Research Paper | Computer Science & Engineering | India | Volume 4 Issue 5, May 2015
Detection And Mitigation of Distributed Denial of Service Attack by Signature based Intrusion Detection System
Hardik M. Shingala, Mukesh Sakle
Distributed Denial of Service (DDoS) attack is the most effective and comparatively easy to create. This attack has a terrible effect on the network. This attack can be carried out easily. But as the problem is the solutions are also for the attack. Here we propose an idea of IDS which is inside router and can protect it much better than any other protocol change. Because as we see that all protocol must need to coordinate with each other and that is not possible because not all router uses same security as ours. So to solve this problem we need to have a standalone system that can handle this kind of attack. The Intrusion Detection System (IDS) is one solution that we proposed here which will help us to identify that when the attack is going on and after that to protect our router form that attack. Here we proposed a signature based host IDS so that all the signatures of the attack is inside the IDS from the beginning and thus we can identify the packets as quickly as possible.
Keywords: Distributed Denial-of-Service Attack, Intrusion Detection System
Edition: Volume 4 Issue 5, May 2015
Pages: 2025 - 2030
How to Cite this Article?
Hardik M. Shingala, Mukesh Sakle, "Detection And Mitigation of Distributed Denial of Service Attack by Signature based Intrusion Detection System", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=SUB154697, Volume 4 Issue 5, May 2015, 2025 - 2030
112 PDF Views | 92 PDF Downloads
Similar Articles with Keyword 'Distributed Denial-of-Service Attack'
Research Paper, Computer Science & Engineering, India, Volume 4 Issue 5, May 2015
Pages: 2025 - 2030Detection And Mitigation of Distributed Denial of Service Attack by Signature based Intrusion Detection System
Hardik M. Shingala, Mukesh Sakle
M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 1, January 2015
Pages: 654 - 658Mitigating Denial-of-Service and Distributed Denial-of-Service Attacks Using Server Hopping Model Using Distributed Firewall
Prajyoti P.Sabale, Anjali B. Raut
Research Paper, Computer Science & Engineering, India, Volume 7 Issue 2, February 2018
Pages: 450 - 452DOS Attacks
Rushikesh Gawande
Similar Articles with Keyword 'Intrusion Detection System'
Research Paper, Computer Science & Engineering, India, Volume 9 Issue 12, December 2020
Pages: 1317 - 1319A Survey on Usage of Artificial Intelligence Algorithm in Efficiency of WSN
Chaitanya Sharma
Research Paper, Computer Science & Engineering, India, Volume 4 Issue 5, May 2015
Pages: 2085 - 2089Implementation and Analysis of DoS Attack Detection Algorithms
Rupesh Jaiswal, Dr. Shashikant Lokhande, Aditya Gulavani
Research Paper, Computer Science & Engineering, India, Volume 4 Issue 12, December 2015
Pages: 1571 - 1574Energy Efficient Secure Routing using Clustering Approach in HWSN
Shani Verma, Maya Shelke
Research Paper, Computer Science & Engineering, India, Volume 3 Issue 9, September 2014
Pages: 1220 - 1223EAACK-An Innovative Intrusion Detection System for MANET using Digital Signature
Prof. G. M.Bhandari, Swati Pawar, Varsha Zaware, Ujjawala Bankar
Review Papers, Computer Science & Engineering, India, Volume 4 Issue 3, March 2015
Pages: 1440 - 1445Summarization of Honeypot- A Evolutionary Technology for Securing Data over Network and Comparison with some Security Techniques
Snehal B Rase, Pranjali Deshmukh