Sprinkling Data :Prevent Pollution Attacks Using Entropy Variation
Journal Title: International Journal of Research in Computer and Communication Technology - Year 2013, Vol 2, Issue 11
Abstract
The Distributed Denial-of-Service (DDoS) attacks are a critical threat to the Internet. Recently there are an increasing number of DDoS attacks against online services and Web applications. However the memoryless feature of the Internet routing mechanisms makes it extremely hard to trace back to the source of these attacks. These attacks are targeting the application level. Detecting application layer DDOS attack is not an easy task. In this paper, we propose a novel trace back method for DDoS attacks that is based on entropy variations between normal and DDoS attack traffic which is fundamentally different from commonly used packet marking techniques. The idea is to detect abrupt traffic changes across multiple network domains at the earliest time. The suspicious requests are identified based onthe variation in entropy and a rate limiter is introduced to downgrade services to malicioususers. In addition to a scheduler is include to schedule the session based on the trust score of theuser and the system workload .
Authors and Affiliations
Anil Kumar Battula, S Amarnath Babu
Efficient and Reliable Transmission Mechanism for Wireless Nodes
In wireless networks the traffic from the source to the destination which is often routed through a number of nodes are often subject to a number of attacks ,where intermediate nodes claim to transmit packets which w...
Resource & Quality Awareness Algorithm for Location Based Wireless Sensor Networks
Location monitoring refers to the system where the wireless sensor network odes counts the number of sensors which are capable of detecting the objects present in their sensing areas. Third party always monitor the pe...
Make Safe Data Promulgate In Multi Cloud Storage
The cloud computing technique provide a high range of service the society over the INTERNET. The unique features of clouding computing is that users data are processes remotely users does not own the machine or opera...
A Study of Various Types of E-Resources Used by Research Scholars
Research is an important activity for the development of scientific and technical knowledge. Universities are the centre of higher education and research. The libraries attached to the universities have to deal with...
Learning and Sequential Decision Making For Medical Data Streams Using Rl Algorithm
Data stream mining has obtained a high attraction due to the importance of its applications and increase in the generation of streaming information. The data streams are the set of data, which are moving in specified...