Sprinkling Data :Prevent Pollution Attacks Using Entropy Variation
Journal Title: International Journal of Research in Computer and Communication Technology - Year 2013, Vol 2, Issue 11
Abstract
The Distributed Denial-of-Service (DDoS) attacks are a critical threat to the Internet. Recently there are an increasing number of DDoS attacks against online services and Web applications. However the memoryless feature of the Internet routing mechanisms makes it extremely hard to trace back to the source of these attacks. These attacks are targeting the application level. Detecting application layer DDOS attack is not an easy task. In this paper, we propose a novel trace back method for DDoS attacks that is based on entropy variations between normal and DDoS attack traffic which is fundamentally different from commonly used packet marking techniques. The idea is to detect abrupt traffic changes across multiple network domains at the earliest time. The suspicious requests are identified based onthe variation in entropy and a rate limiter is introduced to downgrade services to malicioususers. In addition to a scheduler is include to schedule the session based on the trust score of theuser and the system workload .
Authors and Affiliations
Anil Kumar Battula, S Amarnath Babu
Confident Multi-Owner File Partaking For Vibrant Units in the Cloud
Cloud computing is an evolving computing archetype in which resources of the computing infrastructure are delivered as services above the Internet. As auspicious as it is, this archetype also conveys forth many new d...
A survey paper of data mining in medical diagnosis
Medical data contain information of patient records from the hospitals .These data when mined properly contain hidden patterns .These can lead to better diagnosis ,medicines treatment .These medical diagnosis can pre...
Decentralized information accountability framework for cloud
With the rapid changes around and the increasing demands for computing solutions, cloud computing enables highly scalable services to be easily consumed over the Internet on an as-needed basis. Users’ data are usuall...
Real Time Embedded Face Recognition using ARM7
Face recognition is a widely used biological recognition technology. In comparison with other identification methods, this type of recognition has direct, friendly and convenient features. The embedded face recogniti...
Android Based Braille Interactive System
In our daily life the telecommunication technology plays an important role. Despite of all these technological advancement in the telecommunication field, the physically impaired people have no access for these technolo...