Mitigation of Application Traffic DDoS Attacks with Trust and AM Based HMM Models
#1

ABSTRACT
The increase in Internet-based transactionsand communications offers new opportunitiesfor hackers to disrupt business operations withDDoS attacks. Organizations that are notadequately protected risk losing customers,revenue, and their good reputations. Thisthesis discusses the challenges of identifying,countering, and avoiding crippling DDoSattacks. With the proposed comprehensiveSelf-Defending Network, organizations candeploy layers of defense to detect and mitigatethe effects of DDoS attacks. The convenience,efficiency, and global reach of e-businessbenefit both consumers and businesses. Butthe accessibility of today’s businessoperations brings increased securitychallenges. Legions of malicious hackerstarget e-commerce sites, online banks, partnernetworks, and Internet or e-mail serversseeking revenge or profit.DDoS attack quickly overwhelms acompany’s server, router, firewall or networklink with traffic, if successful, the attackfloods the network or its resources socompletely that legitimate traffic cannot beprocessed, and the company cannot function.The results are disastrous frustrated customersplace orders elsewhere, service-levelagreements are violated, and corporatereputations are damaged. Meanwhile, all ITand security resources focus on responding tothe attack. Unfortunately, their efforts areusually too late and only partially effective. Asecurity strategy must instantly identify andrespond to DDoS threats, while maintainingthe availability of critical network resourcesfor custoers, partners, and employees.The proposed model develops countermechanism to mitigate the potency of theresource attacks and evaluate the efficacy.The proposed access matrix captures thespatial-temporal patterns of a normal flashcrowd. The anomaly detector based on hiddenMarkov model (HMM) is proposed todescribe the dynamics of Access Matrix (AM)and to detect the attacks. Numerical resultsbased on real Web traffic data are presented todemonstrate the effectiveness of the proposedmethod. Asymmetric attack overwhelms theserver resources, by increasing the responsetime of legitimate clients from 0.1 seconds to10 Seconds. Under the same attack scenario,HMM model limits the effects of falsenegativesand false-positives and improves thevictims’ performance to 0.8 seconds.
1. INTRODUCTION
A distributed denial of service attack (DDoSattack) is a large-scale, coordinated attack onthe availability of services of a victim systemor network resource, launched indirectlythrough many compromised computers on theInternet [1]. DDoS attacks can seriouslyimpair the Internet service. There have been anumber of proposals and solutions to theDDoS attacks. However there is still nocomprehensive solution which can protectagainst all known forms of DDoS attacks.


Download full report
http://ijcaonlinevolume6/number9/pxc3871443.pdf
Reply

Important Note..!

If you are not satisfied with above reply ,..Please

ASK HERE

So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page
Popular Searches: earthquake mitigation measures wiki, monitoring application layer ddos attacks for popular websites ppt, beyond output voting detecting compromised replicas using hmm based behavioral distance ppt, application ddos attacks ppt, diode working principle animation pptnd ddos attacks, ddos attak, hmm based speech recognition matlab code,

[-]
Quick Reply
Message
Type your reply to this message here.

Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Possibly Related Threads...
Thread Author Replies Views Last Post
  Service-Oriented Architecture for Weaponry and Battle Command and Control Systems in 1 1,068 15-02-2017, 03:40 PM
Last Post: jaseela123d
  Packet-Hiding Methods for Preventing Selective Jamming Attacks 1 682 14-02-2017, 11:35 AM
Last Post: ijasti
  Design and Implementation of TARF: A Trust-Aware Routing Framework for WSNs Projects9 6 3,579 10-01-2015, 11:13 PM
Last Post: Guest
  Credit Card Fraud Detection Using Hidden Markov Models alagaddonjuan 28 20,663 04-09-2014, 11:31 PM
Last Post: Charlescic
  Developing a web application to transfer image and patient information project report maker 2 3,671 21-03-2014, 01:44 AM
Last Post: MichaelPn
  Online Application For The Training and Placement Dept. Of The College. Electrical Fan 16 9,656 13-03-2014, 05:46 PM
Last Post: computer topic
  ONLINE MISSING VEHICLE TRACKING APPLICATION FOR POLICE DEPARTMENT seminar class 3 4,686 17-10-2013, 07:54 PM
Last Post: Guest
  Packet-Hiding Methods for Preventing Selective Jamming Attacks Projects9 5 4,374 30-07-2013, 05:30 PM
Last Post: mounikabujji
  Revisiting Defenses against Large-Scale Online Password Guessing Attacks Projects9 5 3,936 18-03-2013, 12:25 PM
Last Post: computer topic
  Embedded Linux Based GLCD application development seminar surveyer 1 1,906 17-12-2012, 02:32 PM
Last Post: seminar details

Forum Jump: