Countering the DDoS Attacks for a Secured Web Service

Journal Title: Indian Journal of Computer Science and Engineering - Year 2013, Vol 4, Issue 2

Abstract

Web services are the most widely used technology today. SOAP messages are the building blocks of web services. Since web services mostly deal with confidential data they must be protected from intruders. Intruders can be of any form. They can be a person or a program. One of the most adverse attacks is the distributed denial of service attack (DDoS). This kind of attacks is normally targeted at a particular service provider to exhaust the network and system resources of the provider. The proposed framework will restrict the connection attempts on a single user account so that it makes the job a little difficult for the hacker to hack information and will also monitor the size of the input soap message so that it does not consume too much of system resources.

Authors and Affiliations

S. Igni Sabasti Prabu , Dr. V. Jawahar Senthil Kumar

Keywords

Related Articles

A REVIEW OF M-LEARNING MODELS

In the most recent times, mobile visitors form the fastest growing Web community. The ease with which web pages or information is retrieved from the Web using PDAs or cell phones is a result of the rapid development in w...

PROGRAMMED TEST CASE GENERATION FROM SIMULINK/STATEFLOW MODEL

Matlab, Simulink/Stateflow Model is the most extensively used industrial tools that include system development that allows models to be developed, visualized and exercised. Matlab, Simulink/Stateflow (SL/SF) is used part...

DETERMINING THE NUMBER OF CLUSTERS FOR A K-MEANS CLUSTERING ALGORTIHM

Clustering is a process used to divide data into a number of groups. All data points have some mathematical parameter according to which grouping can be done. For instance, if we have a number of points on a twodimension...

AN OVERVIEW OF MPEG FAMILY AND ITS APPLICATIONS

MPEG is the “Moving Picture Experts Group”, working under the joint direction of the international Standards Organization (ISO) and the International Electro Technical Commission (IEC). This paper will provide an overvie...

COMPARISON OF NORMAL SELFISH OVERLAY NETWORK AND SELFISH OVERLAY NETWORK WITH DEPLOYMENT OF OVERLAY NODES USING FUZZY LOGIC

Selfish overlay routing is the technique whereby the sender of the packet can specify the route that the packet should take through the network. Selfish overlay routing allow end users to select routes in an egocentic fa...

Download PDF file
  • EP ID EP135766
  • DOI -
  • Views 114
  • Downloads 0

How To Cite

S. Igni Sabasti Prabu, Dr. V. Jawahar Senthil Kumar (2013). Countering the DDoS Attacks for a Secured Web Service. Indian Journal of Computer Science and Engineering, 4(2), 149-154. https://europub.co.uk./articles/-A-135766