Adaptive Discrimination Detection for DDoS Attacks from Flash Crowds Using Flow Correlation Coefficient with Collective Feedback
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2014, Vol 16, Issue 1
Abstract
A Distributed denial of service (DDoS) attack is a most popular and crucial attack in the internet. Its motive is to make a network resource unavailable to the legitimate users. Botnets are commonly the engines behind the attack. In our deep study of the size and organization of current botnets, found that the current attack flows are usually more similar to each other compared to the flows of flash crowds In this paper we are concentrating flash crowd and DDoS there are two steps involved, first it is necessary to differentiate normal traffic and flashcrowd by using Flash Crowd Detection Algorithm. Second we have to differentiate flash crowd and DDoS by using Flow Correlation Coefficient (FCC). By using this FCC value, algorithmproposedcalled Adaptive discrimination algorithm is used to detect the DDoS from the flash crowd event. And a sequential d etection and packing algorithm used to detect the attacked packets and filter it out.By using above mentioned algorithms we can improve the accuracy in filtering the attacked packets and also the time consummation is reduced.
Authors and Affiliations
N. V. Poorrnima
Intent Search and Centralized Sybil Defence Mechanism for Social Network
Abstract: Sybil attacks are the major problems occurred in the distributed systems without trusted identities. It occur when the one-to-one relationship between a node and its identity is violated. This is occurred by an...
Neural Network for Solving Job-Shop Scheduling Problem
Abstract: The job shop scheduling is a very important scheduling problem, which is NP-complete in the strongsense and with well-known benchmark instances of relatively small size, which attest the practical difficu...
An Architecture to Achieve Anonymity and Traceability
Anonymity has received increasing attention in the literature due to the users’ awareness of their privacy nowadays. Anonymity provides protection for users to enjoy network services without being traced. On the...
Secure seamless access to IP applications and IP service availability in VANET
Abstract: Traditional Internet-based applications and driver assistance services, as well as peer-to-peer applications are services that will make traveling a more convenient and pleasant experience, that enable theinsta...
Scalable Schedule Routing and Minimizing Delay in Tolerant Networks
There are many routing strategies for message delivery in Delay Tolerant Networks. Among them Multicopying routing strategies have been considered the most applicable DTNs. Epidemic routing and two-hop forwarding r...