Securing and Monitoring of Bandwidth Usage in Multi-Agents Denial of Service Environment
Journal Title: International Journal of Advanced Computer Science & Applications - Year 2018, Vol 9, Issue 9
Abstract
The primary purpose of Denial of Service attack (DoS) is to cripple resources so that the resources are made unavailable to the legitimate users. Due to the inadequate monitoring of activities on the network, it has resulted into huge financial losses. Bandwidth which is one of the resources being used on the network, if not properly monitored could result into misused and attack. This paper proposes a real time system for securing and monitoring the amount of bandwidth consumed on the network using the multi-agent framework technology. It also keeps a record of internet protocol (IP) addresses visiting the network and may be used as a starting point for the aspect of response in providing a comprehensive solution to DoS attacks. The bandwidth is pre-entered and an agent is assigned to monitor bandwidth consumption rate against the set threshold. If the bandwidth is consumed above the bandwidth limit and time set, then a DoS attack is suspected taking into considerations the DoS attack framework. This framework can be used as a replicate of what happen in the network scenario environment.
Authors and Affiliations
Ogunleye G. O. , Fashoto S. G, Mbunge Elliot, Arekete S. A, Ojewumi T. O.
Arabic Sign Language (ArSL) Recognition System Using HMM
Hand gestures enabling deaf people to communication during their daily lives rather than by speaking. A sign language is a language which, instead of using sound, uses visually transmitted gesture signs which simultaneou...
Evolutionary Design of a Carbon Dioxide Emission Prediction Model using Genetic Programming
Weather pollution is considered as one of the most important, dangerous problem that affects our life and the society security from the different sides. The global warming problem affecting the atmosphere is related to t...
Post Treatment of Guided Wave by using Wavelet Transform in the Presence of a Defect on Surface
This article presents a Lamb wave processing by using two methods: Fast Fourier Transform (FFT2D) and Continuous Wavelet Transform (CWT) using Morlet wavelet. This treatment is done for a structure of two aluminum-copper...
Factors Influencing the Adoption of Cloud Computing by Saudi University Hospitals
This study aims to evaluate the adoption of Cloud Computing in Saudi university hospitals and to investigate the factors that impact the adoption. This study integrates the Technological, Organizational, Environmental (T...
Developement of Bayesian Networks from Unified Modeling Language for Learner Modelling
First of all, and to clarify our purpose, it seems important to say that the work we are presenting here lie within the framework of learner modeling in an adaptive system understood as computational modeling of the lear...