AN INVESTIGATION OF SECURITY TECHNIQUES FOR CONCEALED DDOS EXPOSURE ATTACKS
Abstract
vioft2nntf2t|tblJournal|Abstract_paper|0xf4ff0626260000003c0e000001000500
Due to the influence of the multi-level system, the DDoS became a significant investigation in modern days. This encourages us to reduce the data loss and service overheads. In order to investigate these issues, an investigation of the DDoS attack and their related security techniques were analyzed in this paper. So, in this investigation, various data about the intruders will be collected by employing a secured multi-layered design with nomadic honeypots. Our proposed Subterranean Optimization procedure is utilized to distinguish the gatecrashers in view of the pheromone store on that considered zone. A multi-degree IP log table is utilized to distinguish the gatecrashers at diverse ranges of the device. Once the prompted range is found, the information is sent to multi-degree engineering to restrain the spreading of the stimulated region within the honeypot. This statistics will be dispatched to the honeypot to make a guard framework towards the attackers. The advantage of this proposed strategy is that it gives a complete barrier against DDoS at multilevel without making any overhead.

Authors
K Praghash1, M Masthan2, R Ravi3
Anna University, Chennai, India1, Manonmaniam Sundaranar University, India2, Francis Xavier Engineering College, India3

Keywords
DDoS attack, Subterranean Optimization procedure, Service Denial Attacks
Yearly Full Views
JanuaryFebruaryMarchAprilMayJuneJulyAugustSeptemberOctoberNovemberDecember
000000000002
Published By :
ICTACT
Published In :
ICTACT Journal on Communication Technology
( Volume: 9 , Issue: 1 , Pages: 1681-1685 )
Date of Publication :
March 2018
Page Views :
178
Full Text Views :
3

Creative Commons License
This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.