Manuscript Number : IJSRST184936
Analysis on DDoS Attack using a Probabilistic Approach
Authors(2) :-Dr. B. Mukunthan, S. Dhayananthi In the concepts of DDoS attackers, the researchers have taken two approaches. The first approach improves the routing infrastructures whereas the second approach protects Internet servers with sophisticated resource manage-ment to the servers. This end system approach provides more accurate resource accounting, and fine-grained service isolation and differentiation for example, to shield interactive video traffic from FTP traffic. However, without a mechanism to detect spoofed traffic, spoofed packets will share the same resource principals and code paths as legitimate requests. While a resource manager can confine the scope of damage to the particular service under attack, it cannot sustain the availability of that service. In stark contrast, the server's ability to filter most, if not all, spoofed IP packets can help sustain service availability even under DDoS attacks. Since filtering spoofed IP packets is orthogonal to resource management, it can also be used in conjunction with advanced resource-management schemes.
Dr. B. Mukunthan DoS, Hop-Count Filtering, Hop-Count Inspection, spoofed, ns2, matlab Publication Details
Published in : Volume 4 | Issue 9 | July-August 2018 Article Preview
Research Advisor, Jairam's Arts and Science College,Karur, Tamilnadu, India
S. Dhayananthi
Research Advisor, Jairam's Arts and Science College,Karur, Tamilnadu, India
Date of Publication : 2018-07-30
License: This work is licensed under a Creative Commons Attribution 4.0 International License.
Page(s) : 185-190
Manuscript Number : IJSRST184936
Publisher : Technoscience Academy
Journal URL : https://ijsrst.com/IJSRST184936
Citation Detection and Elimination |
|
|