SlideShare a Scribd company logo
1 of 8
Download to read offline
International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-6367(Print),
INTERNATIONAL JOURNAL OF COMPUTER ENGINEERING &
ISSN 0976 - 6375(Online), Volume 5, Issue 2, February (2014), pp. 01-08 © IAEME

TECHNOLOGY (IJCET)

IJCET

ISSN 0976 – 6367(Print)
ISSN 0976 – 6375(Online)
Volume 5, Issue 2, February (2014), pp. 01-08
© IAEME: www.iaeme.com/ijcet.asp
Journal Impact Factor (2014): 4.4012 (Calculated by GISI)
www.jifactor.com

©IAEME

SURVEY OF ABSTRACT METHODS FOR HOW TO SAFEGUARD
AGAINST DISTRIBUTED DENIAL OF SERVICE ATTACKS
Tiruveedula GopiKrishna1,

DavuluriNageswara Rao2,

Mohamed A.Abdelhadi3

1

Research Scholar, Computer Department, Faculty of Arts & Science, Al-Jufra,
Sirt University, Hoon, Al-Jufra,Libya.
2
Lecturer, Computer Department, Faculty Science, Sirt University, Sirt, Libya.
3
Lecturer, Department of Computer Science, Faculty of Arts & Science, Hoon, Aljufra,
Sirt University, Libya.

ABSTRACT
In this article, we have tried to demonstrate that any business, large or small, that is
dependent on Internet traffic to generate sales, service its customers, or maintain confidentiality is a
candidate forstepped up protection against Denial of Service and Distributed Denial ofService
attacks for their networksystems. No business or industry should consider itself completelysafe from
such attacks, as a failure to maintain defensive measurescan result in severe financial and
reputational consequences. Andwe discussed some existing ways you can help safeguard your
internetworking environment or a company. We also describe existing methods and techniques used
in denial of service attacks, and we listpossible defenses.
Keywords: DDoS, Strategies, Prevention, Detection, Tools, Attacks.
I.

INTRODUCTION

A DDOS attack (better known as a Distributed Denial of Service attack) is a type of web
attack that seeks to disrupt the normal function of the targeted computer network. This is any type of
attack that attempts to make this computer resource unavailable to its users. While this type of attack
typically follows the same sorts of patterns, the definition of the term Distributed Denial of Service
does not make any specific indications of how this type of attack is to be pulled off. What makes this
type of attack "distributed" is the concerted efforts between a large number of disruptors all for the
common goal of preventing web servers (and therefore websites) from functioning effectively at all.
These users may be willing participants, or in some cases be tricked into downloading software that
1
International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-6367(Print),
ISSN 0976 - 6375(Online), Volume 5, Issue 2, February (2014), pp. 01-08 © IAEME

will use their terminal to aid in the offensive. All in all, regardless of the means, a DDOS attack is
simply a combined effort to prevent computer systems from working as well as they should, typically
from a remote location over the internet [1, 2, and 3].
The most common method of attack is to send a mass saturation of incessant requests for
external communication to the target. These systems are flooded with requests for information from
non-users, and often non-visitors to the website. The goal of this attack is to create a large enough
presence of false traffic such that legitimate web traffic intended for actual web users is slowed down
and delayed. If this type of service becomestoo slow, time sensitive information such as live video
footage may be rendered entirely useless to legitimate end users [1].
For a DDOS to work effectively, the process has to be heavily automated on the attacker's
end. Customized software is designed to flood these services with false traffic, and is run on as many
computers as possible. There are a few instances in which this type of software was set up like a
virus, infecting computers and taking control of their communication functions. These users
unwillingly are aiding in a DDOS attack, sometimes without being the slightest bit aware of it. If
there seems to be large delays in normal internet service, there may be outbound requests being made
consuming your internet connections given throughput, and can sometimes be an indication of foul
play. Users seeking to limit this risk should keep anti-virus software up to date, and scan frequently
for these types of programs [2].
While there are few court cases on the books of Distributed Denial of Service perpetrators
being held accountable for their actions, as well as the potential lost income for commercial
websites, this type of activity almost always violates the terms of service and acceptable use policies
of internet service providers, as well as often violating individual communication law within the
nation. These types of attacks have become more and more prevalent as time goes on, and in many
nation legislation is in the works, with hopes of criminal penalties for those involved with this sort of
attack.
All in all, a DDOS attack is a very real threat to businesses and organizations across the
world, and it's important that they be prepared in case some group of people decides to cause trouble
for your organization. Being prepared to identify these types of threats is an important part of proper
internet use, and should be a part of your daily life online.
II.

CATEGORIES DOS ATTACKS

2.1 Operating system attacks--Defined as attacks directed against a certain facet of the computer's
operating system. The objective of these attacks is to cause the system to freeze or completely
restart. As operating system attacks are very explicit in nature, applying software updates or
patches that are released by software manufacturers or independent developers can easily prevent
them [4].
2.2 Networking attacks--The more common type of DoS attack, which attempts to take advantage
of built-in aspects of the networking functions of a system. Though various methods are used in
these attacks, the most common type is that which directs so much data at the network interfaces
of a system, that it closes down completely, or resets the network interface being targeted. It was
a variation of this type of attack that caused the attacks earlier this year [4].
III. TYPES OF DDOS ATTACKS
3.1

Application-layer DDOS attack
Application layer DDOS attack: Application-layer DDOS attacks are attacks that target
Windows, Apache, OpenBSD, or other software vulnerabilities to perform the attack and crash the
server [6].
2
International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-6367(Print),
ISSN 0976 - 6375(Online), Volume 5, Issue 2, February (2014), pp. 01-08 © IAEME

3.2

Protocol DOS attack
Protocol DDOS attack: A protocol DDOS attacks is a DOS attack on the protocol level. This
category includes Synflood, Ping of Death, and more [6].
3.3

Volume-based DDOS attack
Volume-based DDOS attack: This type of attack includes ICMP floods, UDP floods, and
other kind of floods performed via spoofed packets.
3.4

Reflected Attack
A reflected attack is where an attacker creates forged packets that will be sent out to as many
computers as possible. When these computers receive the packets they will reply, but the reply will
be a spoofed address that actually routes to the target. All of the computers will attempt to
communicate at once and this will cause the site to be bogged down with requests until the server
resources are exhausted[6].
3.5

Peer-to-Peer Attacks
Peer-to-Peer servers present an opportunity for attackers. What happens is instead of using a
botnet to siphon traffic towards the target, a peer-to-peer server is exploited to route traffic to the
target website. When done successfully, people using the file-sharing hub are instead sent to the
target website until the website is overwhelmed and sent offline[6].
3.6

Nuke
Corrupt and fragmented packets are sent via a modified ping utility to keep the malicious
packets to be delivered to the target. Eventually, the target machine goes offline. This attack focuses
on comprising computer networks and is an old distributed denial of service attack [6].
3.7

Slowloris
Slowloris is a tool that allows an attacker to use fewer resources during an attack. During the
attack connections to the target machine will be opened with partial requests and allowed to stay
open for the maximum time possible. It will also send HTTP headers at certain intervals. This adds
to the requests, but never completes them – keeping more connections open longer until the target
website is no longer able to stay online[8].
3.8

Degradation of Service Attacks
The purpose of this attack is to slow server response times. A DDoS attack seeks to take a
website or server offline. That is not the case in a degradation of service attack. The goal here is to
slow response time to a level that essentially makes the website unusable for most people. Zombie
computers are leveraged to flood a target machine with malicious traffic that will cause performance
and page-loading issues. These types of attacks can be difficult to detect because the goal is not to
take the website offline, but to degrade performance. They are often confused with simply an
increase in website traffic [8].
3.9

Unintentional DDoS
Unintended distributed denial of service happens when a spike in web traffic causes a server
to not be able to handle all of the incoming requests. The more traffic that occurs, the more resources
are used. This causes pages to timeout when loading and eventually the server will fail to respond
and go offline [6].

3
International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-6367(Print),
ISSN 0976 - 6375(Online), Volume 5, Issue 2, February (2014), pp. 01-08 © IAEME

3.10

Application Level Attacks
Application level attacks target areas that have more vulnerabilities. Rather than attempt to
overwhelm the entire server, an attacker will focus their attack on one – or a few – applications.
Web-based email apps, WordPress, Joomla, and forum software are good examples of application
specific targets [6].
3.11

Multi-Vector Attacks
Multi-vector attacks are the most complex forms of distributed denial of service (DDoS)
attack. Instead of utilizing a single method, a combination of tools and strategies are used to
overwhelm the target and take it offline. Often times, multi-vector attacks will target specific
applications on the target server, as well as, flood the target with a large volume of malicious traffic.
These types of DDoS attacks are the most difficult to mitigate because the attack come in different
forms and target different resources simultaneously [6].
IV.TRADITIONALMETHODS
It used to be that a denial of service was the simplest type of attack out there. Someone would
start the ping command on their computer, aim it at their target address, and let it run full speed,
trying to literally flood the other side with Echo Requests, or ping packets. Of course, this quickly
changed, because in this case, the attacker would need a connection with more bandwidth than the
target site. First, they moved on to larger hosts, like compromising a server at a university or research
center -- somewhere with a lot of bandwidth -- and sent their attacks from there. But now, botnets are
used in almost all cases, because it's simpler for them, and is less apparent, making the attack
completely distributed. In fact, malware authors have made a big business of running a botnet. They
actually rent their compromised zombie computers, by the hour. If someone wants to bring down a
website, all they have to do is pay the botnet owner a certain amount of money, and those thousands
of compromised systems are aimed at the target. While a single computer would have no chance of
bringing a site down, if 10,000 computers or more all send a request at once, it would bring down
any unprotected server [9].
The type of attack evolved as well. ICMP, what's used by the ping command, is easily
blocked. Now, there are various ways that a DDoS attack can be done. First there's what's called a
Syn attack, which simply means that the attacker opens a TCP connection, the way you would
normally connect to a website, but never finishes the initial handshake. It basically leaves the server
hanging. Another clever way is to use DNS. There are a lot of network providers who have their
DNS servers configured to allow anyone to launch queries, even people that aren't customers of
theirs. Also, because DNS uses UDP, which is a stateless protocol, these two facts make this a potent
way to create a denial of service. All the attacker has to do is find open DNS resolvers, craft a fake
UDP packet that has a spoofed address, the one of the target site, and send it to the DNS server.
While the request comes from the attacker and his botnet, the server thinks that request came from
the server instead, and will send the reply to that location. So instead of having the actual botnet
conduct the attack, the only thing the target site will see is a bunch of DNS replies coming from
many open resolvers, all around the Internet. Also, it's a very scalable type of attack, because you can
send a single UDP packet to a DNS server asking for a full dump of a certain domain, and receive a
very large reply [9].
Here, we describe the distributed denial of service methods employed by an attacker. These
techniques help an attacker coordinate and execute the attack. These types of attacks plagued the
Internet in February 2000. However, these distributed attack techniques still rely on the previously
described attack methods to carry out the attacks. The techniques are listed in chronological order. It
can be observed that as time has passed, the distributed techniques (Trinoo, TFN, Stacheldraht,
4
International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-6367(Print),
ISSN 0976 - 6375(Online), Volume 5, Issue 2, February (2014), pp. 01-08 © IAEME

Shaft, and TFN2K) have become technically more advanced and, hence, more difficult to detect.
Trinoo uses TCP to communicate between the attacker and the control master program. The master
program communicates with the attack daemons using UDP packets.
(a) Trinoo’s attack daemons implement UDP Flood attacks against the target victim [10]. Tribe
Flood Network (TFN) uses a command line interface to communicate between the attacker
and the control master program. Communication between the control master and attack
daemons is done via ICMP echo reply packets. TFN’s attack daemons implement Smurf,
SYN Flood, UDP Flood, and ICMP Flood attacks [10].
(b) Stacheldraht (German term for “barbed wire”) is based on the TFN attack. However, unlike
TFN, Stacheldraht uses an encrypted TCP connection for communication between the
attacker and master control program. Communication between the master control program
and attack daemons is conducted using TCP and ICMP, and involves an automatic update
technique for the attack daemons. The attack daemons for Stacheldraht implement Smurf,
SYN Flood, UDPFlood, and ICMP Flood attacks [10].
(c) Shaft is modeled after Trinoo. Communication between the control master program and
attack daemons is achieved using UDP packets. The control master program and the attacker
communicate via a simple TCP telnet connection. A distinctive feature of Shaft is the ability
to switch control master servers and ports in real time, hence making detection by intrusion
detection tools difficult [11].
(d) TFN2K uses TCP, UDP, ICMP, or all three to communicate between the control master
program and the attack daemons. Communication between the real attacker and control
master is encrypted using a key-based CAST-256 algorithm [1]. In addition, TFN2K
conducts covert exercises to hide itself from intrusion detection systems. TFN2K attack
daemons implement Smurf, SYN, UDP, and ICMP Flood attacks [2].
V.

HOWTO PROTECT YOUR NETWORK

So as you can see, a DDoS can take multiple forms, and when building a defense against
them, it's important to consider these variants. The easiest, although a costly way to defend yourself,
is to buy more bandwidth. A denial of service is a game of capacity. If you have 10,000 systems
sending 1 Mbps your way that means you're getting 10 Gb of data hitting your server every second.
That's a lot of traffic. In this case, the same rules apply as for normal redundancy. You want more
servers, spread around various datacenters, and you want to use good load balancing. Having that
traffic spread out to multiple servers will help the load, and hopefully your pipes will be large
enough to handle all that traffic. But modern DDoS attacks are getting insanely large, and quite often
can be much bigger than what your finances will allow in terms of bandwidth. Plus, sometimes it's
not your website that will be targeted, a fact that many administrators tend to forget[9].
One of the most critical pieces of your network is your DNS server. It's a bad idea to leave it
as an open resolver, and it should be locked down in order to save you from being used as part of an
attack. But in a similar way, what if those servers came under attack? Even if your website is up, if
no one can connect to your DNS servers and resolve your domain name, that's just as bad. Most
domain registrations are done with two DNS servers, but quite often that may not be enough. Make
sure your DNS is protected behind the same type of load balancing that your web and other resources
are. There are also companies out there that provide redundant DNS that you can use. For example,
many people use content delivery networks to serve files to customers in a distributed way, which is
5
International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-6367(Print),
ISSN 0976 - 6375(Online), Volume 5, Issue 2, February (2014), pp. 01-08 © IAEME

a great way to also protect them against DDoS attacks, but many of those companies also offer
enhanced DNS protection as well, which is something you may want to look at.For example, it's
quite obvious that your website is never going to be asking random DNS servers for queries, so
there's no reason to allow UDP port 53 packets heading for your servers. Block everything you can at
your network border, where you have the largest pipe, or better yet, get your upstream provider to
block them for you. Many Internet providers offer this type of service to businesses, where you can
be in touch with their network operating centers and make sure they block any unwanted traffic, and
also help you out in the event that you're getting attacked. In a similar way, there are manyways to
protect your network from Syn attacks, by increasing your TCP backlog, reducing the Syn-Received
timer, or using Syn caches.[9]
Finally, you should also think about ways to mitigate any attack that does reach your site. For
example, most modern websites use a lot of dynamic resources. While the actual bandwidth from an
attack may be manageable, often what ends up failing is the database, or the custom scripts you may
be running. Think about using caching servers to provide as much static content as possible. Have a
plan in place to quickly replace dynamic resources with static ones, in the event that you're getting
attacked. And make sure to have detection systems in place. The worst thing for any business is for
the network or site to go down, so you want to be alerted as soon as an attack starts, and be ready to
deal with it. Because of the way it's done, halting a DDoS attack at the source is incredibly difficult.
But setting up an infrastructure that is distributed, hardened, and secure is possible, and that's
something you should think about when setting up your network.Distributed denial of service
(DDoS) attacks is a growing concern with far-reaching effects for businesses and organizations of all
sizes. DDoS attacks are used by criminal enterprises, politically-motivated cyber terrorists, and
hackers hoping to bring websites down for fun or profit.Now, more than ever, it is crucial for
organizations and online retailers to measure their risk of attack and create a DDoS attack protection
plan in advance in order to mitigate risk and enable a fast recovery[10,11].
Many observers have stated that there are currently no successful defenses against a fully
distributed denial of service attack. This may be true. Nevertheless, there are numerous safety
measures that a host or network can perform to make the network and neighboring networks more
secure. These measures include:
(1) Filtering Routers: Filtering all packets entering and leaving the network protects the network
from attacks conducted from neighboring networks, and prevents the network itself from
being an unaware attacker [12]. This measure requires installing ingress and egress packet
filters on all routers.
(2) Disabling IP Broadcasts: By disabling IP broadcasts, hostcomputers can no longer be used as
amplifiers in ICMPFlood and Smurf attacks. However, to defend against thisattack, all
neighboring networks need to disable IP broadcasts.
(3) Applying Security Patches: To guard against denial ofservice attacks, host computers must be
updated with thelatest security patches and techniques. For example, in thecase of the SYN
Flood attack [8], there are three steps thatthe host computers can take to guard themselves
fromattacks: increase the size of the connection queue, decreasethe time-out waiting for the
three-way handshake, andemploy vendor software patches to detect and circumvent the
problem.
(4) Disabling Unused Services: If UDP echo or charge services are not required, disabling them
will help to defendagainst the attack. In general, if network services areunneeded or unused,
the services should be disabled toprevent tampering and attacks.
6
International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-6367(Print),
ISSN 0976 - 6375(Online), Volume 5, Issue 2, February (2014), pp. 01-08 © IAEME

