Monitoring the Application Layer-DDoS Attack for Popular Websites full report
#1

[attachment=3022]

Monitoring the Application Layer-DDoS Attack for Popular Websites

Presented By:
Team members:
B.Krishna kumar 06P1A0561
B.M.A.Chaitanya 06P1A0565
S.Siva krishna 06P1A05A2
M.Ram Gopal Reddy 06P1A05B7
Overview of the Project
SYSTEM ANALYSIS
PRESENT SYSTEM:

The existing systems are as follows Preventive Defense, Source Tracking & Reactive Solutions.
The preventive schemes aim at improving the security level of a computer system or network; thus preventing the
attacks from happening, or enhancing the resistance to attacks.
The source-tracking schemes, on the other hand, aim to track-down the sources of attacks, so that punitive
action can be taken against them and further attacks can be avoided.
The reactive measures for DDoS defense are designed to detect an ongoing attack and react to it by controlling
the flow of attack packets to mitigate the effects of the attack.
The existing solutions fall into four groups: packet marking, message traceback, logging, and traffic
observation
PROPOSED SYSTEM:

The proposed System used Inter domain Packet filters (IDPFs) architecture, a system that can be constructed
solely based on the locally exchanged BGP updates. Each node only selects and propagates to neighbors based on
two set of routing policies. They are Import and Export Routing policies.
The IDPFs uses a feasible path from source node to the destination node, and a packet can reach to the
destination through one of its upstream neighbors. Such a filtering will not discard the packets with valid
source address.
As the Internet was originally designed for openness and scalability without much concern for security, nasty
users can exploit the design weaknesses of the internet to inflict destruction in its operation.
Incidents disturbing the activities like e-mail viruses, computer worms and denial-of service attacks have been
on the rise.
The incidents which has raised the most concern in recent years are the denial-of service (DoS) attacks whose
sole purpose is to reduce or eliminate the availability of a service provided over the Internet, to its legal
users.
Advantages :

Minimize the denial of service attacks.
For finding possible path we donâ„¢t need globule routing information.
Reducing the IP spoofing through BGP updates, this will overcome the draw back of finding BEST route

FEASIBILITY STUDY:

A Feasibility Study is a first round study undertaken before the real work of a project starts to ascertain the
likely hood of the projects success. It is an analysis of possible alternative solutions to a problem and a
recommendation on the best alternative.
2.3.1 Feasibility Consideration:

Three key consideration are involved in the feasibility analsis:
Economic Feasibility
Technical Feasibility
Operational Feasibility
Economic Feasibility:

Economic analysis is the most frequently used technique for evaluating the effectiveness of a proposed system.
It is more commonly known as cost/benefit analysis. The procedure is to determine the benefits and savings that
are expected from a proposed system and compare them with costs. If benefits outweigh cost, a decision is taken
to design and implement the system.
Technical Feasibility:

The technical feasibility infers whether the proposed system can be developed considering the technical issues
like availability of the necessary technology, technical capacity, adequate response and extensibility.
The project is decided to build using Java Technology which can be easily accessed through any web browser. This
system uses Advanced Java Components which implements code behind functionality for implementing the business
logic. We can use this application in any OS. They can have their own security and transactional advantages.
But are the responsible for selecting suitable and secured OS, which is suitable to our application.

Operational Feasibility:

Operational feasibility is defined as the process of assessing the degree to which a proposed system solves
business problems or takes advantage of business opportunities.
The system is self-explanatory and doesnâ„¢t need any extra sophisticated training. The application can be
handled very easily with a novice user. As the software that is used for developing this application is very
economical and is readily available in the market the only time that is lost by the customer is just
installation time. Therefore the proposed system is operationally feasible
Automation system that is developed technically and that is used on installation is good investment for
organization. The financial benefit must equal or exceed that cost. The amount being spent on system study,
processing hardware, developing software is reasonable considering the loss of revenue owing to the prevailing
loopholes in the system. Benefits in the form of reduced costs like client side with minimum configuration,
system compatibility of any hardware and timing effective manner of allocating systems and registering
complaints
SYNOPSIS OF SOFTWERE USED:

Introduction to JAVA Environment:

Creation of Java:
Java was conceived by James Gosling, Patrick Naught on, ChrisWarth, Ed Frank and Mike Sheridan at
SUN Micro Systems Incorporation in 1991. It took 18 months to develop the first working version. This
language was intialy called OAK, but was renamed JAVA in 1995. Before the initial implementation of OAK in
1992 and the public announcement of Java in 1995, many more contributed to the design and evolution of the
language.
Overview of Java

An Object Oriented Programming Language (OOPL) developed at Sun Microsystems. A Virtual Machine Run
Time Environment that can be embedded in web browser (IE, NN).
Java is powerful but lean object oriented programming language. It has generated a lot of excitement
because it makes it possible to program for internet by creating applets, programs that can be embedded in web
page.
Java is more than a programming language for writing applets. It is being used more and more for
writing standalone applications as well.
Java is actually a platform consisting of three components:
1. Java programming Language.
2. Java Library of Classes and Interfaces.
3. Java Virtual Machine.
A Standardized set of Package (Class, Interfaces)
Creating Graphical User Interfaces
Controlling Multi Media Data
Communicating Over Network
JAVA is Portable:

