Abstract

In modern web applications, the web client makes a request which takes very little effort to compose, but when it reaches the server, the application has to process lots of data and compose the response with a lot of effort The Denial of Service attack, in particular the Distributed Denial of Service (DDoS) attack, has become one of the key intimidations to the Internet. In general, attackers launch DDoS attacks by directing an enormous number of attack sources to send worthless traffic to the victim system. The victim's services are interrupting when its host or network resources are engaged by the attack traffic. The threat of DDoS attacks has become even more brutal as attackers can conciliation a huge number of computers by scattering a computer worm using vulnerabilities in the most popular operating systems. To counteract the same problem we consider the Online Auction Model where auctions run concurrently but independently of each other. Each auction has an auctioneer and a number of bidders that could be located anywhere on the Internet. We develop a novel technique for identifying attack traffic based on the connection history at the victim. We present an algorithm to filter attack traffic in a precise and efficient manner. In this algorithm we have to check the vulnerability of the user. If user is valid in that case algorithm has to check the load compiled by the user IP Address and calculate the complete load that is how much time is required by the user to complete the activities also to send and received the request to and from the system. If that load is in between the max_threshold and min_threshold which are two useful parameters to check the DDos attack then also we need to check the user profile for vulnerability issues. If everything is under the threshold values then algorithm will pass the user as a non attacker and allow user to use the system.

Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.