CFP last date
20 January 2025
Reseach Article

Mitigation of Application Traffic Ddos Attacks with Trust and Am Based Hmm Models

by S.Prabha, Dr. R. Anitha
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 6 - Number 9
Year of Publication: 2010
Authors: S.Prabha, Dr. R. Anitha
10.5120/1101-1443

S.Prabha, Dr. R. Anitha . Mitigation of Application Traffic Ddos Attacks with Trust and Am Based Hmm Models. International Journal of Computer Applications. 6, 9 ( September 2010), 26-34. DOI=10.5120/1101-1443

@article{ 10.5120/1101-1443,
author = { S.Prabha, Dr. R. Anitha },
title = { Mitigation of Application Traffic Ddos Attacks with Trust and Am Based Hmm Models },
journal = { International Journal of Computer Applications },
issue_date = { September 2010 },
volume = { 6 },
number = { 9 },
month = { September },
year = { 2010 },
issn = { 0975-8887 },
pages = { 26-34 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume6/number9/1101-1443/ },
doi = { 10.5120/1101-1443 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T19:54:59.800131+05:30
%A S.Prabha
%A Dr. R. Anitha
%T Mitigation of Application Traffic Ddos Attacks with Trust and Am Based Hmm Models
%J International Journal of Computer Applications
%@ 0975-8887
%V 6
%N 9
%P 26-34
%D 2010
%I Foundation of Computer Science (FCS), NY, USA
Abstract

The increase in Internet-based transactions and communications offers new opportunities for hackers to disrupt business operations with DDoS attacks. Organizations that are not adequately protected risk losing customers, revenue, and their good reputations. This thesis discusses the challenges of identifying, countering, and avoiding crippling DDoS attacks. With the proposed comprehensive Self-Defending Network, organizations can deploy layers of defense to detect and mitigate the effects of DDoS attacks. The convenience, efficiency, and global reach of e-business benefit both consumers and businesses. But the accessibility of today’s business operations brings increased security challenges. Legions of malicious hackers target e-commerce sites, online banks, partner networks, and Internet or e-mail servers seeking revenge or profit.

References
  1. N. Long S. Dietrich and D. Ddittrich, “Analyzing distributed denial of service tools: the shaft case,” in Proceedings of the LISA XIV.
  2. Gary C. Kessler, “Defenses against distributed denial of service attacks,” http://www.garykessler.net/library/ddos.html, November 2000.
  3. Celeste Biever, “How zombie networks fuel cybercrime,” http://www.newscientist.com/article.ns?id=dn6616, November 2004.
  4. K. Poulsen, “FBI Busts Alleged DDoS Mafia,” 2004. [Online]. Available: http://www.securityfocus.com/news/9411 Authorized licensed use limited to: K Duraiswamy. Downloaded on July 29, 2009 at 09:20 from IEEE Xplore.
  5. “Incident Note IN-2004-01 W32/Novarg. A Virus,” CERT, 2004. [Online]. Available: http://www.cert.org/incident_notes/ IN-2004-01.html
  6. S. Kandula, D. Katabi, M. Jacob, and A. W. Berger, “Botz-4-Sale: Surviving Organized DDoS Attacks that Mimic Flash Crowds,”MIT, Tech. Rep. TR-969, 2004 [Online]. Available: http://www.usenix.org/events/ nsdi05/tech/ kandula/kandula.pdf
  7. I. Ari, B. Hong, E. L. Miller, S. A. Brandt, and D. D. E. Long, “Modeling, Analysis and Simulation of Flash Crowds on the Internet,” Storage Systems Research Center Jack Baskin School of Engineering University of California, Santa Cruz Santa Cruz, CA, Tech. Rep. UCSC-CRL-03-15, Feb. 28, 2004 [Online]. Available: http://ssrc.cse.ucsc.edu/, 95064
  8. J. Jung, B. Krishnamurthy, and M. Rabinovich, “Flash crowds and denial of service attacks: Characterization and implications for CDNs and web sites,” in Proc. 11th IEEE Int. World Wide Web Conf., May 2002, pp. 252–262.
  9. S. Ranjan, R. Karrer, and Knightly, “Wide area redirection of dynamic content by Internet data centers,” in Proc. 23rd Ann. Joint Conf. IEEE Comput. Commun. Soc., Mar. 7–11, 2004, vol. 2, pp. 816–826.
  10. J. Cao, W. S. Cleveland, Y. Gao, K. Jeffay, F. D. Smith, and M.Weigle, “Stochastic models for generating synthetic HTTP source traffic,” in Proc. IEEE INFOCOM, 2004, vol. 3, pp. 1546–1557.
  11. L. Limwiwatkul and A. Rungsawangr, “Distributed denial of service detection using TCP/IP header and traffic measurement analysis,” in Proc. Int. Symp. Commun. Inf. Technol., Sappoo, Japan, Oct. 26–29, 2004, pp. 605–610.
Index Terms

Computer Science
Information Sciences

Keywords

Traffic Ddos Am Hmm Self-Defending Network