Detection And Mitigation of Distributed Denial of Service Attack by Signature based Intrusion Detection System
International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
www.ijsr.net | Open Access | Fully Refereed | Peer Reviewed International Journal

ISSN: 2319-7064

Research Paper | Computer Science & Engineering | India | Volume 4 Issue 5, May 2015

Detection And Mitigation of Distributed Denial of Service Attack by Signature based Intrusion Detection System

Hardik M. Shingala, Mukesh Sakle

Distributed Denial of Service (DDoS) attack is the most effective and comparatively easy to create. This attack has a terrible effect on the network. This attack can be carried out easily. But as the problem is the solutions are also for the attack. Here we propose an idea of IDS which is inside router and can protect it much better than any other protocol change. Because as we see that all protocol must need to coordinate with each other and that is not possible because not all router uses same security as ours. So to solve this problem we need to have a standalone system that can handle this kind of attack. The Intrusion Detection System (IDS) is one solution that we proposed here which will help us to identify that when the attack is going on and after that to protect our router form that attack. Here we proposed a signature based host IDS so that all the signatures of the attack is inside the IDS from the beginning and thus we can identify the packets as quickly as possible.

Keywords: Distributed Denial-of-Service Attack, Intrusion Detection System

Edition: Volume 4 Issue 5, May 2015

Pages: 2025 - 2030

Share this Article

How to Cite this Article?

Hardik M. Shingala, Mukesh Sakle, "Detection And Mitigation of Distributed Denial of Service Attack by Signature based Intrusion Detection System", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=SUB154697, Volume 4 Issue 5, May 2015, 2025 - 2030

112 PDF Views | 92 PDF Downloads

Download Article PDF



Similar Articles with Keyword 'Distributed Denial-of-Service Attack'

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 5, May 2015

Pages: 2025 - 2030

Detection And Mitigation of Distributed Denial of Service Attack by Signature based Intrusion Detection System

Hardik M. Shingala, Mukesh Sakle

Share this Article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 1, January 2015

Pages: 654 - 658

Mitigating Denial-of-Service and Distributed Denial-of-Service Attacks Using Server Hopping Model Using Distributed Firewall

Prajyoti P.Sabale, Anjali B. Raut

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 7 Issue 2, February 2018

Pages: 450 - 452

DOS Attacks

Rushikesh Gawande

Share this Article

Similar Articles with Keyword 'Intrusion Detection System'

Research Paper, Computer Science & Engineering, India, Volume 9 Issue 12, December 2020

Pages: 1317 - 1319

A Survey on Usage of Artificial Intelligence Algorithm in Efficiency of WSN

Chaitanya Sharma

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 5, May 2015

Pages: 2085 - 2089

Implementation and Analysis of DoS Attack Detection Algorithms

Rupesh Jaiswal, Dr. Shashikant Lokhande, Aditya Gulavani

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 12, December 2015

Pages: 1571 - 1574

Energy Efficient Secure Routing using Clustering Approach in HWSN

Shani Verma, Maya Shelke

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 9, September 2014

Pages: 1220 - 1223

EAACK-An Innovative Intrusion Detection System for MANET using Digital Signature

Prof. G. M.Bhandari, Swati Pawar, Varsha Zaware, Ujjawala Bankar

Share this Article

Review Papers, Computer Science & Engineering, India, Volume 4 Issue 3, March 2015

Pages: 1440 - 1445

Summarization of Honeypot- A Evolutionary Technology for Securing Data over Network and Comparison with some Security Techniques

Snehal B Rase, Pranjali Deshmukh

Share this Article
Top