One of the biggest advantage Java offers is that it is portable. An application written in Java will
run on all the major platforms. Any computer with a java based browser can run the applications or applets
written in the Java programming Language. A programmer no longer has to write one program to run on a
Macintosh, another program to run on a windows machine, still another to run on a UNIX machine, and so on. In
other words , with Java, developers write their programs only once.
JAVA is Object-Oriented
JAVA makes it easy to write correct code
JAVA is Extensible
JAVA is Secure
JAVA is multithread
JAVA is impotent to the Internet
SYSTEM DESIGN


The most creative and challenging phase of the life cycle is system design. The term design describes a final
system and the process by which it is developed. It refers to the technical specifications that will be applied
in implementations the candidate system. The design may be defined as the process of applying various
techniques and principles for the purpose of defining a device, a process or a system in sufficient details to
permit its physical realization.
The designerâ„¢s goal is how the output is to be produced and in what format samples of the output and input are
also presented. Second input data and database files have to be designed to meet the requirements of the
proposed output. The processing phases are handled through the program Construction and Testing. Finally,
details related to justification of the system and an estimate of the impact of the candidate system on the user
and the organization are documented and evaluated by management as a step toward implementation.
The importance of software design can be stated in a single word Quality. Design provides us with
representations of software that can be assessed for quality. Design is the only way that we can accurately
translate a customerâ„¢s requirements into a finished software product or system without design we risk building
an unstable system, that might fail it small changes are made or may be difficult to test, or one whoâ„¢s quality
canâ„¢t be tested. So it is an essential phase in the development of a software product.
UML DIAGRAMS

INTRODUCTION

UML is a notation that resulted from the unification of Object Modeling Technique and Object Oriented Software
Technology .UML has been designed for broad range of application.
Hence, it provides constructs for a broad range of systems and activities.
An Overview of UML in five notations

1.use case diagrams

Use cases are used during requirements elicitation and analysis To represent the functionality of the system.
Use cases focus on the behavior of the system from the external point of view. The actor are
Outside the boundary of the system, where as the use cases are inside the boundary of the system.
2.class diagrams


Class diagrams to describe the structure of the system. Classes Are abstraction that specify the common
structure and behaviour of a set
Class diagrams describe the system in terms of objects, classes, attributes, operations and their associations.
3.Sequence diagrams


Sequence diagrams are used to formalize the behaviour of the system and to visualize the communication among
objects. They are useful for identifying additional objects that participate in the use cases. A Sequence
diagram represents the interaction that take place among these objects.
4.Statechart diagrams


State chart diagrams describe the behaviour of an individual object as a number of states and transitions
between these states. A state represents a particular set of values for an object. The sequence diagram focuses
on the messages exchanged between objects, the state chart diagrams focuses on the transition between states.
5.Activity diagrams


An activity diagram describes a system in terms of activities. Activities are states that represents the
execution of a set of operations. Activity diagrams are similar to flowchart diagram and data flow.
Reply

Important Note..!

If you are not satisfied with above reply ,..Please

ASK HERE

So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page
Popular Searches: chosen system architecture of ranking and suggesting popular items, monitoring the application layer ddos attacks for popular websites, papers on ranking and suggesting popular itemsets, popular information technology topics, ddos attack example sequence diagram, listen to music websites for, popular seminar topics on fpga pdf,

[-]
Quick Reply
Message
Type your reply to this message here.

Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Messages In This Thread
Monitoring the Application Layer-DDoS Attack for Popular Websites full report - by project topics - 05-04-2010, 07:56 PM

Possibly Related Threads...
Thread Author Replies Views Last Post
  computer networks full report seminar topics 8 43,866 06-10-2018, 12:35 PM
Last Post: jntuworldforum
  OBJECT TRACKING AND DETECTION full report project topics 9 31,786 06-10-2018, 12:20 PM
Last Post: jntuworldforum
  imouse full report computer science technology 3 25,947 17-06-2016, 12:16 PM
Last Post: ashwiniashok
  Implementation of RSA Algorithm Using Client-Server full report seminar topics 6 27,662 10-05-2016, 12:21 PM
Last Post: dhanabhagya
  Optical Computer Full Seminar Report Download computer science crazy 46 68,031 29-04-2016, 09:16 AM
Last Post: dhanabhagya
  ethical hacking full report computer science technology 41 76,120 18-03-2016, 04:51 PM
Last Post: seminar report asees
  broadband mobile full report project topics 7 24,466 27-02-2016, 12:32 PM
Last Post: Prupleannuani
  steganography full report project report tiger 15 42,601 11-02-2016, 02:02 PM
Last Post: seminar report asees
  Digital Signature Full Seminar Report Download computer science crazy 20 45,340 16-09-2015, 02:51 PM
Last Post: seminar report asees
  Mobile Train Radio Communication ( Download Full Seminar Report ) computer science crazy 10 28,426 01-05-2015, 03:36 PM
Last Post: seminar report asees

Forum Jump: