International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Fully Refereed | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064


Downloads: 135

Research Paper | Computer Science & Engineering | India | Volume 4 Issue 7, July 2015


Protection of Server from Proxy-Based DDoS Attack

Poonam U. Patil | Dr. Y. V. Chavan


Abstract: Number of intermediate node i. e. proxy servers are lies between client and server. Due to this hierarchical organization of web proxy, existing system those were considered for DDoS attack detection was not able to preserve the Quality of Service of typical user as those are rudely rejects the all demands on DDoS attack detection. This affects on the quality of service of normal user because traffic from last proxy-to server may consists of attack traffic as well as regular traffic. Therefore, it is indispensable to ensure the QoS to normal user. Server side defense scheme that detects DDoS attack is implemented. This system protects the origin server from proxy based HTTP as well as HTTPS attacks. Soft control response mechanism solves the issues of QoS. It uses Hidden Semi Markov Model (HsMM) to analyze the traffic behavior. Pre-filtering at entry point is also proposed in this work to minimize the time require to check normality or abnormality of requests. Distributed denial of service, Hypertext transfer protocol, temporal locality and Spatial locality, Hidden semi-Markov model.


Keywords: Distributed denial of service, Hypertext transfer protocol, temporal locality and Spatial locality, Hidden semi-Markov model


Edition: Volume 4 Issue 7, July 2015,


Pages: 2178 - 2183


How to Download this Article?

You Need to Register Your Email Address Before You Can Download the Article PDF


How to Cite this Article?

Poonam U. Patil, Dr. Y. V. Chavan, "Protection of Server from Proxy-Based DDoS Attack", International Journal of Science and Research (IJSR), Volume 4 Issue 7, July 2015, pp. 2178-2183, https://www.ijsr.net/get_abstract.php?paper_id=SUB156919

Similar Articles with Keyword 'Distributed'

Downloads: 105

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 5, May 2014

Pages: 1751 - 1754

Joining Delay; Packet Delivery and Limitations of EGMP

G. Anandhi [3] | Dr. S. K. Srivatsa

Share this Article

Downloads: 1

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 1884 - 1886

Performance Analysis of Clustal W Algorithm on Linux Cluster

Swati Jasrotia | Salam Din

Share this Article
Top