Approaches in DOS Attacks

Abstract

Application DoS attack,has emerged as a larger threat to network services, compared to the classic DoS attack. To identify application DoS attack, we propose a novel group testing (GT)-based approach deployed on back-end servers. These approaches not only obtain short detection delay and low false positive/negative rate, but also defend against general network attacks. Here we first extend classic GT model with size constraints, then redistribute the client service requests to multiple virtual servers. Here we propose a detection mechanism using some dynamic thresholds to efficiently identify the attackers.

Authors and Affiliations

MR Seshan Ram

Keywords

Related Articles

Formation and Detection of Holes in Wireless Sensor Networks

Monitoring the desired Region of interest (RoI) is one amongst the most services provided by Wireless Sensor Network. In Region of interest (RoI) the emergence of holes is inevitable because of random preparation and en...

Shadow Detection and Its Removal from Images Using Advance Strong Edge Detection Method (ASED)

Shadow causes dilemma during the recognition of objects from images in different computer vision applications, so it is a very critical job to confiscate shadow from images that’s why in this paper a new method for shad...

Proper Diagnosis and Automation System for Detection of Malaria Infected Blood Cells in a Microscopic Images of a Blood

Malaria is a mosquito-borne disease mainly caused by the plasmodium parasites carried by a mosquito of Anopheles genus. Mainly there are five kinds of Plasmodium parasites namely plasmodium falciparum, plasmodium vivax,...

Secure Deduplication with Authorized Duplicate Check Using Convergent Encryption in Cloud

Increased growth of cloud storage turns the focus of cloud service providers to save their resources to earn more profit by renting them to the multiple cloud users. One of the main factors that utilizes more space and...

Performance Analysis of Physical Layer of WiMAX 802.16 using 64 QAM

IEEE 802.16 is an emerging technology for the future telecommunication standards. All Communication standards follows the basic OSI model.OSI model have seven layers. Upper layers responsible for user interface and lowe...

Download PDF file
  • EP ID EP22657
  • DOI -
  • Views 210
  • Downloads 5

How To Cite

MR Seshan Ram (2016). Approaches in DOS Attacks. International Journal for Research in Applied Science and Engineering Technology (IJRASET), 4(9), -. https://europub.co.uk/articles/-A-22657