Sprinkling Data :Prevent Pollution Attacks Using Entropy Variation
Journal Title: International Journal of Research in Computer and Communication Technology - Year 2013, Vol 2, Issue 11
Abstract
The Distributed Denial-of-Service (DDoS) attacks are a critical threat to the Internet. Recently there are an increasing number of DDoS attacks against online services and Web applications. However the memoryless feature of the Internet routing mechanisms makes it extremely hard to trace back to the source of these attacks. These attacks are targeting the application level. Detecting application layer DDOS attack is not an easy task. In this paper, we propose a novel trace back method for DDoS attacks that is based on entropy variations between normal and DDoS attack traffic which is fundamentally different from commonly used packet marking techniques. The idea is to detect abrupt traffic changes across multiple network domains at the earliest time. The suspicious requests are identified based onthe variation in entropy and a rate limiter is introduced to downgrade services to malicioususers. In addition to a scheduler is include to schedule the session based on the trust score of theuser and the system workload .
Authors and Affiliations
Anil Kumar Battula, S Amarnath Babu
A Novel Social TV For Improving Users Viewing Experience By Using Cloud
The latest cloud computing technology with its wealthy possessions to balance for the limitations of mobile devices and connections can potentially endow with an ideal platform to hold up the desired mobile services....
Systematic Detection And Resolution Of Firewall Policy Anomalies
In this paper the problem of discovering the set of troublesome rules in a large firewall policy is investigated and consequently eliminating or resolving them. all the rules in the policy are consistent and can be r...
Implementation of a Personalized Mobile Query Search Engine
PMSE, Personalized Mobile Search Engine has been proposed to show any client craved result or re-ranking result as per the client given question (UGQ) which incorporates content and the area of the client. It meets e...
Design Of Ternary Logic Gates Using CNTFET
This paper presents a novel design of ternary logic gates like STI,PTI,NTI,NAND and NOR using carbon nanotube field effect transistors. Ternary logic is a promising alternative to the conventional binary logic design...
Self-motivated probe forms designed for database Uncertainties
Query form is a standout amongst the most broadly utilized client interfaces for questioning databases. Conventional inquiry structures are planned and precharacterized by engineers or DBA in different data administra...