📞 +91-7667918914 | ✉️ ijarcce@gmail.com
IJARCCE Logo
International Journal of Advanced Research in Computer and Communication Engineering A monthly Peer-reviewed & Refereed journal
ISSN Online 2278-1021ISSN Print 2319-5940Since 2012
IJARCCE adheres to the suggestive parameters outlined by the University Grants Commission (UGC) for peer-reviewed journals, upholding high standards of research quality, ethical publishing, and academic excellence.
← Back to VOLUME 6, ISSUE 3, MARCH 2017

Shielding the Server from Furtive Distributed Denial of Service Attacks using Dominate and Release Policy

Akshitha Koluguri, Akshay Chotiya, Arindam Das, Aman Ajmani, Vishwajeet Singh

DOI: 10.17148/IJARCCE.2017.63238

Abstract: With the increase in threats in cyber security it is predictable that any service providing systems could be easily victimized by intruders. All the incoming requests are served by the servers attached to the systems and thus attackers can target the servers and generate illegitimate requests with the possibility of malfunctioning. The faux requests are practically imperceptible as the traffic they engender is suspected to be in low-rate. We represent respective intensities for legitimate traffic and fake traffic. The initial result is under the assumption of static routing by the attackers, followed by time-varying attacks. We confront the case like Join-the-Shortest-Queue is not a solid policy to defend from the time-varying attacks as the throughput region providing intensities for both legitimate and fake traffics are compromised. This study will provide you a clear idea on how to balance the traffic and defend the network from Distributed DoS attacks which lugs the possibility to degrade the system by using dominate and release(DaR) policy. We shall discuss this method using .NET framework on how we can identify the manual and automatic incoming requests to the server and provide protection.



Keywords: Service provisioning system, Distributed Denial of Service, Dominate and Release (DaR) policy, DDoS attack, illegitimate traffic.

How to Cite:

[1] Akshitha Koluguri, Akshay Chotiya, Arindam Das, Aman Ajmani, Vishwajeet Singh, “Shielding the Server from Furtive Distributed Denial of Service Attacks using Dominate and Release Policy,” International Journal of Advanced Research in Computer and Communication Engineering (IJARCCE), DOI: 10.17148/IJARCCE.2017.63238