Approaches in DOS Attacks
Journal Title: International Journal for Research in Applied Science and Engineering Technology (IJRASET) - Year 2016, Vol 4, Issue 9
Abstract
Application DoS attack,has emerged as a larger threat to network services, compared to the classic DoS attack. To identify application DoS attack, we propose a novel group testing (GT)-based approach deployed on back-end servers. These approaches not only obtain short detection delay and low false positive/negative rate, but also defend against general network attacks. Here we first extend classic GT model with size constraints, then redistribute the client service requests to multiple virtual servers. Here we propose a detection mechanism using some dynamic thresholds to efficiently identify the attackers.
Authors and Affiliations
MR Seshan Ram
Staysmiling: An Android Application to Relieve Stress
A key challenge for mobile health is to develop a new technology that can assist individuals in maintaining a healthy life style. Now a day’s peoples are so busy in their daily schedules and not having enough time to co...
Robot Leg Mechanisms
The Paper focuses on the walking mechanisms for a moving Robot. It describes designs of the leg drive mechanisms, hardware architecture and the leg control methods for walking machines. The body of knowledge that applie...
Analysis of Water Quality of Samples Collected from Thevara Region, Kerala, India
By analysing the water sample of the region of Thevara we want to understand the quality of water used by the people of this region. Water quality refers to the chemical, physical, biological, and radiological character...
Static and Structural Analysis of Camshaft
Camshaft is all about opening and closing of valves in a piston engine. In the combustion chamber of a piston engine we have an intake stroke, compression stroke, expansion stroke and an exhaust stroke. In the intake st...
slugMaintaining Data Security In Privacy Preserving Association Rule Mining
This paper is based on the various data mining techniques which are used to detect some unwanted transaction in data base. Our approach concentrates on mining data dependencies among data items in the database. A data d...