Due to the influence of the multi-level system, the DDoS became a significant investigation in modern days. This encourages us to reduce the data loss and service overheads. In order to investigate these issues, an investigation of the DDoS attack and their related security techniques were analyzed in this paper. So, in this investigation, various data about the intruders will be collected by employing a secured multi-layered design with nomadic honeypots. Our proposed Subterranean Optimization procedure is utilized to distinguish the gatecrashers in view of the pheromone store on that considered zone. A multi-degree IP log table is utilized to distinguish the gatecrashers at diverse ranges of the device. Once the prompted range is found, the information is sent to multi-degree engineering to restrain the spreading of the stimulated region within the honeypot. This statistics will be dispatched to the honeypot to make a guard framework towards the attackers. The advantage of this proposed strategy is that it gives a complete barrier against DDoS at multilevel without making any overhead.
Authors and Affiliations
Praghash K, Masthan M
QUALITY OF SERVICE IMPROVEMENTS IN IEEE 802.11AX WI-FI
IEEE 802.11ax is the latest high rate Wi-Fi technology (also known as high efficiency Wireless) introduces some new features like OFDMA, Uplink multi-user MIMO (UL MU-MIMO) to deliver benefits in reliability, capacity, a...
FUZZY LOGIC BASED ENERGY EFFICIENT PROTOCOL IN WIRELESS SENSOR NETWORKS
Wireless sensor networks (WSNs) have been vastly developed due to the advances in microelectromechanical systems (MEMS) using WSN to study and monitor the environments towards climates changes. In environmental monitorin...
DESIGN AND ANALYSIS OF COMB SHAPE MICROSTRIP PATCH ARRAY ANTENNA FOR WLAN APPLICATIONS
A comb shape rectangular slotted 1 X 4 microstrip patch array antenna is proposed and designed for wireless local area network applications. The functional parameters of the antenna namely, return loss, VSWR, radiation p...
AN INVESTIGATION OF SECURITY TECHNIQUES FOR CONCEALED DDOS EXPOSURE ATTACKS
Due to the influence of the multi-level system, the DDoS became a significant investigation in modern days. This encourages us to reduce the data loss and service overheads. In order to investigate these issues, an inves...
ENERGY EFFICIENT CENTRALIZED DYNAMIC CLUSTERING RESERVATION MAC PROTOCOL FOR MWSN
Mobile wireless sensor networks (MWSN) have recently emerged as a hot research topic as their communication links and topology change due to node mobility. In a dynamically changing environment it is essential to build e...