Impact of DDoS attack in Online Auction System and Proposed Lightweight Solution Based on Software Agent
Journal Title: INTERNATIONAL JOURNAL OF COMPUTER TRENDS & TECHNOLOGY - Year 2013, Vol 5, Issue 6
Abstract
The Denial of Service attack, in particular the Distributed Denial of Service (DDoS) attack, has become one of the key intimidations to the Internet. In general, attackers launch DDoS attacks by directing an enormous number of attack sources to send worthless traffic to the victim system. The victim's services are interrupting when its host or network resources are engaged by the attack traffic. The threat of DDoS attacks has become even more brutal as attackers can conciliation a huge number of computers by scattering a computer worm using vulnerabilities in the most popular operating systems. To counteract the same problem we consider the Online Auction Model where auctions run concurrently but independently of each other. Each auction has an auctioneer and a number of bidders that could be located anywhere on the Internet. We develop a novel technique for identifying attack traffic based on the connection history at the victim. We present an algorithm to filter attack traffic in a precise and efficient manner. In this algorithm we have to check the vulnerability of the user. If user is valid in that case algorithm has to check the load compiled by the user IP Address and calculate the complete load that is how much time is required by the user to complete the activities also to send and received the request to and from the system. If that load is in between the max_threshold and min_threshold which are two useful parameters to check the DDos attack then also we need to check the user profile for vulnerability issues. If everything is under the threshold values then algorithm will pass the user as a non attacker and allow user to use the system.
Authors and Affiliations
Mandakini vishwakarma
Performance Estimation of 2*3 MIMO-MC-CDMA using Convolution Code
In this paper we estimate the performance of 2*3 MIMO-MC-CDMA system using convolution code in MATLAB which highly reduces BER by increasing the efficiency of system. MIMO and MC-CDMA system combination is used to reduce...
Deriving the Probability with Machine Learning and Efficient Duplicate Detection in Hierarchical Objects
Duplicate detection is the major important task in the data mining, in order to find duplicate in the original data as well as data object. It exactly identifies whether the given data is duplicates or not. Real world du...
Comparative Analysis of Edge Based Single Image Superresolution
Super-resolution image reconstruction provides an effective way to increase image resolution from a single or multiple low resolution images. There exists various single image super-resolution based on different assumpti...
Dynamic Load Balancing Algorithm in the Global-Local Order
Most traditional dynamic load balancing schemes for hierarchical environments have applied local load balancing first and have expands it to the global load balancing. The major problem of the approach is that unnecessar...
Reduction of SQL Injection & XSS Attacks Using IPAAS
Network security is a main challenge now–a-days. There are different types of attacks in network. SQL Injection attacks are the most common attacks. Statistical survey says that most of the web sites which collaborate wi...