Abstract: Survey Paper on Mitigation Mechanisms for Distributed Denial of Service Attacks
International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Open Access | Fully Refereed | Peer Reviewed

ISSN: 2319-7064

Downloads: 102

Survey Paper | Computer Science & Engineering | India | Volume 4 Issue 10, October 2015

Survey Paper on Mitigation Mechanisms for Distributed Denial of Service Attacks

Vishal Mahale, Deepali Gothawal

Today Internet is experiencing one of the major attack called DDos attack. DDoS attack flood the victim with overwhelming amount of traffic to prevent the legitimate users from using network resources. Though security features integrated in the system, the acceptable level of security depends on the state of security in the rest of the global Internet. Till date all the mechanism that are used to less down the DDoS attack are implemented at the single layer. To embellish the security over the DDoS attack, a conjunctive defense mechanism will be creative solution. Providing mitigation either at source end or at victim end may not be a complete solution, in contrast crosslayer mitigation is active at both ends. The proposed systems use two methods to reduce the DDoS attacks remote firewall and device driver level packet filtering. The remote firewall protects the access links from DDoS attacks by dropping the potentially harmful network traffic before they get into link and device driver packet filtering decimate harmful network traffic before it consumes the resources.

Keywords: Comprehensive defense mechanism, self similarity defense mechanism, DDoS, High rate attack, Low rate attack

Edition: Volume 4 Issue 10, October 2015

Pages: 1612 - 1616

Share this Article

How to Cite this Article?

Vishal Mahale, Deepali Gothawal, "Survey Paper on Mitigation Mechanisms for Distributed Denial of Service Attacks", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=SUB159130, Volume 4 Issue 10, October 2015, 1612 - 1616

Enter Your Email Address


Similar Articles with Keyword 'DDoS'

Downloads: 37

Research Paper, Computer Science & Engineering, Sri Lanka, Volume 10 Issue 4, April 2021

Pages: 139 - 144

Analysis onto the Evolving Cyber-Attack Trends during COVID-19 Pandemic

Senthuran Nallainathan

Share this Article

Downloads: 102

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 2, February 2015

Pages: 1809 - 1812

Efficient Flow Marking IP Traceback System

Sonali H. Mane, S. Pratap Singh

Share this Article

Similar Articles with Keyword 'Comprehensive'

Downloads: 1

Survey Paper, Computer Science & Engineering, India, Volume 10 Issue 6, June 2021

Pages: 716 - 720

A Comprehensive Study of Elasticsearch

Nikita Kathare, O. Vinati Reddy, Dr. Vishalakshi Prabhu

Share this Article

Downloads: 2

Research Paper, Computer Science & Engineering, India, Volume 10 Issue 6, June 2021

Pages: 863 - 865

Detection of Malicious URLs using Classification Algorithm

Muskan V. Jaiswal, Dr. Anjali B. Raut

Share this Article

Similar Articles with Keyword 'defense'

Downloads: 2 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 2786 - 2790

Survey: Detection Schemes Against Selective Forwarding Attack

Harpal Singh, Vaibhav Pandey

Share this Article

Downloads: 100

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 3 Issue 7, July 2014

Pages: 878 - 881

Detection of Malicious Client based HTTP/DoS Attack on Web Server

Dhanya Jayan, Pretty Babu

Share this Article

Similar Articles with Keyword 'mechanism'

Downloads: 155 | Weekly Hits: ⮙1 | Monthly Hits: ⮙2

Research Paper, Computer Science & Engineering, India, Volume 6 Issue 8, August 2017

Pages: 868 - 874

Study of Power Management in Adhoc Networks

Anandhi Giri, S. K. Srivatsa

Share this Article

Downloads: 1

Student Project, Computer Science & Engineering, India, Volume 10 Issue 5, May 2021

Pages: 475 - 485

Light Weight WSN Authentication Protocol Suite

Rahul K Drolia

Share this Article

Similar Articles with Keyword 'self'

Downloads: 156

Research Paper, Computer Science & Engineering, India, Volume 6 Issue 11, November 2017

Pages: 338 - 384

Managing Uncertainty in Supply Chain Operating Cost Using Genetic Algorithm

Dr. Niju P. Joseph, Dr. Priyanka Surendran

Share this Article

Downloads: 1

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 1789 - 1791

The Survey Paper on Importance of Integration of Knowledge Management and Business Intelligence

Vina Lomte, Saloni Shah

Share this Article

Similar Articles with Keyword 'similarity'

Downloads: 3

Research Paper, Computer Science & Engineering, India, Volume 10 Issue 5, May 2021

Pages: 1118 - 1123

Music Recommendation System

Nipun Prakash Gupta, Durgesh Kumar

Share this Article

Downloads: 99

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 2297 - 2299

Measuring and Comparing Semantic Structure of Ontology

Nirmitee N. Kurhekar, Prof. L. J. Sankpal

Share this Article
Top