(5) Performing Intrusion Detection: By performing intrusiondetection, a host computer and
network are guarded againstbeing a source for an attack, as while as being a victim of
anattack. Network monitoring is a very good pre-emptive wayof guarding against denial of
service attacks. By monitoringtraffic patterns, a network can determine when it is
underattack, and can take the required steps to defend itself. Byinspecting host systems, a
host can also prevent it fromhosting an attack on another network [13].
VI. CONCLUSION
In this paper, we discussed distributed denial of serviceattacks on the Internet. We described
how distributedattacks are conducted; we reviewed somedistributed denial of service techniques, and
discussvarious defense mechanisms that could be employed bynetworks and hosts.So, every
company should take care of it and set up good level of protection to defendDDOS attack.Further
work is though needed that combines well knownsecurity drawbacks of wireless protocols with
defensetechniques that are already mature in a wireless environment.
VII. ACKNOWLEDGEMENTS
We would like to thank to all our faculty members who contributed their valuable
information to prepare this paper.
VIII. REFERENCES
[1]

C. Adams and J. Gilchrist, “RFC 2612: The CAST-256encryption algorithm,” June 1999,
http://www.cis.ohiostateedu/htbin/rfc/rfc2612.html.
[2] J. Barlow and W. Thrower, “TFN2K – an analysis,”Feb. 2000,
http://packetstorm.securify.com/distributed/TFN2k_Analysis.htm.
[3] S. Bellovin, “Security problems in the TCP/IP protocol suite,” Comput. Commun. Rev.,
vol.19, no. 2, pp. 32-48, Apr. 1989.
[4] S. Bellovin, “Distributed denial of service attacks,” Feb. 2000,
http://www.research.att.com/~smb/talks.
[5] S. Bellovin, Ed., “The ICMP traceback message,” NetworkWorking Group Internet Draft,
Mar. 2000, http://www.research.att.com/~smb/papers/draft-bellovin-itrace-00.txt.
[6] CERT® Coordination Center,
Cert
Advisories: “CA-2000-01denial-of-service
developments,” http://www.cert.org/advisories/CA-2000-01.html; “CA-99-17 denial-ofservice tools, http://www.cert.org/advisories/CA-99-17-denial-of-servicetools.html; “CA-9813-tcp-denial-of-service: vulnerability in certain TCP/IP implementations.
http://www.cert.org/advisories/CA-98-13-tcp-denial-of-service.html.
[7] CERT® Coordination Center, “Results of the distributedsystems intruder tools workshop,”
Nov. 1999,http://www.cert.org/reports/dsit_workshop.pdf.
[8] Cisco Systems, Inc., “Defining strategies to protect against TCP SYN denial of service
attacks,” July 1999, Http://www.cisco.com/warp/public/707/4.html.
[9] Daemon9, Infinity, and Route, “IP-spoofing demystified:trust-relationship exploitation,”
Phrack Mag., June 1996,http://www.fc.net/phrack/files/p48/p48-14.html.
[10] D. Dittrich, “The DoS project's ‘Trinoo’ distributed denial ofservice attack tool,” Oct. 1999;
“The ‘Stacheldraht’ distributeddenial of service attack tool,” Dec. 1999; “The ‘Tribe
FloodNetwork’ distributed denial of service attack tool,” Oct. 1999,
http://www.washington.edu/People/dad.

7
International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-6367(Print),
ISSN 0976 - 6375(Online), Volume 5, Issue 2, February (2014), pp. 01-08 © IAEME

[11] D. Dittrich, S. Dietrich, and N. Long, “An analysis of the‘Shaft’ distributed denial of device
tool,” Mar. 2000,http://netsec.gsfc.nasa.gov/~spock/shaft_analysis.txt.
[12] P. Ferguson and D. Senie, “RFC 2267: Network ingressfiltering: defeating denial of service
attacks which employ IPsource address spoofing,” Jan. 1998,
http://info.internet.isi.edu/innotes/rfc/files/rfc2267.txt.
[13] S. Floyd and V. Jacobson, “Random early detection gateways for congestion avoidance,”
IEEE/ACM Trans. Networking, vol. 1no. 4, pp. 397-413, Aug. 1993.
[14] T. H. Ptacek and T. N. Newsham, “Insertion, evasion, anddenial of service: eluding network
intrusion detection,” SecureNetworks, Inc., Jan. 1998.
http://www.clark.net/~roesch/idspaper.html.
[15] Er. Abhijeet, Praveen Tripathi, Er.Anuja Priyam and Er.Vivek Kumar, “Implementation of
Public Key Cryptography in Kerberos with Prevention of Security Attacks”, International
Journal of Computer Engineering & Technology (IJCET), Volume 4, Issue 3, 2013,
pp. 248 - 253, ISSN Print: 0976 – 6367, ISSN Online: 0976 – 6375.
[16] Prof. S.B. Javheri and Shwetambari Ramesh Patil, “Attacks Classification in Network”,
International Journal of Information Technology and Management Information Systems
(IJITMIS), Volume 4, Issue 3, 2013, pp. 1 - 11, ISSN Print: 0976 – 6405, ISSN Online:
0976 – 6413.

8

More Related Content

What's hot

IRJET- A Novel Survey on DOS Attacks
IRJET- A Novel Survey on DOS AttacksIRJET- A Novel Survey on DOS Attacks
IRJET- A Novel Survey on DOS AttacksIRJET Journal
 
A survey of trends in massive ddos attacks and cloud based mitigations
A survey of trends in massive ddos attacks and cloud based mitigationsA survey of trends in massive ddos attacks and cloud based mitigations
A survey of trends in massive ddos attacks and cloud based mitigationsIJNSA Journal
 
IRJET- A Survey on DDOS Attack in Manet
IRJET-  	  A Survey on DDOS Attack in ManetIRJET-  	  A Survey on DDOS Attack in Manet
IRJET- A Survey on DDOS Attack in ManetIRJET Journal
 
A ROBUST MECHANISM FOR DEFENDING DISTRIBUTED DENIAL OF SERVICE ATTACKS ON WEB...
A ROBUST MECHANISM FOR DEFENDING DISTRIBUTED DENIAL OF SERVICE ATTACKS ON WEB...A ROBUST MECHANISM FOR DEFENDING DISTRIBUTED DENIAL OF SERVICE ATTACKS ON WEB...
A ROBUST MECHANISM FOR DEFENDING DISTRIBUTED DENIAL OF SERVICE ATTACKS ON WEB...IJNSA Journal
 
Module 8 (denial of service)
Module 8 (denial of service)Module 8 (denial of service)
Module 8 (denial of service)Wail Hassan
 
Denial of service attacks and mitigation
Denial of service attacks and mitigationDenial of service attacks and mitigation
Denial of service attacks and mitigationAmeya Vashishth
 
2016 payment threats trends report
2016 payment threats trends report2016 payment threats trends report
2016 payment threats trends reportIan Beckett
 
Impact of Flash Crowd Attack in Online Retail Applications
Impact of Flash Crowd Attack in Online Retail ApplicationsImpact of Flash Crowd Attack in Online Retail Applications
Impact of Flash Crowd Attack in Online Retail ApplicationsIJEACS
 
IRJET- DDOS Detection System using C4.5 Decision Tree Algorithm
IRJET- DDOS Detection System using C4.5 Decision Tree AlgorithmIRJET- DDOS Detection System using C4.5 Decision Tree Algorithm
IRJET- DDOS Detection System using C4.5 Decision Tree AlgorithmIRJET Journal
 
IRJET- Detection and Isolation of Zombie Attack under Cloud Computing
IRJET- Detection and Isolation of Zombie Attack under Cloud ComputingIRJET- Detection and Isolation of Zombie Attack under Cloud Computing
IRJET- Detection and Isolation of Zombie Attack under Cloud ComputingIRJET Journal
 
DDoS Attacks Advancing and Enduring a SANS & Corero Survey
DDoS Attacks Advancing and Enduring a SANS & Corero SurveyDDoS Attacks Advancing and Enduring a SANS & Corero Survey
DDoS Attacks Advancing and Enduring a SANS & Corero SurveyStephanie Weagle
 
IP Traceback for Flooding attacks on Internet Threat Monitors (ITM ) Using Ho...
IP Traceback for Flooding attacks on Internet Threat Monitors (ITM ) Using Ho...IP Traceback for Flooding attacks on Internet Threat Monitors (ITM ) Using Ho...
IP Traceback for Flooding attacks on Internet Threat Monitors (ITM ) Using Ho...IJNSA Journal
 
Paper id 41201622
Paper id 41201622Paper id 41201622
Paper id 41201622IJRAT
 
Designing Security Assessment of Client Server System using Attack Tree Modeling
Designing Security Assessment of Client Server System using Attack Tree ModelingDesigning Security Assessment of Client Server System using Attack Tree Modeling
Designing Security Assessment of Client Server System using Attack Tree Modelingijtsrd
 
20150311 bit module7_tbk_bit_lecture
20150311 bit module7_tbk_bit_lecture20150311 bit module7_tbk_bit_lecture
20150311 bit module7_tbk_bit_lectureUniversity of Twente
 

