Journal ArticleDOI
Thwarting DDoS attacks in grid using information divergence
P. Varalakshmi,S. Thamarai Selvi +1 more
Reads0
Chats0
TLDR
A five-fold DDoS Defense Mechanism using an Information Divergence scheme that detects the attacker and discards the adversary's packets for a fixed amount of time in an organized manner is proposed.About:
This article is published in Future Generation Computer Systems.The article was published on 2013-01-01. It has received 29 citations till now. The article focuses on the topics: Application layer DDoS attack & Trinoo.read more
Citations
More filters
Dissertation
Autonomic Fault Tolerant Scheduling for Multiple Workflows in Cloud Environment
Anju Bala,Inderveer Chana +1 more
TL;DR: Based on the literature survey, it is evident that the key challenge in scheduling workflow applications on Cloud that needs to be addressed is fault tolerant scheduling in autonomic way, hence, autonomic fault tolerance scheduling for multiple workflows is the main focus of this research work.
Proceedings ArticleDOI
Mouse Features for DDoS Attacks Detection in the Application Layer
TL;DR: A Java application was developed for the classification of real users and those behind DDoS attacks, and it is concluded that two mouse characteristics reveal the dynamism of the user and can be used as a method of detection of DDoS attack.
Journal ArticleDOI
Immune-Inspired Self-Protection Model for Securing Grid
Inderpreet Chopra,Ratinder Kaur +1 more
TL;DR: This paper presents the simple immune based model for self-protection (SIMS) of grid environment from various attacks like DoS, DDoS, Probing, etc.
Book ChapterDOI
Mean Availability Parameter-Based DDoS Detection Mechanism for Cloud Computing Environments
A. Amuthan,Pillutla Harikrishna +1 more
TL;DR: A mean availability parameter-based DDoS detection mechanism (MAPDDM) is contributed for handling the impacts induced by DDoS towards the dynamic clients of the subnet and the results infer that MAPDDM is phenomenal in sustaining the trust value of clients to a maximum of 82% even when the amount of traffic is varied.
Journal ArticleDOI
An Enhanced Entropy Approach to Detect and Prevent DDoS in Cloud Environment
TL;DR: In this article , an enhanced entropy based DDoS mitigation approach analyzes the heuristic data and acts dynamically according to the traffic behavior to effectively segregate the characteristics of incoming traffic.
References
More filters
Journal ArticleDOI
The Anatomy of the Grid: Enabling Scalable Virtual Organizations
TL;DR: The authors present an extensible and open Grid architecture, in which protocols, services, application programming interfaces, and software development kits are categorized according to their roles in enabling resource sharing.
Journal ArticleDOI
A taxonomy of DDoS attack and DDoS defense mechanisms
Jelena Mirkovic,Peter Reiher +1 more
TL;DR: This paper presents two taxonomies for classifying attacks and defenses in distributed denial-of-service (DDoS) and provides researchers with a better understanding of the problem and the current solution space.
Book ChapterDOI
Anomalous Payload-Based Network Intrusion Detection
Ke Wang,Salvatore J. Stolfo +1 more
TL;DR: A payload-based anomaly detector, called PAYL, for intrusion detection that demonstrates the surprising effectiveness of the method on the 1999 DARPA IDS dataset and a live dataset the authors collected on the Columbia CS department network.
Proceedings Article
Intrusion Detection with Neural Networks
TL;DR: A backpropagation neural network called NNID (Neural Network Intrusion Detector) was trained in the identification task and tested experimentally on a system of 10 users, suggesting that learning user profiles is an effective way for detecting intrusions.
Journal ArticleDOI
Defense against spoofed IP traffic using hop-count filtering
TL;DR: A novel filtering technique, called Hop-Count Filtering (HCF), is presented-which builds an accurate IP-to-hop-count (IP2HC) mapping table-to detect and discard spoofed IP packets.
Related Papers (5)
Distributed denial of service attack detection using an ensemble of neural classifier
P. Arun Raj Kumar,S. Selvakumar +1 more
OverCourt: DDoS mitigation through credit-based traffic segregation and path migration
Ping Du,Akihiro Nakao +1 more