Downloads: 104
Survey Paper | Computer Science & Engineering | India | Volume 3 Issue 11, November 2014
Protection of Server from Proxy Based HTTP Attacks
Poonam Uttam Patil | Y. V. Chavan [2]
Abstract: With the increasing use of the web in last few decades, the numerous types of attacks have also been developed by miscreants. This is most commonly done by Hiding or spoofing IP address. This leads to make it hard and difficult to locate the actual attacker. A novel new defense scheme at server-side to resist the Web proxy-based Distributed Denial of Service (DDoS) attack which can be a better solution is reviewed here. Temporal and spatial locality (TSL) is used in this approach to extract the behavioral features of the traffic to server from the proxy. This will make the method independent of the traffic intensity and the increasingly unreliable web substances. Also a novel method to response the attack is projected in this paper. This method simply converts the suspicious packets into relatively normal packets, instead of just discarding those packets. The quality of service of authenticated users will be shielded by this technique.
Keywords: Traffic analysis, traffic modeling, distributed denial of service DDoS attack, attack detection, attack response, temporal and spatial locality
Edition: Volume 3 Issue 11, November 2014,
Pages: 2982 - 2984
Similar Articles with Keyword 'Traffic analysis'
Downloads: 109
Research Paper, Computer Science & Engineering, India, Volume 3 Issue 5, May 2014
Pages: 1295 - 1299A Review on Security Attacks in Mobile Ad-hoc Networks
Amandeep Kaur [56] | Dr. Amardeep Singh
Downloads: 113
Research Paper, Computer Science & Engineering, India, Volume 6 Issue 3, March 2017
Pages: 1996 - 1999Network Traffic Analysis of Hierarchical Data Using Clustering
Mahaling G. Salimath