Call for Paper - August 2020 Edition
IJCA solicits original research papers for the August 2020 Edition. Last date of manuscript submission is July 20, 2020. Read More

DDOS Attack Prevention on Application Layer

Print
PDF
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Year of Publication: 2015
Authors:
Ashvini P. Pawar, Anushree P. Sonawane, Bhagyashree N. Damale, Kiran S. Kokate, K.S. Kumavat
10.5120/ijca2015906509

Ashvini P Pawar, Anushree P Sonawane, Bhagyashree N Damale, Kiran S Kokate and K S Kumavat. Article: DDOS Attack Prevention on Application Layer. International Journal of Computer Applications 127(10):22-25, October 2015. Published by Foundation of Computer Science (FCS), NY, USA. BibTeX

@article{key:article,
	author = {Ashvini P. Pawar and Anushree P. Sonawane and Bhagyashree N. Damale and Kiran S. Kokate and K.S. Kumavat},
	title = {Article: DDOS Attack Prevention on Application Layer},
	journal = {International Journal of Computer Applications},
	year = {2015},
	volume = {127},
	number = {10},
	pages = {22-25},
	month = {October},
	note = {Published by Foundation of Computer Science (FCS), NY, USA}
}

Abstract

Streathly Denial of Service (DDS) attacks are a complicated threat to the event. Now days, there are an increasing number of DDS attacks against on-line application and Web services. Detecting application layer DDS attack is a hard task. In this, its detection scenario based on the information theory depends on metrics. It has two phases: Behavior monitoring and Detection. In the first phase, the Web user commerce behavior is access from the system log during safe cases. Depends on the observation, Entropy of requests per session and the trust score for each user is evaluated. In the second phase, the suspicious requests are identified depends on the changes in entropy and a rate limiter is identified to downgrade services to malicious attackers. A scheduler is included to planning the session based on the trust score of the user and the system workload.

References

  1. Shui Yu, Wanlei Zhou, Robin Doss, & Weijia Jia, (2011) "Traceback of DDoS Attacks using EntropyVariations", IEEE Transactions on Parallel and Distributed Systems.
  2. Supranamaya Ranjan, Ram Swaminathan, Mustafa Uysal, Antonio Nucci, & Edward Knightly, (2009) “DDoS-Shield: DDoS-Resilient Scheduling to Counter Application Layer attacks”, IEEE/ACM Transactions on Networking,
  3. Huey-Ing Liu & Kuo-Chao Chang, (2011) “Defending systems Against Tilt DDoS attacks”, 6th International Conference on Telecommunication Systems, Services, and Applications.
  4. Jin Wang, Xiaolong Yang & Keping Long, (2010) “A New Relative Entropy Based App-DDoS Detection Method”, IEEE Symposium On Computers And Communications (Iscc).
  5. S. Yu, W. Zhou & R. Doss, (2008) “Information theory based detection against network behavior mimicking DDoS attack,” IEEE Communications Letters, vol. 12, no. 4, pp. 319–321.
  6. S. Blake, D. Black, M. Carlson, E. Davies, Z. Wang, and W. Weiss. RFC2475: Architecture for Differentiated Services. RFC Editor United States, 1998.
  7. Cisco. “Strategies to Protect Against Distributed Denial of Service Attacks”. 17 February 2000. URL: http://www.cisco.com/warp/public/707/newsflash.html (4 Jan. 2002 )
  8. CISCO. “Defining Strategies to Protect Against UDP Diagnostic Port DoS Attacks”. September 17, 1996. URL : http://cio.cisco.com/warp/public/707/3.html (4 Jan. 2002)
  9. Raja Azrina Raja Othman “Understanding the Various Types of Denial of Service Attack “.

Keywords

Sophisticated attacks strategy, Low-rate attacks, Intrusion detection, DDS, Application Layer & Entropy.