Approaches in DOS Attacks

Abstract

Application DoS attack,has emerged as a larger threat to network services, compared to the classic DoS attack. To identify application DoS attack, we propose a novel group testing (GT)-based approach deployed on back-end servers. These approaches not only obtain short detection delay and low false positive/negative rate, but also defend against general network attacks. Here we first extend classic GT model with size constraints, then redistribute the client service requests to multiple virtual servers. Here we propose a detection mechanism using some dynamic thresholds to efficiently identify the attackers.

Authors and Affiliations

MR Seshan Ram

Keywords

Related Articles

Staysmiling: An Android Application to Relieve Stress

A key challenge for mobile health is to develop a new technology that can assist individuals in maintaining a healthy life style. Now a day’s peoples are so busy in their daily schedules and not having enough time to co...

Robot Leg Mechanisms

The Paper focuses on the walking mechanisms for a moving Robot. It describes designs of the leg drive mechanisms, hardware architecture and the leg control methods for walking machines. The body of knowledge that applie...

Analysis of Water Quality of Samples Collected from Thevara Region, Kerala, India

By analysing the water sample of the region of Thevara we want to understand the quality of water used by the people of this region. Water quality refers to the chemical, physical, biological, and radiological character...

Static and Structural Analysis of Camshaft

Camshaft is all about opening and closing of valves in a piston engine. In the combustion chamber of a piston engine we have an intake stroke, compression stroke, expansion stroke and an exhaust stroke. In the intake st...

slugMaintaining Data Security In Privacy Preserving Association Rule Mining

This paper is based on the various data mining techniques which are used to detect some unwanted transaction in data base. Our approach concentrates on mining data dependencies among data items in the database. A data d...

Download PDF file
  • EP ID EP22657
  • DOI -
  • Views 248
  • Downloads 5

How To Cite

MR Seshan Ram (2016). Approaches in DOS Attacks. International Journal for Research in Applied Science and Engineering Technology (IJRASET), 4(9), -. https://europub.co.uk/articles/-A-22657