Detecting Network And Application Layer Attacks in Networks
Journal Title: International Journal of Research in Computer and Communication Technology - Year 2014, Vol 3, Issue 11
Abstract
Distributed Denial of Service (DDoS) flooding attacks are launched by attackers disturbing server services as well as Individual users who are active in internet.espicially attackers are targeting network Transport level DDOS flooding attacks and application level ddos attacks. disrupt a legitimate user’s connectivity by exhausting bandwidth, router processing capacity or network resources these are essentially network transport-level flooding attacks and disrupt a legitimate user’s services by exhausting the server resources like sockets, CPU, memory, disk,database bandwidth, these essentially include application-level flooding attacks .monitor and ddos detecting algorithm and host based intrusion detection system is proposed to prevent these attacks. finally our approach is efficient and effective.
Authors and Affiliations
N. V. V. Soujanya, G. Uma Mahesh
A Secured Dynamic Location Monitoring System in WSN
Wireless sensor network is broadly spreading network of the communication field. Wireless sensor network is having sensor nodes as sensing devices which sense physical or environmental conditions and a sink node is t...
A New Dynamic Privacy Grid Mechanism for Location Based Services
Appropriate to the nature of the data being swap over between the user and the server, the common changing of the user’s name provides modest shield for the user’s privacy. A more recent investigation of the mix-zone...
A Novel Grid Synchronization System under Adverse Grid Conditions
Grid synchronization algorithms are of great importance in the control of grid-connected power converters, as fast and accurate detection of the grid voltage parameters is crucial in order to implement stable control...
Intelligent encoding with added puzzle & TESLA security of packets Against Jamming Attacks in Wireless Network
Wireless network never has certain defined boundaries that can’t be extended due to this nature security flaws may get developed. Broadcast nature of wireless network makes it easy for intentional attacks to disturb...
Effective Integration of Voltage Source Converters (VSCs) in weak grids
A New control topology is presented in this paper to have an effective integration of voltage source converters (VSCs) in weak grids. Even though the controller emulates the dynamic performance of synchronous machine...