International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Open Access | Fully Refereed | Peer Reviewed

ISSN: 2319-7064


Downloads: 100

M.Tech / M.E / PhD Thesis | Computer Science & Engineering | India | Volume 3 Issue 7, July 2014


Detection of Malicious Client based HTTP/DoS Attack on Web Server

Dhanya Jayan, Pretty Babu


Abstract: A web server side defense system against the Http/DoS attack. The HTTP protocol 1.1 is mainly used to detect the malicious client based Http/DoS attack instead of proxy based Http/ DoS attack on web server. The main goals of the proposed system are accurate detection of malicious client based Http/DoS attack. Behavioral reshaping algorithm improves the quality of services of normal user. The performance of the system is based upon the false negative ratio.


Keywords: Malicious client, Http/DoS attack, HTTP protocol 11 web server


Edition: Volume 3 Issue 7, July 2014,


Pages: 878 - 881


How to Cite this Article?

Dhanya Jayan, Pretty Babu, "Detection of Malicious Client based HTTP/DoS Attack on Web Server", International Journal of Science and Research (IJSR), https://www.ijsr.net/get_abstract.php?paper_id=20141226, Volume 3 Issue 7, July 2014, 878 - 881

How to Share this Article?

Enter Your Email Address


Similar Articles with Keyword 'Malicious client'

Downloads: 108

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 1, January 2015

Pages: 984 - 986

Survey for Detecting Malicious user using Trust Evaluation and User Correlation for Protecting Online Reputation Systems

Vrushali G. Chabilwad, A. D. Gujar

Share this Article

Downloads: 121

Survey Paper, Computer Science & Engineering, India, Volume 6 Issue 1, January 2017

Pages: 1317 - 1320

Effective Handling of Reputation-Based Trust Management in Cloud Environment

Sonali Jivan Nikam, Dr. S. N. Kini

Share this Article

Similar Articles with Keyword 'Malicious'

Downloads: 2 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Research Paper, Computer Science & Engineering, India, Volume 10 Issue 6, June 2021

Pages: 1240 - 1249

Secure Methods for Supplychain Management to Protect from Attacks in Blockchain

B. Ratnakanth, K. Venkata Ramana

Share this Article

Downloads: 4 | Monthly Hits: ⮙2

Research Paper, Computer Science & Engineering, India, Volume 10 Issue 6, June 2021

Pages: 863 - 865

Detection of Malicious URLs using Classification Algorithm

Muskan V. Jaiswal, Dr. Anjali B. Raut

Share this Article

Similar Articles with Keyword 'client'

Downloads: 1

Research Paper, Computer Science & Engineering, India, Volume 10 Issue 6, June 2021

Pages: 1188 - 1193

Profit Contribution of Bank Customer from Different Business Liabilities

Vinod Desai, Shalini B Ullagaddi, Vittal A Odeyar

Share this Article

Downloads: 3

Research Paper, Computer Science & Engineering, India, Volume 10 Issue 5, May 2021

Pages: 1118 - 1123

Music Recommendation System

Nipun Prakash Gupta, Durgesh Kumar

Share this Article

Similar Articles with Keyword 'attack'

Downloads: 134 | Monthly Hits: ⮙1

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 2, February 2015

Pages: 2246 - 2249

Packet Analysis with Network Intrusion Detection System

Rashmi Hebbar, Mohan K

Share this Article

Downloads: 1

Review Papers, Computer Science & Engineering, India, Volume 10 Issue 8, August 2021

Pages: 1126 - 1129

Privacy Preserving Utility Verification of Data Published

Madhushree M

Share this Article

Similar Articles with Keyword 'HTTP'

Downloads: 103

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 5, May 2014

Pages: 1628 - 1631

A Survey On XML-Injection Attack Detection Systems

Swati Ramesh Kesharwani, Aarti Deshpande

Share this Article

Downloads: 104

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 2982 - 2984

Protection of Server from Proxy Based HTTP Attacks

Poonam Uttam Patil, Y. V. Chavan

Share this Article

Similar Articles with Keyword 'protocol'

Downloads: 105

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 5, May 2014

Pages: 1751 - 1754

Joining Delay; Packet Delivery and Limitations of EGMP

G. Anandhi, Dr. S. K. Srivatsa

Share this Article

Downloads: 155

Research Paper, Computer Science & Engineering, India, Volume 6 Issue 8, August 2017

Pages: 868 - 874

Study of Power Management in Adhoc Networks

Anandhi Giri, S. K. Srivatsa

Share this Article

Similar Articles with Keyword '11'

Downloads: 3

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 2406 - 2408

Optimizing the Ad-Hoc Applications in Vehicular Network: A Study

Sumeet Sekhon, Dinesh Kumar

Share this Article

Downloads: 98

Review Papers, Computer Science & Engineering, India, Volume 4 Issue 10, October 2015

Pages: 1303 - 1305

Obstacle Detection Technologies to Empower Visually Challenged: A Short Notes

N. Laxmi Manasa

Share this Article

Similar Articles with Keyword 'web'

Downloads: 1

Student Project, Computer Science & Engineering, India, Volume 10 Issue 6, June 2021

Pages: 1717 - 1724

Krashi Prabhandak (Agricultural Manager)

Prafful Mundra, A V Pavan Krishna, Swarnalatha P, Venkata Sumanth Kakollu

Share this Article

Downloads: 2 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Research Paper, Computer Science & Engineering, India, Volume 10 Issue 6, June 2021

Pages: 1240 - 1249

Secure Methods for Supplychain Management to Protect from Attacks in Blockchain

B. Ratnakanth, K. Venkata Ramana

Share this Article

Similar Articles with Keyword 'server'

Downloads: 176 | Monthly Hits: ⮙1

Research Paper, Computer Science & Engineering, Bangladesh, Volume 5 Issue 6, June 2016

Pages: 1523 - 1527

Multifunctional Remote Controlled Robot Using Android Application

T. A. Mithu, T. S. Reddy

Share this Article

Downloads: 180

Survey Paper, Computer Science & Engineering, India, Volume 7 Issue 1, January 2018

Pages: 81 - 84

Novel Approach to Virtual Machine Migration In Cloud Computing Environment - A Survey

Priyanka H, Dr. Mary Cherian

Share this Article
Top