Efficient Framework to Mitigate DDoS Attacks and Response System
International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
www.ijsr.net | Open Access | Fully Refereed | Peer Reviewed International Journal

ISSN: 2319-7064

Views: 124 , Downloads: 113 | CTR: 91 % | Weekly Popularity: ⮙3

Research Paper | Computer Science & Engineering | India | Volume 2 Issue 4, April 2013

Efficient Framework to Mitigate DDoS Attacks and Response System

Saravanan S, P.Siva kumar

A Distributed Denial-of-Service (DDoS) attack is one in which a multitude of compromised systems attack a single target, thereby causing denial of service for users of the targeted system. The flood of incoming messages to the target system essentially forces it to shut down, thereby denying service to the system to legitimate users .The nature of the threats posed by DDoS attacks on large networks, such as the Internet, demands effective detection and response methods. These methods must be deployed not only at the edge but also at the core of the network. This paper presents methods to identify DDoS attacks by computing entropy and frequency-sorted distributions of selected packet attributes. The DDoS attacks show anomalies in the characteristics of the selected packet attributes. The detection accuracy and performance are analyzed using live traffic traces from a variety of network environments ranging from points in the core of the Internet to those inside an edge network. The results indicate that these methods can be effective against current attacks and suggest directions for improving detection of more stealthy attacks. We also describe our detection-response prototype and how the detectors can be extended to make effective response decisions.

Keywords: Distributed Denial of Service, Entropy, Edge network, Stealthy Attacks

Edition: Volume 2 Issue 4, April 2013

Pages: 386 - 391

Share this Article

How to Cite this Article?

Saravanan S, P.Siva kumar, "Efficient Framework to Mitigate DDoS Attacks and Response System", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=IJSRON1201316, Volume 2 Issue 4, April 2013, 386 - 391

124 PDF Views | 113 PDF Downloads

Download Article PDF



Similar Articles with Keyword 'Entropy'

Views: 146 , Downloads: 101 | CTR: 69 % | Weekly Popularity: ⮙5

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 10, October 2014

Pages: 2124 - 2127

Medical Image Compression Using ISPIHT & JPEG2000 Hybrid

Yashpreet Sain

Share this Article

Views: 134 , Downloads: 104 | CTR: 78 %

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 5, May 2016

Pages: 1954 - 1957

Proposed Techniques to Remove Flaming Problems from Social Networking Sites and outcome of Na?ve Bayes Classifier for Detection of Flames

Vishakha Mal, Dr. A. J. Agrawal

Share this Article

Views: 143 , Downloads: 106 | CTR: 74 % | Weekly Popularity: ⮙1

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 5 Issue 6, June 2016

Pages: 2318 - 2322

An Adaptive Histogram Values & Texture Descriptor for Data Analysis

Ritika Verma, Vinay Thakur

Share this Article

Views: 137 , Downloads: 109 | CTR: 80 % | Weekly Popularity: ⮙2

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 10, October 2014

Pages: 1295 - 1299

Image Denoising Using Hybrid Thresholding, DWT and Adaptive Intensity Transformations

Taranjot Kaur

Share this Article

Views: 145 , Downloads: 109 | CTR: 75 % | Weekly Popularity: ⮙3

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 2, February 2015

Pages: 1563 - 1567

Image Denoising Using Hybrid Thresholding, MFHT and Hybrid Post Filtering

Taranjot Kaur, Manish Mittal

Share this Article
Top