International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Fully Refereed | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064


Downloads: 104

Survey Paper | Computer Science & Engineering | India | Volume 3 Issue 11, November 2014


Protection of Server from Proxy Based HTTP Attacks

Poonam Uttam Patil | Y. V. Chavan [2]


Abstract: With the increasing use of the web in last few decades, the numerous types of attacks have also been developed by miscreants. This is most commonly done by Hiding or spoofing IP address. This leads to make it hard and difficult to locate the actual attacker. A novel new defense scheme at server-side to resist the Web proxy-based Distributed Denial of Service (DDoS) attack which can be a better solution is reviewed here. Temporal and spatial locality (TSL) is used in this approach to extract the behavioral features of the traffic to server from the proxy. This will make the method independent of the traffic intensity and the increasingly unreliable web substances. Also a novel method to response the attack is projected in this paper. This method simply converts the suspicious packets into relatively normal packets, instead of just discarding those packets. The quality of service of authenticated users will be shielded by this technique.


Keywords: Traffic analysis, traffic modeling, distributed denial of service DDoS attack, attack detection, attack response, temporal and spatial locality


Edition: Volume 3 Issue 11, November 2014,


Pages: 2982 - 2984


How to Download this Article?

You Need to Register Your Email Address Before You Can Download the Article PDF


How to Cite this Article?

Poonam Uttam Patil, Y. V. Chavan, "Protection of Server from Proxy Based HTTP Attacks", International Journal of Science and Research (IJSR), Volume 3 Issue 11, November 2014, pp. 2982-2984, https://www.ijsr.net/get_abstract.php?paper_id=SUB14188

Similar Articles with Keyword 'Traffic analysis'

Downloads: 109

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 5, May 2014

Pages: 1295 - 1299

A Review on Security Attacks in Mobile Ad-hoc Networks

Amandeep Kaur [56] | Dr. Amardeep Singh

Share this Article

Downloads: 113

Research Paper, Computer Science & Engineering, India, Volume 6 Issue 3, March 2017

Pages: 1996 - 1999

Network Traffic Analysis of Hierarchical Data Using Clustering

Mahaling G. Salimath

Share this Article
Top