CFP last date
20 December 2024
Reseach Article

DDOS Attack Prevention on Application Layer

by Ashvini P. Pawar, Anushree P. Sonawane, Bhagyashree N. Damale, Kiran S. Kokate, K.S. Kumavat
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 127 - Number 10
Year of Publication: 2015
Authors: Ashvini P. Pawar, Anushree P. Sonawane, Bhagyashree N. Damale, Kiran S. Kokate, K.S. Kumavat
10.5120/ijca2015906509

Ashvini P. Pawar, Anushree P. Sonawane, Bhagyashree N. Damale, Kiran S. Kokate, K.S. Kumavat . DDOS Attack Prevention on Application Layer. International Journal of Computer Applications. 127, 10 ( October 2015), 22-25. DOI=10.5120/ijca2015906509

@article{ 10.5120/ijca2015906509,
author = { Ashvini P. Pawar, Anushree P. Sonawane, Bhagyashree N. Damale, Kiran S. Kokate, K.S. Kumavat },
title = { DDOS Attack Prevention on Application Layer },
journal = { International Journal of Computer Applications },
issue_date = { October 2015 },
volume = { 127 },
number = { 10 },
month = { October },
year = { 2015 },
issn = { 0975-8887 },
pages = { 22-25 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume127/number10/22766-2015906509/ },
doi = { 10.5120/ijca2015906509 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T23:19:33.986864+05:30
%A Ashvini P. Pawar
%A Anushree P. Sonawane
%A Bhagyashree N. Damale
%A Kiran S. Kokate
%A K.S. Kumavat
%T DDOS Attack Prevention on Application Layer
%J International Journal of Computer Applications
%@ 0975-8887
%V 127
%N 10
%P 22-25
%D 2015
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Streathly Denial of Service (DDS) attacks are a complicated threat to the event. Now days, there are an increasing number of DDS attacks against on-line application and Web services. Detecting application layer DDS attack is a hard task. In this, its detection scenario based on the information theory depends on metrics. It has two phases: Behavior monitoring and Detection. In the first phase, the Web user commerce behavior is access from the system log during safe cases. Depends on the observation, Entropy of requests per session and the trust score for each user is evaluated. In the second phase, the suspicious requests are identified depends on the changes in entropy and a rate limiter is identified to downgrade services to malicious attackers. A scheduler is included to planning the session based on the trust score of the user and the system workload.

References
  1. Shui Yu, Wanlei Zhou, Robin Doss, & Weijia Jia, (2011) "Traceback of DDoS Attacks using EntropyVariations", IEEE Transactions on Parallel and Distributed Systems.
  2. Supranamaya Ranjan, Ram Swaminathan, Mustafa Uysal, Antonio Nucci, & Edward Knightly, (2009) “DDoS-Shield: DDoS-Resilient Scheduling to Counter Application Layer attacks”, IEEE/ACM Transactions on Networking,
  3. Huey-Ing Liu & Kuo-Chao Chang, (2011) “Defending systems Against Tilt DDoS attacks”, 6th International Conference on Telecommunication Systems, Services, and Applications.
  4. Jin Wang, Xiaolong Yang & Keping Long, (2010) “A New Relative Entropy Based App-DDoS Detection Method”, IEEE Symposium On Computers And Communications (Iscc).
  5. S. Yu, W. Zhou & R. Doss, (2008) “Information theory based detection against network behavior mimicking DDoS attack,” IEEE Communications Letters, vol. 12, no. 4, pp. 319–321.
  6. S. Blake, D. Black, M. Carlson, E. Davies, Z. Wang, and W. Weiss. RFC2475: Architecture for Differentiated Services. RFC Editor United States, 1998.
  7. Cisco. “Strategies to Protect Against Distributed Denial of Service Attacks”. 17 February 2000. URL: http://www.cisco.com/warp/public/707/newsflash.html (4 Jan. 2002 )
  8. CISCO. “Defining Strategies to Protect Against UDP Diagnostic Port DoS Attacks”. September 17, 1996. URL : http://cio.cisco.com/warp/public/707/3.html (4 Jan. 2002)
  9. Raja Azrina Raja Othman “Understanding the Various Types of Denial of Service Attack “.
Index Terms

Computer Science
Information Sciences

Keywords

Sophisticated attacks strategy Low-rate attacks Intrusion detection DDS Application Layer & Entropy.