What's hot (18)

Ipremier case
Ipremier caseIpremier case
Ipremier case
 
IRJET- A Novel Survey on DOS Attacks
IRJET- A Novel Survey on DOS AttacksIRJET- A Novel Survey on DOS Attacks
IRJET- A Novel Survey on DOS Attacks
 
A survey of trends in massive ddos attacks and cloud based mitigations
A survey of trends in massive ddos attacks and cloud based mitigationsA survey of trends in massive ddos attacks and cloud based mitigations
A survey of trends in massive ddos attacks and cloud based mitigations
 
IRJET- A Survey on DDOS Attack in Manet
IRJET-  	  A Survey on DDOS Attack in ManetIRJET-  	  A Survey on DDOS Attack in Manet
IRJET- A Survey on DDOS Attack in Manet
 
A ROBUST MECHANISM FOR DEFENDING DISTRIBUTED DENIAL OF SERVICE ATTACKS ON WEB...
A ROBUST MECHANISM FOR DEFENDING DISTRIBUTED DENIAL OF SERVICE ATTACKS ON WEB...A ROBUST MECHANISM FOR DEFENDING DISTRIBUTED DENIAL OF SERVICE ATTACKS ON WEB...
A ROBUST MECHANISM FOR DEFENDING DISTRIBUTED DENIAL OF SERVICE ATTACKS ON WEB...
 
L1803046876
L1803046876L1803046876
L1803046876
 
Module 8 (denial of service)
Module 8 (denial of service)Module 8 (denial of service)
Module 8 (denial of service)
 
Denial of service attacks and mitigation
Denial of service attacks and mitigationDenial of service attacks and mitigation
Denial of service attacks and mitigation
 
2016 payment threats trends report
2016 payment threats trends report2016 payment threats trends report
2016 payment threats trends report
 
Impact of Flash Crowd Attack in Online Retail Applications
Impact of Flash Crowd Attack in Online Retail ApplicationsImpact of Flash Crowd Attack in Online Retail Applications
Impact of Flash Crowd Attack in Online Retail Applications
 
IRJET- DDOS Detection System using C4.5 Decision Tree Algorithm
IRJET- DDOS Detection System using C4.5 Decision Tree AlgorithmIRJET- DDOS Detection System using C4.5 Decision Tree Algorithm
IRJET- DDOS Detection System using C4.5 Decision Tree Algorithm
 
IRJET- Detection and Isolation of Zombie Attack under Cloud Computing
IRJET- Detection and Isolation of Zombie Attack under Cloud ComputingIRJET- Detection and Isolation of Zombie Attack under Cloud Computing
IRJET- Detection and Isolation of Zombie Attack under Cloud Computing
 
DDoS Attacks Advancing and Enduring a SANS & Corero Survey
DDoS Attacks Advancing and Enduring a SANS & Corero SurveyDDoS Attacks Advancing and Enduring a SANS & Corero Survey
DDoS Attacks Advancing and Enduring a SANS & Corero Survey
 
Ix3615551559
Ix3615551559Ix3615551559
Ix3615551559
 
IP Traceback for Flooding attacks on Internet Threat Monitors (ITM ) Using Ho...
IP Traceback for Flooding attacks on Internet Threat Monitors (ITM ) Using Ho...IP Traceback for Flooding attacks on Internet Threat Monitors (ITM ) Using Ho...
IP Traceback for Flooding attacks on Internet Threat Monitors (ITM ) Using Ho...
 
Paper id 41201622
Paper id 41201622Paper id 41201622
Paper id 41201622
 
Designing Security Assessment of Client Server System using Attack Tree Modeling
Designing Security Assessment of Client Server System using Attack Tree ModelingDesigning Security Assessment of Client Server System using Attack Tree Modeling
Designing Security Assessment of Client Server System using Attack Tree Modeling
 
20150311 bit module7_tbk_bit_lecture
20150311 bit module7_tbk_bit_lecture20150311 bit module7_tbk_bit_lecture
20150311 bit module7_tbk_bit_lecture
 

Viewers also liked

잡코리아 글로벌 프런티어 2기_지구인 이단 옆차기_탐방 보고서
잡코리아 글로벌 프런티어 2기_지구인 이단 옆차기_탐방 보고서잡코리아 글로벌 프런티어 2기_지구인 이단 옆차기_탐방 보고서
잡코리아 글로벌 프런티어 2기_지구인 이단 옆차기_탐방 보고서잡코리아 글로벌 프런티어
 
‘Over the Horizon’ sharemarket commentary – October 2013
‘Over the Horizon’ sharemarket commentary – October 2013‘Over the Horizon’ sharemarket commentary – October 2013
‘Over the Horizon’ sharemarket commentary – October 2013David Offer
 
Hh News Bytes 0407
Hh News Bytes 0407Hh News Bytes 0407
Hh News Bytes 0407Ezra_Bettis
 
Arduino experimenters guide hq
Arduino experimenters guide hqArduino experimenters guide hq
Arduino experimenters guide hqAndreis Santos
 
HOW WE ADVOCATED FOR INBOUND, UPSOLD ACCOUNTS, AND BUILT A BETTER ORGANIZATIO...
HOW WE ADVOCATED FOR INBOUND, UPSOLD ACCOUNTS, AND BUILT A BETTER ORGANIZATIO...HOW WE ADVOCATED FOR INBOUND, UPSOLD ACCOUNTS, AND BUILT A BETTER ORGANIZATIO...
HOW WE ADVOCATED FOR INBOUND, UPSOLD ACCOUNTS, AND BUILT A BETTER ORGANIZATIO...HubSpot
 

Viewers also liked (9)

잡코리아 글로벌 프런티어 2기_지구인 이단 옆차기_탐방 보고서
잡코리아 글로벌 프런티어 2기_지구인 이단 옆차기_탐방 보고서잡코리아 글로벌 프런티어 2기_지구인 이단 옆차기_탐방 보고서
잡코리아 글로벌 프런티어 2기_지구인 이단 옆차기_탐방 보고서
 
‘Over the Horizon’ sharemarket commentary – October 2013
‘Over the Horizon’ sharemarket commentary – October 2013‘Over the Horizon’ sharemarket commentary – October 2013
‘Over the Horizon’ sharemarket commentary – October 2013
 
Hh News Bytes 0407
Hh News Bytes 0407Hh News Bytes 0407
Hh News Bytes 0407
 
50120140501013
5012014050101350120140501013
50120140501013
 
20320140502001
2032014050200120320140502001
20320140502001
 
20320140502002
2032014050200220320140502002
20320140502002
 
Rules of Fasting
Rules of FastingRules of Fasting
Rules of Fasting
 
Arduino experimenters guide hq
Arduino experimenters guide hqArduino experimenters guide hq
Arduino experimenters guide hq
 
HOW WE ADVOCATED FOR INBOUND, UPSOLD ACCOUNTS, AND BUILT A BETTER ORGANIZATIO...
HOW WE ADVOCATED FOR INBOUND, UPSOLD ACCOUNTS, AND BUILT A BETTER ORGANIZATIO...HOW WE ADVOCATED FOR INBOUND, UPSOLD ACCOUNTS, AND BUILT A BETTER ORGANIZATIO...
HOW WE ADVOCATED FOR INBOUND, UPSOLD ACCOUNTS, AND BUILT A BETTER ORGANIZATIO...
 

Similar to 50120140502001 2

PASSWORD BASED SCHEME AND GROUP TESTING FOR DEFENDING DDOS ATTACKS
PASSWORD BASED SCHEME AND GROUP TESTING FOR DEFENDING DDOS ATTACKSPASSWORD BASED SCHEME AND GROUP TESTING FOR DEFENDING DDOS ATTACKS
PASSWORD BASED SCHEME AND GROUP TESTING FOR DEFENDING DDOS ATTACKSIJNSA Journal
 
PREVENTING DISTRIBUTED DENIAL OF SERVICE ATTACKS IN CLOUD ENVIRONMENTS
PREVENTING DISTRIBUTED DENIAL OF SERVICE ATTACKS IN CLOUD ENVIRONMENTS PREVENTING DISTRIBUTED DENIAL OF SERVICE ATTACKS IN CLOUD ENVIRONMENTS
PREVENTING DISTRIBUTED DENIAL OF SERVICE ATTACKS IN CLOUD ENVIRONMENTS IJITCA Journal
 
International Journal of Computational Science and Information Technology (I...
 International Journal of Computational Science and Information Technology (I... International Journal of Computational Science and Information Technology (I...
International Journal of Computational Science and Information Technology (I...ijcsity
 
Study of flooding based ddos attacks and their effect using deter testbed
Study of flooding based ddos attacks and their effect using deter testbedStudy of flooding based ddos attacks and their effect using deter testbed
Study of flooding based ddos attacks and their effect using deter testbedeSAT Journals
 
3-JournalofCommunicationsVol.14No.2February2019.pdf
3-JournalofCommunicationsVol.14No.2February2019.pdf3-JournalofCommunicationsVol.14No.2February2019.pdf
3-JournalofCommunicationsVol.14No.2February2019.pdfPrasannaKumarpanda2
 
XDOSER, A BENCHMARKING TOOL FOR SYSTEM LOAD MEASUREMENT USING DENIAL OF SERVI...
XDOSER, A BENCHMARKING TOOL FOR SYSTEM LOAD MEASUREMENT USING DENIAL OF SERVI...XDOSER, A BENCHMARKING TOOL FOR SYSTEM LOAD MEASUREMENT USING DENIAL OF SERVI...
XDOSER, A BENCHMARKING TOOL FOR SYSTEM LOAD MEASUREMENT USING DENIAL OF SERVI...IJNSA Journal
 
XDOSER, A BENCHMARKING TOOL FOR SYSTEM LOAD MEASUREMENT USING DENIAL OF SERVI...
XDOSER, A BENCHMARKING TOOL FOR SYSTEM LOAD MEASUREMENT USING DENIAL OF SERVI...XDOSER, A BENCHMARKING TOOL FOR SYSTEM LOAD MEASUREMENT USING DENIAL OF SERVI...
XDOSER, A BENCHMARKING TOOL FOR SYSTEM LOAD MEASUREMENT USING DENIAL OF SERVI...IJNSA Journal
 
IRJET- EEDE- Extenuating EDOS for DDOS and Eluding HTTP Web based Attacks in ...
IRJET- EEDE- Extenuating EDOS for DDOS and Eluding HTTP Web based Attacks in ...IRJET- EEDE- Extenuating EDOS for DDOS and Eluding HTTP Web based Attacks in ...
IRJET- EEDE- Extenuating EDOS for DDOS and Eluding HTTP Web based Attacks in ...IRJET Journal
 
Do s and d dos attacks at osi layers
Do s and d dos attacks at osi layersDo s and d dos attacks at osi layers
Do s and d dos attacks at osi layersHadeel Sadiq Obaid
 
A study on securing cloud environment from d do s attack to preserve data ava...
A study on securing cloud environment from d do s attack to preserve data ava...A study on securing cloud environment from d do s attack to preserve data ava...
A study on securing cloud environment from d do s attack to preserve data ava...Manimaran A
 
DDOS Attacks-A Stealthy Way of Implementation and Detection
DDOS Attacks-A Stealthy Way of Implementation and DetectionDDOS Attacks-A Stealthy Way of Implementation and Detection
DDOS Attacks-A Stealthy Way of Implementation and DetectionIJRES Journal
 
A SYNCHRONIZED DISTRIBUTED DENIAL OF SERVICE PREVENTION SYSTEM
A SYNCHRONIZED DISTRIBUTED DENIAL OF SERVICE PREVENTION SYSTEMA SYNCHRONIZED DISTRIBUTED DENIAL OF SERVICE PREVENTION SYSTEM
A SYNCHRONIZED DISTRIBUTED DENIAL OF SERVICE PREVENTION SYSTEMcscpconf
 
Design & Implementation of Secure AODV In Multicast Routing To Detect DDOS At...
Design & Implementation of Secure AODV In Multicast Routing To Detect DDOS At...Design & Implementation of Secure AODV In Multicast Routing To Detect DDOS At...
Design & Implementation of Secure AODV In Multicast Routing To Detect DDOS At...IJNSA Journal
 
Protecting your business from ddos attacks
Protecting your business from ddos attacksProtecting your business from ddos attacks
Protecting your business from ddos attacksSaptha Wanniarachchi
 
Augmented split –protocol; an ultimate d do s defender
Augmented split –protocol; an ultimate d do s defenderAugmented split –protocol; an ultimate d do s defender
Augmented split –protocol; an ultimate d do s defenderijcsa
 
Pattern Analysis and Signature Extraction for Intrusion Attacks on Web Services
Pattern Analysis and Signature Extraction for Intrusion Attacks on Web ServicesPattern Analysis and Signature Extraction for Intrusion Attacks on Web Services
Pattern Analysis and Signature Extraction for Intrusion Attacks on Web ServicesIJNSA Journal
 
Distributed Denial Of Service ( Ddos )
Distributed Denial Of Service ( Ddos )Distributed Denial Of Service ( Ddos )
Distributed Denial Of Service ( Ddos )Sharon Lee
 
NETWORK INTRUSION DETECTION AND COUNTERMEASURE SELECTION IN VIRTUAL NETWORK (...
NETWORK INTRUSION DETECTION AND COUNTERMEASURE SELECTION IN VIRTUAL NETWORK (...NETWORK INTRUSION DETECTION AND COUNTERMEASURE SELECTION IN VIRTUAL NETWORK (...
NETWORK INTRUSION DETECTION AND COUNTERMEASURE SELECTION IN VIRTUAL NETWORK (...ijsptm
 
Network Intrusion Detection And Countermeasure Selection In Virtual Network (...
Network Intrusion Detection And Countermeasure Selection In Virtual Network (...Network Intrusion Detection And Countermeasure Selection In Virtual Network (...
Network Intrusion Detection And Countermeasure Selection In Virtual Network (...ClaraZara1
 

Similar to 50120140502001 2 (19)

PASSWORD BASED SCHEME AND GROUP TESTING FOR DEFENDING DDOS ATTACKS
PASSWORD BASED SCHEME AND GROUP TESTING FOR DEFENDING DDOS ATTACKSPASSWORD BASED SCHEME AND GROUP TESTING FOR DEFENDING DDOS ATTACKS
PASSWORD BASED SCHEME AND GROUP TESTING FOR DEFENDING DDOS ATTACKS
 
PREVENTING DISTRIBUTED DENIAL OF SERVICE ATTACKS IN CLOUD ENVIRONMENTS
PREVENTING DISTRIBUTED DENIAL OF SERVICE ATTACKS IN CLOUD ENVIRONMENTS PREVENTING DISTRIBUTED DENIAL OF SERVICE ATTACKS IN CLOUD ENVIRONMENTS
PREVENTING DISTRIBUTED DENIAL OF SERVICE ATTACKS IN CLOUD ENVIRONMENTS
 
International Journal of Computational Science and Information Technology (I...
 International Journal of Computational Science and Information Technology (I... International Journal of Computational Science and Information Technology (I...
International Journal of Computational Science and Information Technology (I...
 
Study of flooding based ddos attacks and their effect using deter testbed
Study of flooding based ddos attacks and their effect using deter testbedStudy of flooding based ddos attacks and their effect using deter testbed
Study of flooding based ddos attacks and their effect using deter testbed
 
3-JournalofCommunicationsVol.14No.2February2019.pdf
3-JournalofCommunicationsVol.14No.2February2019.pdf3-JournalofCommunicationsVol.14No.2February2019.pdf
3-JournalofCommunicationsVol.14No.2February2019.pdf
 
XDOSER, A BENCHMARKING TOOL FOR SYSTEM LOAD MEASUREMENT USING DENIAL OF SERVI...
XDOSER, A BENCHMARKING TOOL FOR SYSTEM LOAD MEASUREMENT USING DENIAL OF SERVI...XDOSER, A BENCHMARKING TOOL FOR SYSTEM LOAD MEASUREMENT USING DENIAL OF SERVI...
XDOSER, A BENCHMARKING TOOL FOR SYSTEM LOAD MEASUREMENT USING DENIAL OF SERVI...
 
XDOSER, A BENCHMARKING TOOL FOR SYSTEM LOAD MEASUREMENT USING DENIAL OF SERVI...
XDOSER, A BENCHMARKING TOOL FOR SYSTEM LOAD MEASUREMENT USING DENIAL OF SERVI...XDOSER, A BENCHMARKING TOOL FOR SYSTEM LOAD MEASUREMENT USING DENIAL OF SERVI...
XDOSER, A BENCHMARKING TOOL FOR SYSTEM LOAD MEASUREMENT USING DENIAL OF SERVI...
 
IRJET- EEDE- Extenuating EDOS for DDOS and Eluding HTTP Web based Attacks in ...
IRJET- EEDE- Extenuating EDOS for DDOS and Eluding HTTP Web based Attacks in ...IRJET- EEDE- Extenuating EDOS for DDOS and Eluding HTTP Web based Attacks in ...
IRJET- EEDE- Extenuating EDOS for DDOS and Eluding HTTP Web based Attacks in ...
 
Do s and d dos attacks at osi layers
Do s and d dos attacks at osi layersDo s and d dos attacks at osi layers
Do s and d dos attacks at osi layers
 
A study on securing cloud environment from d do s attack to preserve data ava...
A study on securing cloud environment from d do s attack to preserve data ava...A study on securing cloud environment from d do s attack to preserve data ava...
A study on securing cloud environment from d do s attack to preserve data ava...
 
DDOS Attacks-A Stealthy Way of Implementation and Detection
DDOS Attacks-A Stealthy Way of Implementation and DetectionDDOS Attacks-A Stealthy Way of Implementation and Detection
DDOS Attacks-A Stealthy Way of Implementation and Detection
 
A SYNCHRONIZED DISTRIBUTED DENIAL OF SERVICE PREVENTION SYSTEM
A SYNCHRONIZED DISTRIBUTED DENIAL OF SERVICE PREVENTION SYSTEMA SYNCHRONIZED DISTRIBUTED DENIAL OF SERVICE PREVENTION SYSTEM
A SYNCHRONIZED DISTRIBUTED DENIAL OF SERVICE PREVENTION SYSTEM
 
Design & Implementation of Secure AODV In Multicast Routing To Detect DDOS At...
Design & Implementation of Secure AODV In Multicast Routing To Detect DDOS At...Design & Implementation of Secure AODV In Multicast Routing To Detect DDOS At...
Design & Implementation of Secure AODV In Multicast Routing To Detect DDOS At...
 
Protecting your business from ddos attacks
Protecting your business from ddos attacksProtecting your business from ddos attacks
Protecting your business from ddos attacks
 
Augmented split –protocol; an ultimate d do s defender
Augmented split –protocol; an ultimate d do s defenderAugmented split –protocol; an ultimate d do s defender
Augmented split –protocol; an ultimate d do s defender
 
Pattern Analysis and Signature Extraction for Intrusion Attacks on Web Services
Pattern Analysis and Signature Extraction for Intrusion Attacks on Web ServicesPattern Analysis and Signature Extraction for Intrusion Attacks on Web Services
Pattern Analysis and Signature Extraction for Intrusion Attacks on Web Services
 
Distributed Denial Of Service ( Ddos )
Distributed Denial Of Service ( Ddos )Distributed Denial Of Service ( Ddos )
Distributed Denial Of Service ( Ddos )
 
NETWORK INTRUSION DETECTION AND COUNTERMEASURE SELECTION IN VIRTUAL NETWORK (...
NETWORK INTRUSION DETECTION AND COUNTERMEASURE SELECTION IN VIRTUAL NETWORK (...NETWORK INTRUSION DETECTION AND COUNTERMEASURE SELECTION IN VIRTUAL NETWORK (...
NETWORK INTRUSION DETECTION AND COUNTERMEASURE SELECTION IN VIRTUAL NETWORK (...
 
Network Intrusion Detection And Countermeasure Selection In Virtual Network (...
Network Intrusion Detection And Countermeasure Selection In Virtual Network (...Network Intrusion Detection And Countermeasure Selection In Virtual Network (...
Network Intrusion Detection And Countermeasure Selection In Virtual Network (...
 

More from IAEME Publication

IAEME_Publication_Call_for_Paper_September_2022.pdf
IAEME_Publication_Call_for_Paper_September_2022.pdfIAEME_Publication_Call_for_Paper_September_2022.pdf
IAEME_Publication_Call_for_Paper_September_2022.pdfIAEME Publication
 
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...IAEME Publication
 
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURSA STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURSIAEME Publication
 
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURSBROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURSIAEME Publication
 
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONSDETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONSIAEME Publication
 
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONSANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONSIAEME Publication
 
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINOVOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINOIAEME Publication
 
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...IAEME Publication
 
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMYVISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMYIAEME Publication
 
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...IAEME Publication
 
GANDHI ON NON-VIOLENT POLICE
GANDHI ON NON-VIOLENT POLICEGANDHI ON NON-VIOLENT POLICE
GANDHI ON NON-VIOLENT POLICEIAEME Publication
 
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...IAEME Publication
 
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...IAEME Publication
 
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...IAEME Publication
 
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...IAEME Publication
 
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...IAEME Publication
 
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...IAEME Publication
 
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...IAEME Publication
 
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...IAEME Publication
 
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENTA MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENTIAEME Publication
 

More from IAEME Publication (20)

IAEME_Publication_Call_for_Paper_September_2022.pdf
IAEME_Publication_Call_for_Paper_September_2022.pdfIAEME_Publication_Call_for_Paper_September_2022.pdf
IAEME_Publication_Call_for_Paper_September_2022.pdf
 
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
 
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURSA STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
 
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURSBROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
 
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONSDETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
 
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONSANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
 
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINOVOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
 
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
 
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMYVISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
 
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
 
GANDHI ON NON-VIOLENT POLICE
GANDHI ON NON-VIOLENT POLICEGANDHI ON NON-VIOLENT POLICE
GANDHI ON NON-VIOLENT POLICE
 
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
 
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
 
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
 
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
 
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
 
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
 
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
 
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
 
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENTA MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
 

Recently uploaded

08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdflior mazor
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 

Recently uploaded (20)

08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 

50120140502001 2

  • 1. International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-6367(Print), INTERNATIONAL JOURNAL OF COMPUTER ENGINEERING & ISSN 0976 - 6375(Online), Volume 5, Issue 2, February (2014), pp. 01-08 © IAEME TECHNOLOGY (IJCET) IJCET ISSN 0976 – 6367(Print) ISSN 0976 – 6375(Online) Volume 5, Issue 2, February (2014), pp. 01-08 © IAEME: www.iaeme.com/ijcet.asp Journal Impact Factor (2014): 4.4012 (Calculated by GISI) www.jifactor.com ©IAEME SURVEY OF ABSTRACT METHODS FOR HOW TO SAFEGUARD AGAINST DISTRIBUTED DENIAL OF SERVICE ATTACKS Tiruveedula GopiKrishna1, DavuluriNageswara Rao2, Mohamed A.Abdelhadi3 1 Research Scholar, Computer Department, Faculty of Arts & Science, Al-Jufra, Sirt University, Hoon, Al-Jufra,Libya. 2 Lecturer, Computer Department, Faculty Science, Sirt University, Sirt, Libya. 3 Lecturer, Department of Computer Science, Faculty of Arts & Science, Hoon, Aljufra, Sirt University, Libya. ABSTRACT In this article, we have tried to demonstrate that any business, large or small, that is dependent on Internet traffic to generate sales, service its customers, or maintain confidentiality is a candidate forstepped up protection against Denial of Service and Distributed Denial ofService attacks for their networksystems. No business or industry should consider itself completelysafe from such attacks, as a failure to maintain defensive measurescan result in severe financial and reputational consequences. Andwe discussed some existing ways you can help safeguard your internetworking environment or a company. We also describe existing methods and techniques used in denial of service attacks, and we listpossible defenses. Keywords: DDoS, Strategies, Prevention, Detection, Tools, Attacks. I. INTRODUCTION A DDOS attack (better known as a Distributed Denial of Service attack) is a type of web attack that seeks to disrupt the normal function of the targeted computer network. This is any type of attack that attempts to make this computer resource unavailable to its users. While this type of attack typically follows the same sorts of patterns, the definition of the term Distributed Denial of Service does not make any specific indications of how this type of attack is to be pulled off. What makes this type of attack "distributed" is the concerted efforts between a large number of disruptors all for the common goal of preventing web servers (and therefore websites) from functioning effectively at all. These users may be willing participants, or in some cases be tricked into downloading software that 1
  • 2. International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-6367(Print), ISSN 0976 - 6375(Online), Volume 5, Issue 2, February (2014), pp. 01-08 © IAEME will use their terminal to aid in the offensive. All in all, regardless of the means, a DDOS attack is simply a combined effort to prevent computer systems from working as well as they should, typically from a remote location over the internet [1, 2, and 3]. The most common method of attack is to send a mass saturation of incessant requests for external communication to the target. These systems are flooded with requests for information from non-users, and often non-visitors to the website. The goal of this attack is to create a large enough presence of false traffic such that legitimate web traffic intended for actual web users is slowed down and delayed. If this type of service becomestoo slow, time sensitive information such as live video footage may be rendered entirely useless to legitimate end users [1]. For a DDOS to work effectively, the process has to be heavily automated on the attacker's end. Customized software is designed to flood these services with false traffic, and is run on as many computers as possible. There are a few instances in which this type of software was set up like a virus, infecting computers and taking control of their communication functions. These users unwillingly are aiding in a DDOS attack, sometimes without being the slightest bit aware of it. If there seems to be large delays in normal internet service, there may be outbound requests being made consuming your internet connections given throughput, and can sometimes be an indication of foul play. Users seeking to limit this risk should keep anti-virus software up to date, and scan frequently for these types of programs [2]. While there are few court cases on the books of Distributed Denial of Service perpetrators being held accountable for their actions, as well as the potential lost income for commercial websites, this type of activity almost always violates the terms of service and acceptable use policies of internet service providers, as well as often violating individual communication law within the nation. These types of attacks have become more and more prevalent as time goes on, and in many nation legislation is in the works, with hopes of criminal penalties for those involved with this sort of attack. All in all, a DDOS attack is a very real threat to businesses and organizations across the world, and it's important that they be prepared in case some group of people decides to cause trouble for your organization. Being prepared to identify these types of threats is an important part of proper internet use, and should be a part of your daily life online. II. CATEGORIES DOS ATTACKS 2.1 Operating system attacks--Defined as attacks directed against a certain facet of the computer's operating system. The objective of these attacks is to cause the system to freeze or completely restart. As operating system attacks are very explicit in nature, applying software updates or patches that are released by software manufacturers or independent developers can easily prevent them [4]. 2.2 Networking attacks--The more common type of DoS attack, which attempts to take advantage of built-in aspects of the networking functions of a system. Though various methods are used in these attacks, the most common type is that which directs so much data at the network interfaces of a system, that it closes down completely, or resets the network interface being targeted. It was a variation of this type of attack that caused the attacks earlier this year [4]. III. TYPES OF DDOS ATTACKS 3.1 Application-layer DDOS attack Application layer DDOS attack: Application-layer DDOS attacks are attacks that target Windows, Apache, OpenBSD, or other software vulnerabilities to perform the attack and crash the server [6]. 2
  • 3. International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-6367(Print), ISSN 0976 - 6375(Online), Volume 5, Issue 2, February (2014), pp. 01-08 © IAEME 3.2 Protocol DOS attack Protocol DDOS attack: A protocol DDOS attacks is a DOS attack on the protocol level. This category includes Synflood, Ping of Death, and more [6]. 3.3 Volume-based DDOS attack Volume-based DDOS attack: This type of attack includes ICMP floods, UDP floods, and other kind of floods performed via spoofed packets. 3.4 Reflected Attack A reflected attack is where an attacker creates forged packets that will be sent out to as many computers as possible. When these computers receive the packets they will reply, but the reply will be a spoofed address that actually routes to the target. All of the computers will attempt to communicate at once and this will cause the site to be bogged down with requests until the server resources are exhausted[6]. 3.5 Peer-to-Peer Attacks Peer-to-Peer servers present an opportunity for attackers. What happens is instead of using a botnet to siphon traffic towards the target, a peer-to-peer server is exploited to route traffic to the target website. When done successfully, people using the file-sharing hub are instead sent to the target website until the website is overwhelmed and sent offline[6]. 3.6 Nuke Corrupt and fragmented packets are sent via a modified ping utility to keep the malicious packets to be delivered to the target. Eventually, the target machine goes offline. This attack focuses on comprising computer networks and is an old distributed denial of service attack [6]. 3.7 Slowloris Slowloris is a tool that allows an attacker to use fewer resources during an attack. During the attack connections to the target machine will be opened with partial requests and allowed to stay open for the maximum time possible. It will also send HTTP headers at certain intervals. This adds to the requests, but never completes them – keeping more connections open longer until the target website is no longer able to stay online[8]. 3.8 Degradation of Service Attacks The purpose of this attack is to slow server response times. A DDoS attack seeks to take a website or server offline. That is not the case in a degradation of service attack. The goal here is to slow response time to a level that essentially makes the website unusable for most people. Zombie computers are leveraged to flood a target machine with malicious traffic that will cause performance and page-loading issues. These types of attacks can be difficult to detect because the goal is not to take the website offline, but to degrade performance. They are often confused with simply an increase in website traffic [8]. 3.9 Unintentional DDoS Unintended distributed denial of service happens when a spike in web traffic causes a server to not be able to handle all of the incoming requests. The more traffic that occurs, the more resources are used. This causes pages to timeout when loading and eventually the server will fail to respond and go offline [6]. 3
  • 4. International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-6367(Print), ISSN 0976 - 6375(Online), Volume 5, Issue 2, February (2014), pp. 01-08 © IAEME 3.10 Application Level Attacks Application level attacks target areas that have more vulnerabilities. Rather than attempt to overwhelm the entire server, an attacker will focus their attack on one – or a few – applications. Web-based email apps, WordPress, Joomla, and forum software are good examples of application specific targets [6]. 3.11 Multi-Vector Attacks Multi-vector attacks are the most complex forms of distributed denial of service (DDoS) attack. Instead of utilizing a single method, a combination of tools and strategies are used to overwhelm the target and take it offline. Often times, multi-vector attacks will target specific applications on the target server, as well as, flood the target with a large volume of malicious traffic. These types of DDoS attacks are the most difficult to mitigate because the attack come in different forms and target different resources simultaneously [6]. IV.TRADITIONALMETHODS It used to be that a denial of service was the simplest type of attack out there. Someone would start the ping command on their computer, aim it at their target address, and let it run full speed, trying to literally flood the other side with Echo Requests, or ping packets. Of course, this quickly changed, because in this case, the attacker would need a connection with more bandwidth than the target site. First, they moved on to larger hosts, like compromising a server at a university or research center -- somewhere with a lot of bandwidth -- and sent their attacks from there. But now, botnets are used in almost all cases, because it's simpler for them, and is less apparent, making the attack completely distributed. In fact, malware authors have made a big business of running a botnet. They actually rent their compromised zombie computers, by the hour. If someone wants to bring down a website, all they have to do is pay the botnet owner a certain amount of money, and those thousands of compromised systems are aimed at the target. While a single computer would have no chance of bringing a site down, if 10,000 computers or more all send a request at once, it would bring down any unprotected server [9]. The type of attack evolved as well. ICMP, what's used by the ping command, is easily blocked. Now, there are various ways that a DDoS attack can be done. First there's what's called a Syn attack, which simply means that the attacker opens a TCP connection, the way you would normally connect to a website, but never finishes the initial handshake. It basically leaves the server hanging. Another clever way is to use DNS. There are a lot of network providers who have their DNS servers configured to allow anyone to launch queries, even people that aren't customers of theirs. Also, because DNS uses UDP, which is a stateless protocol, these two facts make this a potent way to create a denial of service. All the attacker has to do is find open DNS resolvers, craft a fake UDP packet that has a spoofed address, the one of the target site, and send it to the DNS server. While the request comes from the attacker and his botnet, the server thinks that request came from the server instead, and will send the reply to that location. So instead of having the actual botnet conduct the attack, the only thing the target site will see is a bunch of DNS replies coming from many open resolvers, all around the Internet. Also, it's a very scalable type of attack, because you can send a single UDP packet to a DNS server asking for a full dump of a certain domain, and receive a very large reply [9]. Here, we describe the distributed denial of service methods employed by an attacker. These techniques help an attacker coordinate and execute the attack. These types of attacks plagued the Internet in February 2000. However, these distributed attack techniques still rely on the previously described attack methods to carry out the attacks. The techniques are listed in chronological order. It can be observed that as time has passed, the distributed techniques (Trinoo, TFN, Stacheldraht, 4
  • 5. International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-6367(Print), ISSN 0976 - 6375(Online), Volume 5, Issue 2, February (2014), pp. 01-08 © IAEME Shaft, and TFN2K) have become technically more advanced and, hence, more difficult to detect. Trinoo uses TCP to communicate between the attacker and the control master program. The master program communicates with the attack daemons using UDP packets. (a) Trinoo’s attack daemons implement UDP Flood attacks against the target victim [10]. Tribe Flood Network (TFN) uses a command line interface to communicate between the attacker and the control master program. Communication between the control master and attack daemons is done via ICMP echo reply packets. TFN’s attack daemons implement Smurf, SYN Flood, UDP Flood, and ICMP Flood attacks [10]. (b) Stacheldraht (German term for “barbed wire”) is based on the TFN attack. However, unlike TFN, Stacheldraht uses an encrypted TCP connection for communication between the attacker and master control program. Communication between the master control program and attack daemons is conducted using TCP and ICMP, and involves an automatic update technique for the attack daemons. The attack daemons for Stacheldraht implement Smurf, SYN Flood, UDPFlood, and ICMP Flood attacks [10]. (c) Shaft is modeled after Trinoo. Communication between the control master program and attack daemons is achieved using UDP packets. The control master program and the attacker communicate via a simple TCP telnet connection. A distinctive feature of Shaft is the ability to switch control master servers and ports in real time, hence making detection by intrusion detection tools difficult [11]. (d) TFN2K uses TCP, UDP, ICMP, or all three to communicate between the control master program and the attack daemons. Communication between the real attacker and control master is encrypted using a key-based CAST-256 algorithm [1]. In addition, TFN2K conducts covert exercises to hide itself from intrusion detection systems. TFN2K attack daemons implement Smurf, SYN, UDP, and ICMP Flood attacks [2]. V. HOWTO PROTECT YOUR NETWORK So as you can see, a DDoS can take multiple forms, and when building a defense against them, it's important to consider these variants. The easiest, although a costly way to defend yourself, is to buy more bandwidth. A denial of service is a game of capacity. If you have 10,000 systems sending 1 Mbps your way that means you're getting 10 Gb of data hitting your server every second. That's a lot of traffic. In this case, the same rules apply as for normal redundancy. You want more servers, spread around various datacenters, and you want to use good load balancing. Having that traffic spread out to multiple servers will help the load, and hopefully your pipes will be large enough to handle all that traffic. But modern DDoS attacks are getting insanely large, and quite often can be much bigger than what your finances will allow in terms of bandwidth. Plus, sometimes it's not your website that will be targeted, a fact that many administrators tend to forget[9]. One of the most critical pieces of your network is your DNS server. It's a bad idea to leave it as an open resolver, and it should be locked down in order to save you from being used as part of an attack. But in a similar way, what if those servers came under attack? Even if your website is up, if no one can connect to your DNS servers and resolve your domain name, that's just as bad. Most domain registrations are done with two DNS servers, but quite often that may not be enough. Make sure your DNS is protected behind the same type of load balancing that your web and other resources are. There are also companies out there that provide redundant DNS that you can use. For example, many people use content delivery networks to serve files to customers in a distributed way, which is 5
  • 6. International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-6367(Print), ISSN 0976 - 6375(Online), Volume 5, Issue 2, February (2014), pp. 01-08 © IAEME a great way to also protect them against DDoS attacks, but many of those companies also offer enhanced DNS protection as well, which is something you may want to look at.For example, it's quite obvious that your website is never going to be asking random DNS servers for queries, so there's no reason to allow UDP port 53 packets heading for your servers. Block everything you can at your network border, where you have the largest pipe, or better yet, get your upstream provider to block them for you. Many Internet providers offer this type of service to businesses, where you can be in touch with their network operating centers and make sure they block any unwanted traffic, and also help you out in the event that you're getting attacked. In a similar way, there are manyways to protect your network from Syn attacks, by increasing your TCP backlog, reducing the Syn-Received timer, or using Syn caches.[9] Finally, you should also think about ways to mitigate any attack that does reach your site. For example, most modern websites use a lot of dynamic resources. While the actual bandwidth from an attack may be manageable, often what ends up failing is the database, or the custom scripts you may be running. Think about using caching servers to provide as much static content as possible. Have a plan in place to quickly replace dynamic resources with static ones, in the event that you're getting attacked. And make sure to have detection systems in place. The worst thing for any business is for the network or site to go down, so you want to be alerted as soon as an attack starts, and be ready to deal with it. Because of the way it's done, halting a DDoS attack at the source is incredibly difficult. But setting up an infrastructure that is distributed, hardened, and secure is possible, and that's something you should think about when setting up your network.Distributed denial of service (DDoS) attacks is a growing concern with far-reaching effects for businesses and organizations of all sizes. DDoS attacks are used by criminal enterprises, politically-motivated cyber terrorists, and hackers hoping to bring websites down for fun or profit.Now, more than ever, it is crucial for organizations and online retailers to measure their risk of attack and create a DDoS attack protection plan in advance in order to mitigate risk and enable a fast recovery[10,11]. Many observers have stated that there are currently no successful defenses against a fully distributed denial of service attack. This may be true. Nevertheless, there are numerous safety measures that a host or network can perform to make the network and neighboring networks more secure. These measures include: (1) Filtering Routers: Filtering all packets entering and leaving the network protects the network from attacks conducted from neighboring networks, and prevents the network itself from being an unaware attacker [12]. This measure requires installing ingress and egress packet filters on all routers. (2) Disabling IP Broadcasts: By disabling IP broadcasts, hostcomputers can no longer be used as amplifiers in ICMPFlood and Smurf attacks. However, to defend against thisattack, all neighboring networks need to disable IP broadcasts. (3) Applying Security Patches: To guard against denial ofservice attacks, host computers must be updated with thelatest security patches and techniques. For example, in thecase of the SYN Flood attack [8], there are three steps thatthe host computers can take to guard themselves fromattacks: increase the size of the connection queue, decreasethe time-out waiting for the three-way handshake, andemploy vendor software patches to detect and circumvent the problem. (4) Disabling Unused Services: If UDP echo or charge services are not required, disabling them will help to defendagainst the attack. In general, if network services areunneeded or unused, the services should be disabled toprevent tampering and attacks. 6
  • 7. International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-6367(Print), ISSN 0976 - 6375(Online), Volume 5, Issue 2, February (2014), pp. 01-08 © IAEME (5) Performing Intrusion Detection: By performing intrusiondetection, a host computer and network are guarded againstbeing a source for an attack, as while as being a victim of anattack. Network monitoring is a very good pre-emptive wayof guarding against denial of service attacks. By monitoringtraffic patterns, a network can determine when it is underattack, and can take the required steps to defend itself. Byinspecting host systems, a host can also prevent it fromhosting an attack on another network [13]. VI. CONCLUSION In this paper, we discussed distributed denial of serviceattacks on the Internet. We described how distributedattacks are conducted; we reviewed somedistributed denial of service techniques, and discussvarious defense mechanisms that could be employed bynetworks and hosts.So, every company should take care of it and set up good level of protection to defendDDOS attack.Further work is though needed that combines well knownsecurity drawbacks of wireless protocols with defensetechniques that are already mature in a wireless environment. VII. ACKNOWLEDGEMENTS We would like to thank to all our faculty members who contributed their valuable information to prepare this paper. VIII. REFERENCES [1] C. Adams and J. Gilchrist, “RFC 2612: The CAST-256encryption algorithm,” June 1999, http://www.cis.ohiostateedu/htbin/rfc/rfc2612.html. [2] J. Barlow and W. Thrower, “TFN2K – an analysis,”Feb. 2000, http://packetstorm.securify.com/distributed/TFN2k_Analysis.htm. [3] S. Bellovin, “Security problems in the TCP/IP protocol suite,” Comput. Commun. Rev., vol.19, no. 2, pp. 32-48, Apr. 1989. [4] S. Bellovin, “Distributed denial of service attacks,” Feb. 2000, http://www.research.att.com/~smb/talks. [5] S. Bellovin, Ed., “The ICMP traceback message,” NetworkWorking Group Internet Draft, Mar. 2000, http://www.research.att.com/~smb/papers/draft-bellovin-itrace-00.txt. [6] CERT® Coordination Center, Cert Advisories: “CA-2000-01denial-of-service developments,” http://www.cert.org/advisories/CA-2000-01.html; “CA-99-17 denial-ofservice tools, http://www.cert.org/advisories/CA-99-17-denial-of-servicetools.html; “CA-9813-tcp-denial-of-service: vulnerability in certain TCP/IP implementations. http://www.cert.org/advisories/CA-98-13-tcp-denial-of-service.html. [7] CERT® Coordination Center, “Results of the distributedsystems intruder tools workshop,” Nov. 1999,http://www.cert.org/reports/dsit_workshop.pdf. [8] Cisco Systems, Inc., “Defining strategies to protect against TCP SYN denial of service attacks,” July 1999, Http://www.cisco.com/warp/public/707/4.html. [9] Daemon9, Infinity, and Route, “IP-spoofing demystified:trust-relationship exploitation,” Phrack Mag., June 1996,http://www.fc.net/phrack/files/p48/p48-14.html. [10] D. Dittrich, “The DoS project's ‘Trinoo’ distributed denial ofservice attack tool,” Oct. 1999; “The ‘Stacheldraht’ distributeddenial of service attack tool,” Dec. 1999; “The ‘Tribe FloodNetwork’ distributed denial of service attack tool,” Oct. 1999, http://www.washington.edu/People/dad. 7
  • 8. International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-6367(Print), ISSN 0976 - 6375(Online), Volume 5, Issue 2, February (2014), pp. 01-08 © IAEME [11] D. Dittrich, S. Dietrich, and N. Long, “An analysis of the‘Shaft’ distributed denial of device tool,” Mar. 2000,http://netsec.gsfc.nasa.gov/~spock/shaft_analysis.txt. [12] P. Ferguson and D. Senie, “RFC 2267: Network ingressfiltering: defeating denial of service attacks which employ IPsource address spoofing,” Jan. 1998, http://info.internet.isi.edu/innotes/rfc/files/rfc2267.txt. [13] S. Floyd and V. Jacobson, “Random early detection gateways for congestion avoidance,” IEEE/ACM Trans. Networking, vol. 1no. 4, pp. 397-413, Aug. 1993. [14] T. H. Ptacek and T. N. Newsham, “Insertion, evasion, anddenial of service: eluding network intrusion detection,” SecureNetworks, Inc., Jan. 1998. http://www.clark.net/~roesch/idspaper.html. [15] Er. Abhijeet, Praveen Tripathi, Er.Anuja Priyam and Er.Vivek Kumar, “Implementation of Public Key Cryptography in Kerberos with Prevention of Security Attacks”, International Journal of Computer Engineering & Technology (IJCET), Volume 4, Issue 3, 2013, pp. 248 - 253, ISSN Print: 0976 – 6367, ISSN Online: 0976 – 6375. [16] Prof. S.B. Javheri and Shwetambari Ramesh Patil, “Attacks Classification in Network”, International Journal of Information Technology and Management Information Systems (IJITMIS), Volume 4, Issue 3, 2013, pp. 1 - 11, ISSN Print: 0976 – 6405, ISSN Online: 0976 – 6413. 8