Survey Of DDoS Attacks Based On TCP/IP Protocol Vulnerabilities
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2016, Vol 18, Issue 3
Abstract
Abstract: Distributed denial-of-service (DDoS) attacks are one of the key threats and perhaps the toughest security problem for today’s Internet.Distributed Denial of Service (DDoS) attack has become a stimulating problem to the availability of resources in computer networks.With brief or no advance warning, a DDoS attackcan easily drain the computing and communication resources of its victim within a short period of time. In this paper, DDoS attacks based on the protocols vulnerabilities in the TCP/IP model, their impact on available resources viz CPU,memory,buffer space is investigated. This paper aims to provide a better understanding of the existing tools,methods and comparative analysis of them,and defense mechanisms
Authors and Affiliations
Saket Acharya , Namita Tiwari
Association Rule Mining using Apriori Algorithm for Distributed System: a Survey
Abstract : Data mining technologies provided through Cloud computing is an absolutely necessary characteristic for today’s businesses to make proactive, knowledge driven decisions, as it helps them have future tr...
Microscopic Image Analysis of Nanoparticles by Edge Detection Using Ant Colony Optimization
In this paper, I present an approach for analyzing nanoparticles microscopic images by edge detection using Ant Colony Optimization (ACO) algorithm to obtain a well-connected image edge map. Microscope image a...
Overview of Improving Robustness of MAODV Protocol byCombining Tree and Mesh Structures
Abstract: Mobile ad hoc networks (MANETs) plays an important role in the communication in the networkmust be set up temporarily and quickly. Since the nodes move randomly routing protocols must bring strong andcons...
A Novel Approach to Detect & Prevent Wormhole Attack over MANET & Sensor n/w towards Lower Battery Power Consumption
In Mobile Ad hoc Network (MANET) mobile node is responsible for route establishment using wireless link where each node may behave like both as a host and router. MANET encounters number of security threat...
Storage Data Security of Data in Cloud Computing
Abstract: Cloud Computing refers to the many different types of services and applications being delivered in the internet cloud, and the fact that, in many cases, the devices used to access these services and appli...