MONITORING THE APPLICATION LAYER FOR DDOS ATTACK FOR POPULAR WEBSITE
#1

Presented by:
M.BHUVANA

[attachment=5000]


1. INTRODUCTION:

1.1 ORGANIZATION PROFILE:

Focus Tech Media-An Overview

Focus Tech Media, Nasscom Certified, is a group company of ‘Omne Agate Systems Pvt. Ltd.’, An Omne Agate system is an Rs100 Crore company with interests in Digital metering, Software, Multimedia and ‘Out of Home’ advertisements.


Being a pioneer developer of software for the Utility sector in India , we provide various automated solution to the Electricity boards,which increase their efficiency.



The major services offered by Focus Tech Media are:

- Software solutions
- R&D in Engineering Design
- Corporate Training
- Educational services



Software Development:

We, at ‘Focus Tech Media’ provide technology driven business solutions that help the customers meet their business objectives. We believe in providing IT solutions based on contemporary technologies & practices , innovation and enduring relation.


Our flagship product, Energy Audit and Accounting Application (E3A) has been implemented as part of Advanced Metering Infrastructure project by various Indian state Electricity Boards.


GSM based communication forms the basis of many innovative products and services that constitute our product lineup

Our R & D team equipped with state-of-art infrastructure specializes in:

- Embedded software development
- Automated Meter Reading Solution for Utilities
- Embedded application solutions for textile industries
- Healthcare domain



Engineering Services:

We specialize in Automotive and other manufacturing domains and have executed projects for American, European & Indian manufacturing industries.


Services Offered:
- Modeling (concept to prototype)
- Preparation of manufacturing drawings and parametric modeling
- Engineering Animation Services
- Reverse Engineering
- Vectorization and Digitization services


GIS & Mapping:

FTM provides custom developed GPS based Geographical Information System applications.

Solution Offered:

- GIS based Asset Management System
- GPS based Navigation and Tracking System


Corporate Training:

New technologies, languages, frameworks and tools are emerging faster than one can master the current. Today companies need to adopt newer and newer technologies to stay ahead of the competition.


In other words, companies need to keep running to stay where they are. The employees need to trained and retrained as the need arises.


If the new technology being learnt is a paradigm shift from the one already used, it could be extremely difficult for the company to find the trainer in-house. Most of the time, such in-house
Training tends to ignore best practices applicable for the new technology.


Keeping all these factors in mind, we have developed courses for skill upgrading of employees at all levels.


Our courses are designed and delivered by experts who have in-depth understanding of the subject and great instructional ability.


Educational Services:

We serve a sophisticated customer base of Engineers, Scientists and R&D personnel who demand high quality and timely service.


With such an innovative expertise, we do encourage Graduates and Research scholars to complete their project work in our organization and give project assistance in the following domains:

- Embedded Systems
- DSP/VLSI/Mat Lab/Bio Medical/PLC/SCADA
- Wireless communication technologies
- DotNet technologies
- Advanced Java applications


Our Life-Skills and Placement Enhancement Program (PEP) enables the student to handle The interview process with ease.



1.2 PROJECT PROFILE


Distributed denial of service (DDoS) attack is a continuous critical threat to the Internet. Derived from the low layers, new application-layer-based DDoS attacks utilizing legitimate HTTP requests to overwhelm victim resources are more undetectable. The case may be more serious when such attacks mimic or occur during the flash crowd event of a popular Website.
Focusing on the detection for such new DDoS attacks, a scheme based on document popularity is introduced. An Access Matrix is defined to capture the spatial-temporal patterns of a normal flash crowd. Principal component analysis and independent component analysis are applied to abstract the multidimensional Access Matrix. A novel anomaly detector based on hidden semi-Markov model is proposed to describe the dynamics of Access Matrix and to detect the attacks. The entropy of document popularity fitting to the model is used to detect the potential application-layer
DDoS attacks. Numerical results based on real Web traffic data are presented to demonstrate the effectiveness of the proposed method.

The following are the modules present in monitoring application layer DDOS Attacks in popular websites


- Victim server & User Login
- Training phase
- PCA
- ICA
- HSMM
- Data Preparation
- Monitoring
Reply
#2
for more details, visit the below given thread too

http://studentbank.in/report-monitoring-...8#pid32378
Reply
#3
hi to all
please any body can send me the source code for the project it is very urgent for me
please mail me the code to sailakshmi1218[at]gmail.com
Reply
#4


to get information about the topic Monitoring the Application-Layer DDoS Attacks for popular sites full report,ppt and related topic refer the page link bellow

http://studentbank.in/report-monitoring-...ull-report

http://studentbank.in/report-monitoring-...ar-website

http://seminarsprojects.in/attachment.php?aid=9271
Reply

Important Note..!

If you are not satisfied with above reply ,..Please

ASK HERE

So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page
Popular Searches: ddos protection, popular 2, tybcs popular projects, most popular top 10s, converter coupon application website, java source code for ddos attack, the most popular topic in computer engineering,

[-]
Quick Reply
Message
Type your reply to this message here.

Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Possibly Related Threads...
Thread Author Replies Views Last Post
  A New Cell-Counting-Based Attack against Tor 1 711 14-02-2017, 11:26 AM
Last Post: ijasti
  Remote Server Monitoring System For Corporate Data Centers smart paper boy 3 2,814 28-03-2016, 02:51 PM
Last Post: dhanabhagya
  college website project full report project report tiger 28 67,092 29-11-2015, 02:37 PM
Last Post: Guest
  darknet monitoring using honeypot erhhk 0 913 12-09-2014, 06:09 PM
Last Post: erhhk
  Developing a web application to transfer image and patient information project report maker 2 3,649 21-03-2014, 01:44 AM
Last Post: MichaelPn
  LGI Monitoring System full report seminar presentation 1 4,422 18-03-2014, 05:06 AM
Last Post: MichaelPn
  Online Application For The Training and Placement Dept. Of The College. Electrical Fan 16 9,578 13-03-2014, 05:46 PM
Last Post: computer topic
  alert based monitoring of stock trading systems project topics 4 3,475 09-02-2014, 12:58 PM
Last Post: Guest
  ONLINE MISSING VEHICLE TRACKING APPLICATION FOR POLICE DEPARTMENT seminar class 3 4,668 17-10-2013, 07:54 PM
Last Post: Guest
  Complaints Monitoring System seminar topics 2 2,400 31-12-2012, 12:17 AM
Last Post: Guest

Forum Jump: