An Effective Performance For Denial Of Service Attack (DoS) Detection

被引:0
|
作者
Hemalatha, P. [1 ]
Vijithaananthi, J. [1 ]
机构
[1] Mt Zion Coll Engn & Technol, Dept Elect & Commun Engn, Pudukkottai, Tamil Nadu, India
关键词
Denial of service; Reversetracing; Artificial Bee Colony Algorithm; DDOS DETECTION;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Wireless Environments are the most successful communication and data service providing medium now-a-days. Security and Trustworthiness are the two major strategiesusers' needs to be concern with. Denial of Service attack is the major threatthat occurs while communicating data from one end to other end. The main aim of the Denial of service attack is the disruption of services by attempting to limit access to a machine or any service. For eliminating this new approach called Artificial Bee Reverse Tracing (ABRT) is introduced. Along with this, a data security scheme is proposed to secure the data and maintain its integrity over wireless medium by using Reverse Tracing Technique (RTT).
引用
收藏
页码:229 / 233
页数:5
相关论文
共 50 条
  • [41] Denial-of-Service Attack Detection Based on Multivariate Correlation Analysis
    Tan, Zhiyuan
    Jamdagni, Aruna
    He, Xiangjian
    Nanda, Priyadarsi
    Liu, Ren Ping
    [J]. NEURAL INFORMATION PROCESSING, PT III, 2011, 7064 : 756 - +
  • [42] Distributed Denial of Service Attack Detection and Prevention in Local Area Network
    Sinha, Somnath
    Prasad, N. Mahadev
    [J]. INNOVATIVE DATA COMMUNICATION TECHNOLOGIES AND APPLICATION, ICIDCA 2021, 2022, 96 : 415 - 428
  • [43] An adaptive observer design for denial-of-service attack detection in platoon
    Zhang, Xiaofei
    Du, Haiping
    Jia, Zhijuan
    Cui, Chi
    Cheng, Yage
    Yan, Yan
    [J]. OPTIMAL CONTROL APPLICATIONS & METHODS, 2023, 44 (04): : 2148 - 2165
  • [44] Detection of De-authentication Denial of Service attack in 802.11 networks
    Agarwal, Mayank
    Biswas, Santosh
    Nandi, Sukumar
    [J]. 2013 ANNUAL IEEE INDIA CONFERENCE (INDICON), 2013,
  • [45] Application of Hurst Parameter and Fuzzy Logic for Denial of Service Attack Detection
    Pharande, Supriya
    Pawar, Priyanka
    Wani, P. W.
    Patki, A. B.
    [J]. 2015 IEEE INTERNATIONAL ADVANCE COMPUTING CONFERENCE (IACC), 2015, : 834 - 838
  • [46] Review on distributed denial of service attack detection in software defined network
    Karthika, P.
    Karmel, A.
    [J]. International Journal of Wireless and Mobile Computing, 2023, 25 (02) : 128 - 146
  • [47] A Distributed Denial of Service Attack Sources Detection Technology for Cloud Computing
    Yang, Wenjun
    Wei, Dan
    [J]. 2017 4TH INTERNATIONAL CONFERENCE ON SYSTEMS AND INFORMATICS (ICSAI), 2017, : 660 - 664
  • [48] Research on the Detection of denial service attack based on the correlation of changing points
    Li Xiyong
    [J]. PROCEEDINGS OF THE 2015 INTERNATIONAL CONFERENCE ON COMPUTATIONAL SCIENCE AND ENGINEERING, 2015, 17 : 70 - 75
  • [49] Efficient Placement of Sensors for Detection against Distributed Denial of Service Attack
    Islam, Muhammad Hasan
    Nadeem, Kamran
    Khan, Shoab A.
    [J]. IIT: 2008 INTERNATIONAL CONFERENCE ON INNOVATIONS IN INFORMATION TECHNOLOGY, 2008, : 262 - 266
  • [50] An adaptive sampling algorithm with applications to denial-of-service attack detection
    Patcha, Anitnesh
    Park, Jung-Min
    [J]. ICCCN 2006: 15TH INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATIONS AND NETWORKS, PROCEEDINGS, 2006, : 11 - +