A Systematic Puzzle Approach of Deploying Software For Restricting Dos & DDOS Attacks
Journal Title: International Journal of Science Engineering and Advance Technology - Year 2016, Vol 4, Issue 9
Abstract
In the network denial of service (DoS) and distributed DoS (DDoS) attacks intend to prevent legitimate clients from accessing services are considered a serious hazard to the availability and reliability of the internet services. For example, server receives huge number of junk request from malicious client. For each request, server has to waste extra CPU time for completing process of SSL handshakes .Server cannot handle requests of services from its true customers because it may not have enough resources to handle the request. As a result of this attack is vanished businesses and reputation lost. Represented an advance mechanism that refers as the software puzzle, the aim of this mechanism is to prevent DoS or DDoS attacks and provide services to valid clients. The idea is quite simple. When a client wants to acquire a service from the server, client sends a simple request to the server. After getting the client request, the server sends one puzzle challenge to client. Client must first solve a complex structure puzzle correctly and submit it to the server for accessing services. Server verifies this puzzle solution, if it is correct then server agrees to establish connection with client. To solve this puzzle by every client, prevent vulnerable connection. A software puzzle is different kinds of methods or complex structure or problem which uses sequence of steps and solving these steps client can access resources. Timestamp, data length, key length and software puzzle complexity these attributes are used for security purpose in puzzle generation process and generates puzzle dynamically. I have used the SPEKE algorithm for key generation; it provides high level security and thwarts man-in-middle attack by password. Implement the RC7 algorithm for encryption purpose. It provides best result in case of throughput and time consumption and provides high level security.
Authors and Affiliations
Gelli Naga Venkata Vinay Kumar| M.Tech (CSE), Nimra Institute Of Science & Technology, A.P., India, Md. Amanatulla| Associate Professor, Dept. of Computer Science & Engineering, Nimra Institute Of Science & Technology, A.P., India
DESIGN AND OPTIMIZATION OF FIN TUBE EVAPORATOR BY VARYING DIFFERENT PARAMETERS
An evaporator is use in an air-conditioning system or refrigeration system to allow a compressed cooling chemical, such as Freon or R-22, to evaporate from liquid to gas while enthralling heat in the process. It is a...
Privacy Preservation and traceability support using Public Auditing Mechanism
as future enhancement, we enhance the Oruta system in two interesting problems we will continue the study for our future work. One of them is traceability, which means the ability for the group manager (i.e., the ori...
Effect Of Expansion Joints On Dynamic Analysis Of Structure
For convenience, the scope of the Committee's study was limited to expansion joints that separate structural frames of buildings in order to relieve excessive temperature ‘induced stresses. The practices and procedu...
Analysis Of Reranking Techniques For Web Image Search With Attribute –Assisted
Many commercial search engines such as Google, Yahoo and Bing have been adopted this strategy. The search engines are mostly based on text and constrained due to user search by keyword which results into ambiguity am...
A Novel System for Scalable Data Sharing in Cloud Storage using Key-Aggregate
Of late, rapid growth observed in the cloud technology. Data sharing is an essential functionality in cloud storage. In this paper, we show how to efficiently, securely and flexibly share data with others in cloud sto...