scispace - formally typeset
Journal ArticleDOI

Thwarting DDoS attacks in grid using information divergence

Reads0
Chats0
TLDR
A five-fold DDoS Defense Mechanism using an Information Divergence scheme that detects the attacker and discards the adversary's packets for a fixed amount of time in an organized manner is proposed.
About
This article is published in Future Generation Computer Systems.The article was published on 2013-01-01. It has received 29 citations till now. The article focuses on the topics: Application layer DDoS attack & Trinoo.

read more

Citations
More filters
Dissertation

Autonomic Fault Tolerant Scheduling for Multiple Workflows in Cloud Environment

Anju Bala, +1 more
TL;DR: Based on the literature survey, it is evident that the key challenge in scheduling workflow applications on Cloud that needs to be addressed is fault tolerant scheduling in autonomic way, hence, autonomic fault tolerance scheduling for multiple workflows is the main focus of this research work.
Proceedings ArticleDOI

Mouse Features for DDoS Attacks Detection in the Application Layer

TL;DR: A Java application was developed for the classification of real users and those behind DDoS attacks, and it is concluded that two mouse characteristics reveal the dynamism of the user and can be used as a method of detection of DDoS attack.
Journal ArticleDOI

Immune-Inspired Self-Protection Model for Securing Grid

TL;DR: This paper presents the simple immune based model for self-protection (SIMS) of grid environment from various attacks like DoS, DDoS, Probing, etc.
Book ChapterDOI

Mean Availability Parameter-Based DDoS Detection Mechanism for Cloud Computing Environments

TL;DR: A mean availability parameter-based DDoS detection mechanism (MAPDDM) is contributed for handling the impacts induced by DDoS towards the dynamic clients of the subnet and the results infer that MAPDDM is phenomenal in sustaining the trust value of clients to a maximum of 82% even when the amount of traffic is varied.
Journal ArticleDOI

An Enhanced Entropy Approach to Detect and Prevent DDoS in Cloud Environment

TL;DR: In this article , an enhanced entropy based DDoS mitigation approach analyzes the heuristic data and acts dynamically according to the traffic behavior to effectively segregate the characteristics of incoming traffic.
References
More filters
Journal ArticleDOI

The Anatomy of the Grid: Enabling Scalable Virtual Organizations

TL;DR: The authors present an extensible and open Grid architecture, in which protocols, services, application programming interfaces, and software development kits are categorized according to their roles in enabling resource sharing.
Journal ArticleDOI

A taxonomy of DDoS attack and DDoS defense mechanisms

TL;DR: This paper presents two taxonomies for classifying attacks and defenses in distributed denial-of-service (DDoS) and provides researchers with a better understanding of the problem and the current solution space.
Book ChapterDOI

Anomalous Payload-Based Network Intrusion Detection

TL;DR: A payload-based anomaly detector, called PAYL, for intrusion detection that demonstrates the surprising effectiveness of the method on the 1999 DARPA IDS dataset and a live dataset the authors collected on the Columbia CS department network.
Proceedings Article

Intrusion Detection with Neural Networks

TL;DR: A backpropagation neural network called NNID (Neural Network Intrusion Detector) was trained in the identification task and tested experimentally on a system of 10 users, suggesting that learning user profiles is an effective way for detecting intrusions.
Journal ArticleDOI

Defense against spoofed IP traffic using hop-count filtering

TL;DR: A novel filtering technique, called Hop-Count Filtering (HCF), is presented-which builds an accurate IP-to-hop-count (IP2HC) mapping table-to detect and discard spoofed IP packets.
Related Papers (5)