Detection and Classification of Distributed Denial of Service (DDoS) Attack

Abstract

On line services are on a rapid upward push in today’s internet global. Web servers, which host these online services, are the prime targets for the hackers to perform Distributed Denial of Service (DDoS) attacks. Attackers release DDoS assaults on net servers in order to disrupt the offerings or to eat the network bandwidth. This makes legitimate users unable to access the web resources at times. DDoS attack compromise the availability of the service by means of utilizing the energy of thousands and thousands of zombies (compromised computers) below the manipulate of the bot masters. DDoS attacks existed since mid 1980’s and they are still the top most web security threat. Hence, mitigation of DDoS attacks is becoming very important. The distributed and dynamic nature of the DDoS attacks makes it more difficult to mitigate. In order to mitigate the DDoS attacks, several techniques have been proposed in the past by various researchers. However, most of the project research were focusing either on Application Layer or Network Layer and are mostly providing single layer of defense. In such scenario, hackers and attacker are taking advantage of the weakness of these mitigation techniques to launch the DDoS attack. In this research work, I will focus to implement Enhanced Support Vector Machine as well as to improve the accuracy of it.

Authors and Affiliations

Rida Anwar, Shruti Gorasia

Keywords

Related Articles

Implicit Assessment of Lead Extraction Based On Its As-Mined Content and Ferric Sulphate Concentration during Leaching In the Sulphate Solution

An implicit assessment of lead extraction was carried out based on its as-mined content in galena and ferric sulphate concentration during leaching in the sulphate solution. A two-factorial empirical model was derived f...

Client Monitoring and Control System

Client Monitoring and control system is developed to overcome the problem faced by the lab managing staff. To Monitor a LAN, the monitoring server is typically connected to a monitor port on the switch. If multiple Swit...

Modified Implementation of Different Architectural Designing Issues in WSN Protocol

In real life wireless sensor network has much variety of applications in Microelectronics as well as embedded systems. Life time and overall performance of the network is affected by issue power consumption so it become...

slugSingle Electron Transistor Based IC Architecture Design for Car Intrusion Prevention: A Case Study

Single Electronics, a fascinating technology is a novel alternative of conventional electronics in post CMOS era. This emerging field is rapidly getting attention both in fabrication oriented empirical study and logical...

Denoising Of Gaussian Noise Using Shrinkage Method with Daubechies Wavelet Transform

Image Denoising is a vital part in various image processing and computer application. The important role of a good image denoising algorithm is that it should entirely remove noise and preserving the edges. In this pape...

Download PDF file
  • EP ID EP21559
  • DOI -
  • Views 277
  • Downloads 3

How To Cite

Rida Anwar, Shruti Gorasia (2016). Detection and Classification of Distributed Denial of Service (DDoS) Attack. International Journal for Research in Applied Science and Engineering Technology (IJRASET), 4(1), -. https://europub.co.uk./articles/-A-21559