Securing and Monitoring of Bandwidth Usage in Multi-Agents Denial of Service Environment
Journal Title: International Journal of Advanced Computer Science & Applications - Year 2018, Vol 9, Issue 9
Abstract
The primary purpose of Denial of Service attack (DoS) is to cripple resources so that the resources are made unavailable to the legitimate users. Due to the inadequate monitoring of activities on the network, it has resulted into huge financial losses. Bandwidth which is one of the resources being used on the network, if not properly monitored could result into misused and attack. This paper proposes a real time system for securing and monitoring the amount of bandwidth consumed on the network using the multi-agent framework technology. It also keeps a record of internet protocol (IP) addresses visiting the network and may be used as a starting point for the aspect of response in providing a comprehensive solution to DoS attacks. The bandwidth is pre-entered and an agent is assigned to monitor bandwidth consumption rate against the set threshold. If the bandwidth is consumed above the bandwidth limit and time set, then a DoS attack is suspected taking into considerations the DoS attack framework. This framework can be used as a replicate of what happen in the network scenario environment.
Authors and Affiliations
Ogunleye G. O. , Fashoto S. G, Mbunge Elliot, Arekete S. A, Ojewumi T. O.
Efficient Software Testing Technique based on Hybrid Database Approach
In the field of computer science, software testing is referred as a critical process which is executed in order to assess and analyze the performance and risks existing in software applications. There is an emphasis on i...
Dual Security Testing Model for Web Applications
In recent years, web applications have evolved from small websites into large multi-tiered applications. The quality of web applications depends on the richness of contents, well structured navigation and most importantl...
Green Cloud Computing: Efficient Energy-Aware and Dynamic Resources Management in Data Centers
The uses of Cloud computing over the last years are constantly increasing since it has become a very important technology in the computing landscape. It provides to client decentralized services and a pay-as-you-go model...
Alerts Clustering for Intrusion Detection Systems: Overview and Machine Learning Perspectives
The tremendous amount of the security alerts due to the high-speed alert generation of high-speed networks make the management of intrusion detection computationally expensive. Evidently, the high-level rate of wrong ale...
Predictive Method for Service Composition in Heterogeneous Environments within Client Requirements
Cloud computing is a new delivery model for Information Technology services. Many actors and parameters play an important role in provisioning of dynamically elastic and virtualized resources at the levels of infrastruct...