Detection and Counter Measure of AL-DDoS Attacks in Web Traffic

Article ID

CSTNWS8BI3N

Detection and Counter Measure of AL-DDoS Attacks in Web Traffic

R.Sreenath
R.Sreenath SREE VIDYANIKETHAN ENGINEERING COLLEGE
E.S.Phalgunakrishna
E.S.Phalgunakrishna
DOI

Abstract

Distributed Denial-of-Service (DDoS) assaults are a developing danger crosswise over Internet, disturbing access to Information and administrations. Presently days, these assaults are focusing on the application layer. Aggressors are utilizing systems that are exceptionally hard to recognize and relieve. In this task propose another technique to recognize AL-DDoS assaults. This work separates itself from past techniques by considering AL-DDoS assault location in overwhelming spine activity. In addition, the identification of AL-DDoS assaults is effectively deceived by glimmer group movement. By analyzing the entropy of AL-DDoS assaults and glimmer swarms, these model output be utilized to perceive the genuine AL-DDoS assaults. With a quick AL-DDoS identification speed, the channel is equipped for letting the real demands through yet the assault movement is halted.

Detection and Counter Measure of AL-DDoS Attacks in Web Traffic

Distributed Denial-of-Service (DDoS) assaults are a developing danger crosswise over Internet, disturbing access to Information and administrations. Presently days, these assaults are focusing on the application layer. Aggressors are utilizing systems that are exceptionally hard to recognize and relieve. In this task propose another technique to recognize AL-DDoS assaults. This work separates itself from past techniques by considering AL-DDoS assault location in overwhelming spine activity. In addition, the identification of AL-DDoS assaults is effectively deceived by glimmer group movement. By analyzing the entropy of AL-DDoS assaults and glimmer swarms, these model output be utilized to perceive the genuine AL-DDoS assaults. With a quick AL-DDoS identification speed, the channel is equipped for letting the real demands through yet the assault movement is halted.

R.Sreenath
R.Sreenath SREE VIDYANIKETHAN ENGINEERING COLLEGE
E.S.Phalgunakrishna
E.S.Phalgunakrishna

No Figures found in article.

R.Sreenath. 2015. “. Global Journal of Computer Science and Technology – E: Network, Web & Security GJCST-E Volume 15 (GJCST Volume 15 Issue E3): .

Download Citation

Journal Specifications

Crossref Journal DOI 10.17406/gjcst

Print ISSN 0975-4350

e-ISSN 0975-4172

Issue Cover
GJCST Volume 15 Issue E3
Pg. 11- 14
Classification
GJCST-E Classification: H.3.5
Keywords
Article Matrices
Total Views: 8205
Total Downloads: 2105
2026 Trends
Research Identity (RIN)
Related Research
Our website is actively being updated, and changes may occur frequently. Please clear your browser cache if needed. For feedback or error reporting, please email [email protected]

Request Access

Please fill out the form below to request access to this research paper. Your request will be reviewed by the editorial or author team.
X

Quote and Order Details

Contact Person

Invoice Address

Notes or Comments

This is the heading

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

High-quality academic research articles on global topics and journals.

Detection and Counter Measure of AL-DDoS Attacks in Web Traffic

R.Sreenath
R.Sreenath SREE VIDYANIKETHAN ENGINEERING COLLEGE
E.S.Phalgunakrishna
E.S.Phalgunakrishna

Research Journals