Protection of Server from Proxy Based HTTP Attacks
International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
www.ijsr.net | Open Access | Fully Refereed | Peer Reviewed International Journal

ISSN: 2319-7064

Downloads: 104 | Weekly Hits: ⮙2 | Monthly Hits: ⮙8

Survey Paper | Computer Science & Engineering | India | Volume 3 Issue 11, November 2014

Protection of Server from Proxy Based HTTP Attacks

Poonam Uttam Patil, Y. V. Chavan

With the increasing use of the web in last few decades, the numerous types of attacks have also been developed by miscreants. This is most commonly done by Hiding or spoofing IP address. This leads to make it hard and difficult to locate the actual attacker. A novel new defense scheme at server-side to resist the Web proxy-based Distributed Denial of Service (DDoS) attack which can be a better solution is reviewed here. Temporal and spatial locality (TSL) is used in this approach to extract the behavioral features of the traffic to server from the proxy. This will make the method independent of the traffic intensity and the increasingly unreliable web substances. Also a novel method to response the attack is projected in this paper. This method simply converts the suspicious packets into relatively normal packets, instead of just discarding those packets. The quality of service of authenticated users will be shielded by this technique.

Keywords: Traffic analysis, traffic modeling, distributed denial of service DDoS attack, attack detection, attack response, temporal and spatial locality

Edition: Volume 3 Issue 11, November 2014

Pages: 2982 - 2984

Share this Article

How to Cite this Article?

Poonam Uttam Patil, Y. V. Chavan, "Protection of Server from Proxy Based HTTP Attacks", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=SUB14188, Volume 3 Issue 11, November 2014, 2982 - 2984

Enter Your Registered Email Address





Similar Articles with Keyword 'Traffic analysis'

Downloads: 104 | Weekly Hits: ⮙2 | Monthly Hits: ⮙8

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 2982 - 2984

Protection of Server from Proxy Based HTTP Attacks

Poonam Uttam Patil, Y. V. Chavan

Share this Article

Downloads: 108 | Weekly Hits: ⮙1 | Monthly Hits: ⮙13

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 5, May 2014

Pages: 1295 - 1299

A Review on Security Attacks in Mobile Ad-hoc Networks

Amandeep Kaur, Dr. Amardeep Singh

Share this Article

Downloads: 111 | Weekly Hits: ⮙3

Research Paper, Computer Science & Engineering, India, Volume 6 Issue 3, March 2017

Pages: 1996 - 1999

Network Traffic Analysis of Hierarchical Data Using Clustering

Mahaling G. Salimath

Share this Article

Downloads: 116 | Weekly Hits: ⮙5 | Monthly Hits: ⮙14

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 3 Issue 9, September 2014

Pages: 2035 - 2040

A Framework for Enhancing Source Location Privacy in Wireless Sensor Networks

Parthasaradhi M, B Nagalakshmi, D Venkatesh

Share this Article

Downloads: 119 | Monthly Hits: ⮙8

Research Paper, Computer Science & Engineering, India, Volume 2 Issue 6, June 2013

Pages: 366 - 371

Mitigating Hotspot Locating Attack in Wireless Sensor Network

Basavarajeshwari, I Manimozhi, M.Jitendranath

Share this Article

Similar Articles with Keyword 'attack detection'

Downloads: 101 | Monthly Hits: ⮙9

Informative Article, Computer Science & Engineering, India, Volume 5 Issue 4, April 2016

Pages: 2169 - 2172

Spotting and Segregation of Sinkhole Node in MANET

Jeeja Borkar, Vaishali Malekar

Share this Article

Downloads: 103 | Weekly Hits: ⮙2 | Monthly Hits: ⮙9

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 5, May 2014

Pages: 1628 - 1631

A Survey On XML-Injection Attack Detection Systems

Swati Ramesh Kesharwani, Aarti Deshpande

Share this Article

Downloads: 103 | Weekly Hits: ⮙3 | Monthly Hits: ⮙14

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 735 - 737

Survey Paper on Alleviation of Cloud Internal Denial of Service Attacks

Nikhita Nerkar, Vina M Lomte

Share this Article

Downloads: 104 | Weekly Hits: ⮙2 | Monthly Hits: ⮙8

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 2982 - 2984

Protection of Server from Proxy Based HTTP Attacks

Poonam Uttam Patil, Y. V. Chavan

Share this Article

Downloads: 105 | Weekly Hits: ⮙5 | Monthly Hits: ⮙11

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 1053 - 1061

An Efficient Approach in Protection of Information Security via Collaborative Inference Detection

Abilesh. P

Share this Article



Top