Detection and Counter Measure of AL-DDoS Attacks in Web Traffic

α
R.Sreenath
R.Sreenath
σ
E.S.Phalgunakrishna
E.S.Phalgunakrishna
α Jawaharlal Nehru Technological University Anantapur Jawaharlal Nehru Technological University Anantapur

Send Message

To: Author

Detection and Counter Measure of AL-DDoS Attacks in Web Traffic

Article Fingerprint

ReserarchID

CSTNWS8BI3N

Detection and Counter Measure of AL-DDoS Attacks in Web Traffic Banner

AI TAKEAWAY

Connecting with the Eternal Ground
  • English
  • Afrikaans
  • Albanian
  • Amharic
  • Arabic
  • Armenian
  • Azerbaijani
  • Basque
  • Belarusian
  • Bengali
  • Bosnian
  • Bulgarian
  • Catalan
  • Cebuano
  • Chichewa
  • Chinese (Simplified)
  • Chinese (Traditional)
  • Corsican
  • Croatian
  • Czech
  • Danish
  • Dutch
  • Esperanto
  • Estonian
  • Filipino
  • Finnish
  • French
  • Frisian
  • Galician
  • Georgian
  • German
  • Greek
  • Gujarati
  • Haitian Creole
  • Hausa
  • Hawaiian
  • Hebrew
  • Hindi
  • Hmong
  • Hungarian
  • Icelandic
  • Igbo
  • Indonesian
  • Irish
  • Italian
  • Japanese
  • Javanese
  • Kannada
  • Kazakh
  • Khmer
  • Korean
  • Kurdish (Kurmanji)
  • Kyrgyz
  • Lao
  • Latin
  • Latvian
  • Lithuanian
  • Luxembourgish
  • Macedonian
  • Malagasy
  • Malay
  • Malayalam
  • Maltese
  • Maori
  • Marathi
  • Mongolian
  • Myanmar (Burmese)
  • Nepali
  • Norwegian
  • Pashto
  • Persian
  • Polish
  • Portuguese
  • Punjabi
  • Romanian
  • Russian
  • Samoan
  • Scots Gaelic
  • Serbian
  • Sesotho
  • Shona
  • Sindhi
  • Sinhala
  • Slovak
  • Slovenian
  • Somali
  • Spanish
  • Sundanese
  • Swahili
  • Swedish
  • Tajik
  • Tamil
  • Telugu
  • Thai
  • Turkish
  • Ukrainian
  • Urdu
  • Uzbek
  • Vietnamese
  • Welsh
  • Xhosa
  • Yiddish
  • Yoruba
  • Zulu

Abstract

Distributed Denial-of-Service (DDoS) assaults are a developing danger crosswise over Internet, disturbing access to Information and administrations. Presently days, these assaults are focusing on the application layer. Aggressors are utilizing systems that are exceptionally hard to recognize and relieve. In this task propose another technique to recognize AL-DDoS assaults. This work separates itself from past techniques by considering AL-DDoS assault location in overwhelming spine activity. In addition, the identification of AL-DDoS assaults is effectively deceived by glimmer group movement. By analyzing the entropy of AL-DDoS assaults and glimmer swarms, these model output be utilized to perceive the genuine AL-DDoS assaults. With a quick AL-DDoS identification speed, the channel is equipped for letting the real demands through yet the assault movement is halted.

References

11 Cites in Article
  1. Wei Zhou,Weijiajia,Shengwen,Wanlei Yangxiang,Zhou (2014). Detection and defense of application-layer DDoS attacks in backbone Web traffic.
  2. S Devi,P Yogesh (2012). A Hybrid Approach to Counter Application Layer DDoS Attacks.
  3. Arbor,Networks (2011). Worldwide network infrastructure security report.
  4. Y Xie,S Yu (2009). A large-scale hidden semi-Markov model for anomaly Detectionon user browsing behaviors.
  5. Luis Von Ahn,Manuel Blum,Nicholas Hopper,John Langford (2003). CAPTCHA: Using Hard AI Problems for Security.
  6. S Kandula,D Katabi,M Jacob,A Berger (2005). Botz-4sale: surviving organized Ddos attacks that mimic flash crowds.
  7. P Barford,J Kline,D Plonka,A Ron (2002). A signal analysis of network traffic anomalies.
  8. Michael Walfish,Mythili Vutukuru,Hari Balakrishnan,David Karger,Scott Shenker (2010). DDoS defense by offense.
  9. S Ranjan,R Swaminathan,M Uysal,E Knightly (2006). DDoS-Resilient Scheduling to Counter Application Layer Attacks Under Imperfect Detection.
  10. Y Xie,S Zhengyu (2009). Monitoring the application-layer ddos attacks for popular websites.
  11. D = |hnew ; R) ; R) Unknown Title.

Funding

No external funding was declared for this work.

Conflict of Interest

The authors declare no conflict of interest.

Ethical Approval

No ethics committee approval was required for this article type.

Data Availability

Not applicable for this article.

How to Cite This Article

R.Sreenath. 2015. \u201cDetection and Counter Measure of AL-DDoS Attacks in Web Traffic\u201d. Global Journal of Computer Science and Technology - E: Network, Web & Security GJCST-E Volume 15 (GJCST Volume 15 Issue E3): .

Download Citation

Issue Cover
GJCST Volume 15 Issue E3
Pg. 11- 14
Journal Specifications

Crossref Journal DOI 10.17406/gjcst

Print ISSN 0975-4350

e-ISSN 0975-4172

Keywords
Classification
GJCST-E Classification: H.3.5
Version of record

v1.2

Issue date

June 22, 2015

Language
en
Experiance in AR

Explore published articles in an immersive Augmented Reality environment. Our platform converts research papers into interactive 3D books, allowing readers to view and interact with content using AR and VR compatible devices.

Read in 3D

Your published article is automatically converted into a realistic 3D book. Flip through pages and read research papers in a more engaging and interactive format.

Article Matrices
Total Views: 8314
Total Downloads: 2053
2026 Trends
Related Research

Published Article

Distributed Denial-of-Service (DDoS) assaults are a developing danger crosswise over Internet, disturbing access to Information and administrations. Presently days, these assaults are focusing on the application layer. Aggressors are utilizing systems that are exceptionally hard to recognize and relieve. In this task propose another technique to recognize AL-DDoS assaults. This work separates itself from past techniques by considering AL-DDoS assault location in overwhelming spine activity. In addition, the identification of AL-DDoS assaults is effectively deceived by glimmer group movement. By analyzing the entropy of AL-DDoS assaults and glimmer swarms, these model output be utilized to perceive the genuine AL-DDoS assaults. With a quick AL-DDoS identification speed, the channel is equipped for letting the real demands through yet the assault movement is halted.

Our website is actively being updated, and changes may occur frequently. Please clear your browser cache if needed. For feedback or error reporting, please email [email protected]

Request Access

Please fill out the form below to request access to this research paper. Your request will be reviewed by the editorial or author team.
X

Quote and Order Details

Contact Person

Invoice Address

Notes or Comments

This is the heading

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

High-quality academic research articles on global topics and journals.

Detection and Counter Measure of AL-DDoS Attacks in Web Traffic

R.Sreenath
R.Sreenath Jawaharlal Nehru Technological University Anantapur
E.S.Phalgunakrishna
E.S.Phalgunakrishna

Research Journals