Open Access   Article Go Back

Selective DDoS Attacks in Application server and Wireless Network – Survey

Harpinder Kaur1 , Bikrampal Kaur2

Section:Review Paper, Product Type: Journal Paper
Volume-4 , Issue-8 , Page no. 78-80, Aug-2016

Online published on Aug 31, 2016

Copyright © Harpinder Kaur , Bikrampal Kaur . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: Harpinder Kaur , Bikrampal Kaur, “Selective DDoS Attacks in Application server and Wireless Network – Survey,” International Journal of Computer Sciences and Engineering, Vol.4, Issue.8, pp.78-80, 2016.

MLA Style Citation: Harpinder Kaur , Bikrampal Kaur "Selective DDoS Attacks in Application server and Wireless Network – Survey." International Journal of Computer Sciences and Engineering 4.8 (2016): 78-80.

APA Style Citation: Harpinder Kaur , Bikrampal Kaur, (2016). Selective DDoS Attacks in Application server and Wireless Network – Survey. International Journal of Computer Sciences and Engineering, 4(8), 78-80.

BibTex Style Citation:
@article{Kaur_2016,
author = {Harpinder Kaur , Bikrampal Kaur},
title = {Selective DDoS Attacks in Application server and Wireless Network – Survey},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {8 2016},
volume = {4},
Issue = {8},
month = {8},
year = {2016},
issn = {2347-2693},
pages = {78-80},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=1036},
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=1036
TI - Selective DDoS Attacks in Application server and Wireless Network – Survey
T2 - International Journal of Computer Sciences and Engineering
AU - Harpinder Kaur , Bikrampal Kaur
PY - 2016
DA - 2016/08/31
PB - IJCSE, Indore, INDIA
SP - 78-80
IS - 8
VL - 4
SN - 2347-2693
ER -

VIEWS PDF XML
1579 1431 downloads 1441 downloads
  
  
           

Abstract

In the current computer world, preserving the information is very difficult. Some interrupts can occur on the local organization or network based system. Without security measures and controls in place our data might be subjected to an attack .Now a day’s numerous attacks are evolve. The Dos attack is the most popular attack in network and internet.This kind of attack ingests a large amount of network bandwidth and occupies network equipment resources by flooding them with packet from the machinesdispersed all over the world. Dos attacks are usually doing by following methods: 1) Send unlimited quantity of packets to the server.2) Implementing malwares.3) Teardrop attack.4) Application level flood. A DDos attack is propelled by a mechanism called Botnet through a network of controlled computers. Distributed denial of service (DDos) attack has been regularly in the works attacks that badly intimidate the stability of the internet. In accordance to CERT coordination center, there are mainly three categories of DDoS attacks: flood attacks, protocol attack and logical attack.

Key-Words / Index Term

Ddos Attack, Wireless Sensor Network, CERT Coordination Centre, Protocol Attack And Logical Attack

References

[1] Thapngam, Theerasak, et al. "Discriminating DDoS attack traffic from flash crowd through packet arrival patterns." Computer Communications Workshops (INFOCOM WKSHPS), 2011 IEEE Conference on. IEEE, 2011.
[2] Jun, Jae-Hyun, Hyunju Oh, and Sung-Ho Kim. "DDoS flooding attack detection through a step-by-step investigation." Networked Embedded Systems for Enterprise Applications (NESEA), 2011 IEEE 2nd International Conference on. IEEE, 2011.
[3] Han, Young-Tae, et al. "Vulnerability of small networks for the TTL expiry DDoS attack." Computing, Communications and Applications Conference (ComComAp), 2012. IEEE, 2012.
[4] SoundarRajam, V. K., et al. "Autonomous system based traceback mechanism for DDoS attack." Advanced Computing (ICoAC), 2013 Fifth International Conference on. IEEE, 2013.
[5] Sanmorino, Ahmad, and SetiadiYazid. "Ddos attack detection method and mitigation using pattern of the flow." Information and Communication Technology (ICoICT), 2013 International Conference of. IEEE, 2013.
[6] Bhuyan, Monowar H., Dhruba Kumar Bhattacharyya, and Jugal Kumar Kalita. "Information metrics for low-rate DDoS attack detection: A comparative evaluation." Contemporary Computing (IC3), 2014 Seventh International Conference on. IEEE, 2014.
[7] Anantvalee, Tiranuch, and Jie Wu. "A survey on intrusion detection in mobile ad hoc networks." Wireless Network Security. Springer US, 2007. 159-180.
[8] Chhabra, Meghna, and B. B. Gupta. "An Efficient Scheme to Prevent DDoS Flooding Attacks in Mobile Ad-Hoc Network (MANET)." Research Journal of Applied Sciences, Engineering and Technology 7.10 (2014): 2033-2039.
[9] Alqahtani, Sarra, and Rose Gamble. "DDoS Attacks in Service Clouds."System Sciences (HICSS), 2015 48th Hawaii International Conference on. IEEE, 2015.
[10] Jae-Hyun Jun, Hyunju Oh, andSung Kim. "Real time detection and classification of DDoS attacks using Enhanced SVM with string kernels." Recent Trends in Information Technology (ICRTIT), 2015 International journals on. IEEE, 2015.