Detecting Network And Application Layer Attacks in Networks
Journal Title: International Journal of Research in Computer and Communication Technology - Year 2014, Vol 3, Issue 11
Abstract
Distributed Denial of Service (DDoS) flooding attacks are launched by attackers disturbing server services as well as Individual users who are active in internet.espicially attackers are targeting network Transport level DDOS flooding attacks and application level ddos attacks. disrupt a legitimate user’s connectivity by exhausting bandwidth, router processing capacity or network resources these are essentially network transport-level flooding attacks and disrupt a legitimate user’s services by exhausting the server resources like sockets, CPU, memory, disk,database bandwidth, these essentially include application-level flooding attacks .monitor and ddos detecting algorithm and host based intrusion detection system is proposed to prevent these attacks. finally our approach is efficient and effective.
Authors and Affiliations
N. V. V. Soujanya, G. Uma Mahesh
Anti Phishing approach using Visual Cryptography and Iris Recognition
Phishing is a form of online identity theft. Phishing webpages are forged webpages created by malicious people that aim to steal sensitive information such as online banking passwords and credit card informations. Th...
Implementation of Symmetric Stream Cipher for Text Encryption Using Key Sequence of Cyclic Elliptical Curve Points Based on PRNG
In this paper, cyclic elliptic curves of the form y2 = x 3 + ax + b mod p € E(Fp) with order N is considered in the design of a symmetric key text Encryption Scheme with Key Sequence derived from random sequence of...
Co-Operative Riskless Data Publishing Using Cpdp In Multi Colud
Cloud computing is a new and fast growing technology that offers an innovative, efficient and scalable business model for organizations to adopt various information technology (IT) resources i.e. software, hardware,...
Alcohol Detection System
This system provides a unique method to curb drunken people. The system has an alcohol sensor embedded on the steering of the car. Whenever the driver starts ignition, the sensor measures the content of the alcohol i...
A Framework for Refusal DDOS Attack Location Procuring Into Account Multivariate Relationship Assessment
This paper discussed the consequences of MCA on the Distributed DoS discovery and recommends an illustration, a covariance examination model for recognizing SYN flooding assaults. The impersonation final results demo...