CFP last date
20 May 2024
Call for Paper
June Edition
IJCA solicits high quality original research papers for the upcoming June edition of the journal. The last date of research paper submission is 20 May 2024

Submit your paper
Know more
Reseach Article

A Reactive Defense Mechanism based on an Analytical Approach to Mitigate DDoS Attacks and Improve Network Performance

by Palvinder Singh Mann, Dinesh Kumar
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 12 - Number 12
Year of Publication: 2011
Authors: Palvinder Singh Mann, Dinesh Kumar
10.5120/1734-2352

Palvinder Singh Mann, Dinesh Kumar . A Reactive Defense Mechanism based on an Analytical Approach to Mitigate DDoS Attacks and Improve Network Performance. International Journal of Computer Applications. 12, 12 ( January 2011), 43-46. DOI=10.5120/1734-2352

@article{ 10.5120/1734-2352,
author = { Palvinder Singh Mann, Dinesh Kumar },
title = { A Reactive Defense Mechanism based on an Analytical Approach to Mitigate DDoS Attacks and Improve Network Performance },
journal = { International Journal of Computer Applications },
issue_date = { January 2011 },
volume = { 12 },
number = { 12 },
month = { January },
year = { 2011 },
issn = { 0975-8887 },
pages = { 43-46 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume12/number12/1734-2352/ },
doi = { 10.5120/1734-2352 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T20:01:30.051601+05:30
%A Palvinder Singh Mann
%A Dinesh Kumar
%T A Reactive Defense Mechanism based on an Analytical Approach to Mitigate DDoS Attacks and Improve Network Performance
%J International Journal of Computer Applications
%@ 0975-8887
%V 12
%N 12
%P 43-46
%D 2011
%I Foundation of Computer Science (FCS), NY, USA
Abstract

The Distributed denial of service attacks (DDoS) have become more and more frequent and caused some fatal problems in the recent time. Internet users experience denial-of-service (DoS) attacks every day. Our inboxes are swamped with spam containing subject lines that sometimes fool us; our search-engine queries return many irrelevant results; and online auctions are plagued by corrupt database records filled with intentionally misleading keywords and many more .Intense research have been done to detect and defend such attacks, however, many solutions are still in the phase of theoretical studies. Some of them may have certain practical value, but they have to reconstruct the existing network and the routing instruments with great cost.

References
  1. Michael Armbrust, Armando Fox, Rean Griffith, Anthony D. Joseph, Randy H. Katz, Andrew Konwinski, Gunho Lee, David A. Patterson, Ariel Rabkin, Ion Stoica and Matei Zaharia “Above the Clouds: A Berkeley View of Cloud Computing” Technical Report No. UCB/EECS-2009-28.
  2. Balachandra Reddy Kandukuri, Ramakrishna Paturi Vand Dr. Atanu Rakshit “Cloud Security Issues” IEEE International Conference on Services Computing, 2009, DOI 10.1109/SCC.2009.84.
  3. Marios D. Dikaiakos, George Pallis, Dimitrios Katsaros, Pankaj Mehra and AthenaVakali“CloudComputing-Distributed Internet Computing for IT and Scientific Research” IEEE Internet Computing, 2009.
  4. Cong Wang, Qian Wang, Kui Ren and Wenjing Lou “Ensuring Data Storage Security in Cloud Computing” IEEE 2009.
  5. Kaiqi Xiong and Harry Perros “Service Performance and Analysis in Cloud Computing” Congress on Services – I, IEEE 2009, DOI 10.1109/SERVICES-I.2009.121
  6. Rajkumar Buyya, Rajiv Ranjan and Rodrigo N. Calheiros “Modeling and Simulation of Scalable Cloud Computing Environments and the CloudSim Toolkit: Challenges and Opportunities” IEEE 2009Conference on Automation and Logistics Shenyang, China August 2009.
  7. John Viega, McAffee “Cloud computing and the Common Man” Computer, Published by the IEEE Computer Society 2009.
  8. Mladen A. Vouk “Cloud Computing – Issues, Research and Implementations” Proceedings of the ITI 2008 30th Int. Conf. on Information Technology Interfaces, June 23-26, 2008, Cavtat, Croatia.
  9. Arun Raj Kumar and P. and S. Selvakumar “Distributed Denial-of-Service (DDoS) Threat in Collaborative Environment - A Survey on DDoS Attack Tools and Traceback Mechanisms” 2009 IEEE International Advance Computing Conference (IACC 2009) Patiala, India, 6-7 March 2009.
  10. Qingtao Wu, Ruijuan Zheng , Jiexin Pu and Shibao Sun “An Adaptive Control Mechanism for Mitigating DDoS Attacks” Proceedings of the IEEE International Conference on Automation and Logistics Shenyang, China August 2009.
  11. Monika Sachdeva, Krishan Kumar, Gurvinder Singh and Kuldip Singh “Performance Analysis of Web Service under DDoS Attacks” 2009 IEEE International Advance Computing Conference (IACC 2009) Patiala, India, 6-7 March 2009
  12. Gabriel Maciá-Fernández, Jesús E. Díaz-Verdejo and Pedro García-Teodoro “Mathematical Model for Low-Rate DoS Attacks Against Application Servers” IEEE Transactions On Information Forensics and Security, Published by the IEEE Computer Society 2009.Vol. 4, No. 3, September 2009.
  13. Li Xinlei, Zheng Kangfeng and Yang Yixian “A DDoS attack defending scheme based on network processor” 2009 WASE International Conference on Information Engineering.
  14. Yi Xie and Shun-Zheng Yu “Monitoring the Application-Layer DDoS Attacks for Popular Websites” IEEE/ACM Transactions on Networking, Vol. 17, NO. 1, Feb. 2009.
  15. Simon Liu, US National Library of Medicine “Surviving Distributed Denial-of-Service Attacks” Computer.org/ITPro,Published by the IEEE Computer Society 2009
Index Terms

Computer Science
Information Sciences

Keywords

Distributed denial of service Denial-of-service