Protection of Server from Proxy Based HTTP Attacks
International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
www.ijsr.net | Open Access | Fully Refereed | Peer Reviewed International Journal

ISSN: 2319-7064

Survey Paper | Computer Science & Engineering | India | Volume 3 Issue 11, November 2014

Protection of Server from Proxy Based HTTP Attacks

Poonam Uttam Patil, Y. V. Chavan

With the increasing use of the web in last few decades, the numerous types of attacks have also been developed by miscreants. This is most commonly done by Hiding or spoofing IP address. This leads to make it hard and difficult to locate the actual attacker. A novel new defense scheme at server-side to resist the Web proxy-based Distributed Denial of Service (DDoS) attack which can be a better solution is reviewed here. Temporal and spatial locality (TSL) is used in this approach to extract the behavioral features of the traffic to server from the proxy. This will make the method independent of the traffic intensity and the increasingly unreliable web substances. Also a novel method to response the attack is projected in this paper. This method simply converts the suspicious packets into relatively normal packets, instead of just discarding those packets. The quality of service of authenticated users will be shielded by this technique.

Keywords: Traffic analysis, traffic modeling, distributed denial of service DDoS attack, attack detection, attack response, temporal and spatial locality

Edition: Volume 3 Issue 11, November 2014

Pages: 2982 - 2984

Share this Article

How to Cite this Article?

Poonam Uttam Patil, Y. V. Chavan, "Protection of Server from Proxy Based HTTP Attacks", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=SUB14188, Volume 3 Issue 11, November 2014, 2982 - 2984

94 PDF Views | 79 PDF Downloads

Download Article PDF



Similar Articles with Keyword 'Traffic analysis'

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 5, May 2014

Pages: 1295 - 1299

A Review on Security Attacks in Mobile Ad-hoc Networks

Amandeep Kaur, Dr. Amardeep Singh

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 2982 - 2984

Protection of Server from Proxy Based HTTP Attacks

Poonam Uttam Patil, Y. V. Chavan

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 6 Issue 3, March 2017

Pages: 1996 - 1999

Network Traffic Analysis of Hierarchical Data Using Clustering

Mahaling G. Salimath

Share this Article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 3 Issue 9, September 2014

Pages: 2035 - 2040

A Framework for Enhancing Source Location Privacy in Wireless Sensor Networks

Parthasaradhi M, B Nagalakshmi, D Venkatesh

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 3, March 2014

Pages: 369 - 372

Traffic Statistics Determination of Unified Threat Manager to Provide Threat Perception

Neelutpol Gogoi, M. N. Sushmitha

Share this Article

Similar Articles with Keyword 'attack detection'

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 5, May 2015

Pages: 2085 - 2089

Implementation and Analysis of DoS Attack Detection Algorithms

Rupesh Jaiswal, Dr. Shashikant Lokhande, Aditya Gulavani

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 735 - 737

Survey Paper on Alleviation of Cloud Internal Denial of Service Attacks

Nikhita Nerkar, Vina M Lomte

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 2982 - 2984

Protection of Server from Proxy Based HTTP Attacks

Poonam Uttam Patil, Y. V. Chavan

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 1053 - 1061

An Efficient Approach in Protection of Information Security via Collaborative Inference Detection

Abilesh. P

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 984 - 987

A Survey on Multivariate Correlation Analysis for Denial of Service Attack Detection

Sana Chaugale, Dr. Tanuja Dhope

Share this Article
Top