Detection And Mitigation of Distributed Denial of Service Attack by Signature based Intrusion Detection System
International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
www.ijsr.net | Open Access | Fully Refereed | Peer Reviewed International Journal

ISSN: 2319-7064

Downloads: 103

Research Paper | Computer Science & Engineering | India | Volume 4 Issue 5, May 2015

Detection And Mitigation of Distributed Denial of Service Attack by Signature based Intrusion Detection System

Hardik M. Shingala, Mukesh Sakle

Distributed Denial of Service (DDoS) attack is the most effective and comparatively easy to create. This attack has a terrible effect on the network. This attack can be carried out easily. But as the problem is the solutions are also for the attack. Here we propose an idea of IDS which is inside router and can protect it much better than any other protocol change. Because as we see that all protocol must need to coordinate with each other and that is not possible because not all router uses same security as ours. So to solve this problem we need to have a standalone system that can handle this kind of attack. The Intrusion Detection System (IDS) is one solution that we proposed here which will help us to identify that when the attack is going on and after that to protect our router form that attack. Here we proposed a signature based host IDS so that all the signatures of the attack is inside the IDS from the beginning and thus we can identify the packets as quickly as possible.

Keywords: Distributed Denial-of-Service Attack, Intrusion Detection System

Edition: Volume 4 Issue 5, May 2015

Pages: 2025 - 2030

Share this Article

How to Cite this Article?

Hardik M. Shingala, Mukesh Sakle, "Detection And Mitigation of Distributed Denial of Service Attack by Signature based Intrusion Detection System", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=SUB154697, Volume 4 Issue 5, May 2015, 2025 - 2030

Enter Your Email Address




Similar Articles with Keyword 'Distributed Denial-of-Service Attack'

Downloads: 103

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 5, May 2015

Pages: 2025 - 2030

Detection And Mitigation of Distributed Denial of Service Attack by Signature based Intrusion Detection System

Hardik M. Shingala, Mukesh Sakle

Share this Article

Downloads: 144 | Weekly Hits: ⮙5 | Monthly Hits: ⮙15

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 1, January 2015

Pages: 654 - 658

Mitigating Denial-of-Service and Distributed Denial-of-Service Attacks Using Server Hopping Model Using Distributed Firewall

Prajyoti P.Sabale, Anjali B. Raut

Share this Article

Downloads: 167 | Weekly Hits: ⮙4 | Monthly Hits: ⮙17

Research Paper, Computer Science & Engineering, India, Volume 7 Issue 2, February 2018

Pages: 450 - 452

DOS Attacks

Rushikesh Gawande

Share this Article

Similar Articles with Keyword 'Intrusion Detection System'

Downloads: 70 | Weekly Hits: ⮙2 | Monthly Hits: ⮙16

Research Paper, Computer Science & Engineering, India, Volume 9 Issue 12, December 2020

Pages: 1317 - 1319

A Survey on Usage of Artificial Intelligence Algorithm in Efficiency of WSN

Chaitanya Sharma

Share this Article

Downloads: 103

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 5, May 2015

Pages: 2025 - 2030

Detection And Mitigation of Distributed Denial of Service Attack by Signature based Intrusion Detection System

Hardik M. Shingala, Mukesh Sakle

Share this Article

Downloads: 105 | Weekly Hits: ⮙2 | Monthly Hits: ⮙7

Comparative Studies, Computer Science & Engineering, India, Volume 4 Issue 4, April 2015

Pages: 1966 - 1971

Comparative Analysis of Hybrid Intrusion Detection System and Intrusion Prevention System for MANET

Pallavi P Puri, Nitin R. Chopde

Share this Article

Downloads: 106

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 5, May 2015

Pages: 2085 - 2089

Implementation and Analysis of DoS Attack Detection Algorithms

Rupesh Jaiswal, Dr. Shashikant Lokhande, Aditya Gulavani

Share this Article

Downloads: 107 | Monthly Hits: ⮙12

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 8, August 2014

Pages: 511 - 516

Graph-based Attack Detection in Cloud using KDD CUP 99 Dataset

Swapnali G. Game, S. B. Natikar

Share this Article



Top