Impact of DDoS attack in Online Auction System and Proposed Lightweight Solution Based on Software Agent

Journal Title: INTERNATIONAL JOURNAL OF COMPUTER TRENDS & TECHNOLOGY - Year 2013, Vol 5, Issue 6

Abstract

The Denial of Service attack, in particular the Distributed Denial of Service (DDoS) attack, has become one of the key intimidations to the Internet. In general, attackers launch DDoS attacks by directing an enormous number of attack sources to send worthless traffic to the victim system. The victim's services are interrupting when its host or network resources are engaged by the attack traffic. The threat of DDoS attacks has become even more brutal as attackers can conciliation a huge number of computers by scattering a computer worm using vulnerabilities in the most popular operating systems. To counteract the same problem we consider the Online Auction Model where auctions run concurrently but independently of each other. Each auction has an auctioneer and a number of bidders that could be located anywhere on the Internet. We develop a novel technique for identifying attack traffic based on the connection history at the victim. We present an algorithm to filter attack traffic in a precise and efficient manner. In this algorithm we have to check the vulnerability of the user. If user is valid in that case algorithm has to check the load compiled by the user IP Address and calculate the complete load that is how much time is required by the user to complete the activities also to send and received the request to and from the system. If that load is in between the max_threshold and min_threshold which are two useful parameters to check the DDos attack then also we need to check the user profile for vulnerability issues. If everything is under the threshold values then algorithm will pass the user as a non attacker and allow user to use the system.

Authors and Affiliations

Mandakini vishwakarma

Keywords

Related Articles

Data Concealing in Encrypted Images Using Reversible Data Hiding (RDH) Technique

In the new era of technology,more attention is needed to be given to hide some personal data or secret information, etc. This can be exactly brought out through Reversible Data [1] Hiding,since it maintains the splendid...

LWRP: Low Power Consumption Weighting Replacement Policy using Buffer Memory

As the performance gap between memory and processors has increased, then it leads to the poor performance. Efficient virtual memory can overcome this problem. And the efficiency of virtual memory depends on the replaceme...

Adaptive Integration of P2P and Mobile-Ad-hoc-Networks by a Cross Modeled CHORD Protocol

We set DHT (Distributed Hash Table) centered P2P (Peer to Peer) program-Chord in to MANET (Mobile Ad-hoc Network) in this paper. Then, we propose a new routing modified scheme Cross Modeled Chord(CM-Chord) which bases on...

A Review on Impersonation Attack in Mobile Ad-Hoc Network

An ad hoc network is a collection of mobile nodes that dynamically form a temporary network and are capable of communicating with each other without the use of a network infrastructure or any centralized administration....

Risk Management a t Universities Illegal Residents in Hostels & Fire Cases

Every organization/institution is exposed to some kinds of risks that can affect them in many ways. Risks like fire, theft, damage of assets, illegal intruders etc. can affect them strategically, financially and operatio...

Download PDF file
  • EP ID EP157157
  • DOI -
  • Views 58
  • Downloads 0

How To Cite

Mandakini vishwakarma (2013). Impact of DDoS attack in Online Auction System and Proposed Lightweight Solution Based on Software Agent. INTERNATIONAL JOURNAL OF COMPUTER TRENDS & TECHNOLOGY, 5(6), 292-298. https://europub.co.uk/articles/-A-157157