A Cumulative Study on Counter Measure Technique for DOS Attacks Using Software Puzzle
International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
www.ijsr.net | Open Access | Fully Refereed | Peer Reviewed International Journal

ISSN: 2319-7064



Downloads: 112

Survey Paper | Computer Science & Engineering | India | Volume 4 Issue 11, November 2015

A Cumulative Study on Counter Measure Technique for DOS Attacks Using Software Puzzle

Jyoti B. Shende, S. V. Todkari

Denial-of-service (DoS) and Distributed Denial of Service (DDoS) are dangerous to cyber-security, and client puzzle, which request a client to perform computationally very high operations before providing services from a server to client, is a well-known countermeasure to them. After all, an attacker can boost its capability of DoS/DDoS attacks with fast puzzle solving software and/or in-built graphics processing unit such like (GPU) hardware to extremely weaken the effectiveness of client puzzles. There are many system exist like Timelock puzzle, Client puzzle are used in this paper. In this paper, we study how to prohibit DoS/DDoS attackers from inflating their puzzle-solving capacities. To this end, we introduce a new client puzzle named as software puzzle. Unlike the existing client puzzle strategy, which publish their puzzle algorithms previously and generate software puzzle for each client request, a puzzle algorithm in the present software puzzle scheme is created only after threshold value of client request exceed which is accepted at the server side by using decision tree and the algorithm is generated such that 1) an attacker is not able to prepare an implementation to solve the puzzle previously and 2) the attacker needs extensive effort in translating a central processing unit puzzle software to its functionally equal GPU version such that the transformation cannot be done in real time.

Keywords: Software puzzles generation, information gain, GPU programming, distributed denial of service DDoS

Edition: Volume 4 Issue 11, November 2015

Pages: 2196 - 2199

Share this Article

How to Cite this Article?

Jyoti B. Shende, S. V. Todkari, "A Cumulative Study on Counter Measure Technique for DOS Attacks Using Software Puzzle", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=NOV151650, Volume 4 Issue 11, November 2015, 2196 - 2199

Enter Your Email Address




Similar Articles with Keyword 'information gain'

Downloads: 109

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 4, April 2015

Pages: 1925 - 1927

Survey on Secured Association Rule Mining in Partitioned Database

Gurpreet Kaur Bhatti, Prof. Ravi Patki

Share this Article

Downloads: 111

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 12, December 2015

Pages: 1846 - 1849

An Innovative Technique to Detect Malicious Applications in Android

Sharvari Prakash Chorghe, Dr. Narendra Shekokar

Share this Article

Similar Articles with Keyword 'GPU programming'

Downloads: 123

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 12, December 2015

Pages: 587 - 590

Client Puzzles: Effective Defence against Resource Inflation Threats

Smita M. Miraje, Manisha Bharti

Share this Article

Downloads: 157

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 9, September 2016

Pages: 279 - 282

Software Puzzle: A Countermeasure to Resource-Inflated Denial-of-Service Attacks

Syeda Ghazala Nikhat, Zohara Begum, Dr. Mohammed Abdul Waheed

Share this Article

Similar Articles with Keyword 'Software'

Downloads: 180

Survey Paper, Computer Science & Engineering, India, Volume 7 Issue 1, January 2018

Pages: 81 - 84

Novel Approach to Virtual Machine Migration In Cloud Computing Environment - A Survey

Priyanka H, Dr. Mary Cherian

Share this Article

Downloads: 1

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 1884 - 1886

Performance Analysis of Clustal W Algorithm on Linux Cluster

Swati Jasrotia, Salam Din

Share this Article

Similar Articles with Keyword 'puzzles'

Downloads: 113

Research Paper, Computer Science & Engineering, India, Volume 7 Issue 6, June 2018

Pages: 1590 - 1594

A Detail Review of Jamming Attack Mitigation Techniques in Mobile Wireless Networks

Kalpana, Raj Kumar

Share this Article

Downloads: 120

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 3, March 2015

Pages: 1814 - 1817

Latin Square Computation of Order-3 Using OpenCL

Yukti Gupta, Ishu Gupta, Devdutt Baresary

Share this Article

Similar Articles with Keyword 'generation'

Downloads: 1 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Research Paper, Computer Science & Engineering, India, Volume 10 Issue 7, July 2021

Pages: 544 - 546

Green Computing: Current Research Trends

Vallabhi Ghansawant

Share this Article

Downloads: 2

Review Papers, Computer Science & Engineering, India, Volume 10 Issue 4, April 2021

