scispace - formally typeset
D

Dheeraj Sanghi

Researcher at Indian Institute of Technology Kanpur

Publications -  29
Citations -  1149

Dheeraj Sanghi is an academic researcher from Indian Institute of Technology Kanpur. The author has contributed to research in topics: Application layer DDoS attack & Cloud computing. The author has an hindex of 15, co-authored 28 publications receiving 1019 citations. Previous affiliations of Dheeraj Sanghi include University of Maryland, College Park.

Papers
More filters
Proceedings ArticleDOI

Location determination of a mobile device using IEEE 802.11b access point signals

TL;DR: This paper exploits the fact that the strength of the signals that a device will receive from different access points will vary with location, and builds a database of signal strength information for various locations, and uses this information to determine which location a given test data comes from.
Journal ArticleDOI

DDoS attacks in cloud computing

TL;DR: This work makes a novel attempt to identify the need of DDoS mitigation solutions involving multi-level information flow and effective resource management during the attack, and concludes that there is a strong requirement of solutions, which are designed keeping utility computing models in mind.
Journal ArticleDOI

Turning 802.11 inside-out

TL;DR: The novel technical challenges that lie ahead in using 802.11 to bridge the digital divide are described, which present several challenges in the novel use of the technology for outdoor, long-distance access links.
Proceedings ArticleDOI

Experimental assessment of end-to-end behavior on Internet

TL;DR: The measurements indicate that the IP level service provided in the network yields high losses, duplicates, and reorderings of packets, and the round-trip transit delay varies significantly.
Journal ArticleDOI

DDoS attacks in cloud computing

TL;DR: This work makes an effort to identify the targets of these effects and their origins, such as auto-scaling, multi-tenancy, and accounting in the cloud, and identifies the detailed requirements of mitigation solutions to DDoS attacks in thecloud with an aim to minimize these effects.