Pages: 965 - 966

University Event Management System

V. Balu, P. Vagish Krishnan, Varadarajan .M

Share this Article

Similar Articles with Keyword 'information'

Downloads: 108

Survey Paper, Computer Science & Engineering, India, Volume 5 Issue 7, July 2016

Pages: 1375 - 1390

A Survey of Thinning Techniques on Two Dimensional Binary Images

Moumita Sarkar, Santanu Chatterjee

Share this Article

Downloads: 153

Research Paper, Computer Science & Engineering, India, Volume 6 Issue 8, August 2017

Pages: 868 - 874

Study of Power Management in Adhoc Networks

Anandhi Giri, S. K. Srivatsa

Share this Article

Similar Articles with Keyword 'gain'

Downloads: 1

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 2786 - 2790

Survey: Detection Schemes Against Selective Forwarding Attack

Harpal Singh, Vaibhav Pandey

Share this Article

Downloads: 1 | Monthly Hits: ⮙1

Research Paper, Computer Science & Engineering, India, Volume 10 Issue 6, June 2021

Pages: 1188 - 1193

Profit Contribution of Bank Customer from Different Business Liabilities

Vinod Desai, Shalini B Ullagaddi, Vittal A Odeyar

Share this Article

Similar Articles with Keyword 'GPU'

Downloads: 109

Research Paper, Computer Science & Engineering, India, Volume 6 Issue 5, May 2017

Pages: 2386 - 2392

Design and Analysis of Parallel Content Matching Algorithm for Pub-Sub Systems using Different Parallel Paradigms

M. A. Shah, Dr. D. B. Kulkarni

Share this Article

Downloads: 110

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 8, August 2016

Pages: 2033 - 2037

CaPGP: A De-Risking Measure for Insider Fraud in Financial Institutions

Monikka Reshmi Sethurajan

Share this Article

Similar Articles with Keyword 'programming'

Downloads: 42 | Monthly Hits: ⮙1

Research Paper, Computer Science & Engineering, India, Volume 10 Issue 2, February 2021

Pages: 1673 - 1677

Convolution Neural Network Based Image Recognition

Sofia Hamid, Mrigana Walia

Share this Article

Downloads: 68

Research Paper, Computer Science & Engineering, Congo, Volume 10 Issue 3, March 2021

Pages: 61 - 70

Contribution of an Embedded and Biometric System in a Replicated Database for Access Control in a Multi-Entry Institution

Bopatriciat Boluma Mangata, Eugene Mbuyi Mukendi, Jean-Didier Batubenga

Share this Article

Similar Articles with Keyword 'distributed'

Downloads: 104

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 5, May 2014

Pages: 1751 - 1754

Joining Delay; Packet Delivery and Limitations of EGMP

G. Anandhi, Dr. S. K. Srivatsa

Share this Article

Downloads: 1

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 1884 - 1886

Performance Analysis of Clustal W Algorithm on Linux Cluster

Swati Jasrotia, Salam Din

Share this Article

Similar Articles with Keyword 'denial'

Downloads: 101

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 5, May 2015

Pages: 2832 - 2836

Minimization of DDoS Attack using Firecol an Intrusion Prevention System

Bhagyashri Kotame, Shrinivas Sonkar

Share this Article

Downloads: 102

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 2, February 2015

Pages: 1809 - 1812

Efficient Flow Marking IP Traceback System

Sonali H. Mane, S. Pratap Singh

Share this Article

Similar Articles with Keyword 'service'

Downloads: 1

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 2786 - 2790

Survey: Detection Schemes Against Selective Forwarding Attack

Harpal Singh, Vaibhav Pandey

Share this Article

Downloads: 1

Research Paper, Computer Science & Engineering, India, Volume 10 Issue 4, April 2021

Pages: 1213 - 1218

Sentiment Analysis of Twitter Data to Analyze the Acceptance of Aadhaar

Aarushi Thakral, Vasantha W. B.

Share this Article

Similar Articles with Keyword 'DDoS'

Downloads: 37

Research Paper, Computer Science & Engineering, Sri Lanka, Volume 10 Issue 4, April 2021

Pages: 139 - 144

Analysis onto the Evolving Cyber-Attack Trends during COVID-19 Pandemic

Senthuran Nallainathan

Share this Article

Downloads: 101

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 5, May 2015

Pages: 2832 - 2836

Minimization of DDoS Attack using Firecol an Intrusion Prevention System

Bhagyashri Kotame, Shrinivas Sonkar

Share this Article



Top