SlideShare a Scribd company logo
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
__________________________________________________________________________________________
Volume: 02 Issue: 10 | Oct-2013, Available @ http://www.ijret.org 434
A VIVACIOUS APPROACH TO DETECT AND PREVENT DDoS ATTACK
Kharat J.S.1
, Radhakrishna Naik2
1
Student ME (CSE), 2
Head, Computer Science and Engineering, MIT (E) Aurangabad, Maharashtra, India,
kharat.jyo@gmail.com, naikradhakrishna@gmail.com
Abstract
A serious problem on the Internet nowadays is Distributed Denial of Service (DDoS) attacks and this is coordinated attack performed
by hackers to immobilize a particular Computer service through manipulation of techniques those are used to provide the Services. In
this attack, normally attackers generate a huge amount of requests to victims through compromised computers. DDoS attacks are a
critical threat to the internet. Packet flooding DDoS attack is a very common way to attack a victim machine by sending large amount
of unwanted traffic. This paper proposes a threshold based approach to detect and prevent the DDoS attack before reaching the
victim end with high detection rate and low false positive rate to achieve high performance. The result obtained from various
experiments on UDP Flood attack and HTTP GET attack show the effectiveness and the efficiency of our approach.
Keywords: Denial of Service (DoS), Distributed Denial of Service (DDoS), Entropy, flooding attack.
---------------------------------------------------------------------***-------------------------------------------------------------------------
1. INTRODUCTION
Internet Operators have been observed that DDoS attacks are
increasing noticeably and individual attacks are more strong
and complicated. Furthermore, the Arbor Worldwide
Infrastructure Security Report highlighted important trends in
distributed denial of service (DDoS) attacks. Several findings
stand out, including the overall expansion of attack surface
and the escalation of attack size and frequency [1].Distributed
denial-of-service (DDoS) attacks consist of an overwhelming
quantity of packets being sent from multiple attack sites to a
victim site. These packets get there in such a high quantity that
some key resource at the victim (bandwidth, buffers, CPU
time to compute responses) is quickly exhausted. The victim
cannot attend its real work due to spending so much time in
handling the attack traffic. Thus legitimate clients are deprived
of the victim’s service for as long as the attack lasts.
The first large-scale appearance of distributed denial-of-
service (DDoS) attacks occurred in mid-1999 and still
researchers are struggling to devise an effective solution to the
DDoS problem. There are many commercial and research
defenses has been appeared, but none of them provide
complete security from the threat. Rather, they detect a small
range of attacks that either use malformed packets or create
severe disturbances in the network; and they handle those
attacks by non-selectively dropping a portion of the traffic
destined for the victim[1]. This strategy relieves the victim
from the high-volume attack, but also inflicts damage to
legitimate traffic that is speciously dropped.
2. OVERVIEW OF DoS AND DDoS ATTACK
2.1 Denial of Service (Dos) Attacks
The DoS attack generally consists of efforts to temporarily or
indefinitely interrupt or suspend services of a host connected
to the internet. The goal of a Denial of Service (DoS) attack is
to interrupt some legitimate activity, such as browsing Web
pages, email functionality or net banking. It could even
shutdown the whole Web server. To obstruct legitimate
operations is to exploit vulnerabilities on the target machine or
application, by sending specially crafted requests targeting the
given vulnerabilities. Denial-of-service effect is achieved by
sending messages to the target machine such that the
“message” hampers with its operation and makes it hang,
crash, reboot, or do useless work. Also some key resources of
the target machine such as bandwidth, CPU time, memory, etc
can be consumed by sending a vast number of packets. One
cannot attend to legitimate clients because the target
application, machine, or network spends all of its critical
resources on handling the attack traffic [2].
2.2 Distributed Denial-Of-Service (DDoS) Attacks
It is simply an extension of DoS attack. DoS and DDoS attack
scenario is shown in Fig-2.Making a machine or network
resources unavailable to its intended user-s is the DDoS
attempt. It generally consist of the efforts of one or more
people to temporarily or indefinitely interrupt or suspend
services of a host connected to the internet. DDoS attacks are
able to take out an entire server in a matter of minutes. To
overwhelm a service to the point where it no longer works is
the goal of any DDoS attack.
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
__________________________________________________________________________________________
Volume: 02 Issue: 10 | Oct-2013, Available @ http://www.ijret.org 435
In a DDoS attack, the incoming traffic flooding the victim
originates from many different sources potentially hundreds of
thousands or more. To saturate a target computer or device
with external communications requests, such that it cannot
respond to other legitimate traffic, or responds so slowly[3] is
the most common method of DDoS attack. In general terms,
DDoS attacks are implemented by either forcing the targeted
computers to reset, or to consume their resources so that they
can no longer provide services, or obstructing the
communication media between communicators so that they
can no longer communicate.
DoS Attack DDoS Attack
Fig-1: DoS and DDoS Attack Scenario
There are many types of DDoS attacks targeting both the
network and the application layers. They could be classified
upon their impact on the targeted computing resources
(saturating bandwidth, consuming server’s resources,
shattering an application) or upon the targeted resources as
well:
• Attacks targeting Network Resources: UDP Floods,
ICMP Floods, IGMP Floods.
• Attacks targeting Server Resources: the TCP/IP
weaknesses –TCP SYN Floods, TCP RST attacks, TCP
PSH+ACK attacks – but also Low and Slow attacks as
Sock stress for example and SSL-based attacks, which
detection is particularly challenging.
• Attacks targeting the Application Resources: HTTP
Floods, DNS Floods and other Low and Slow attacks as
Slow HTTP GET requests (Slowloris) and Slow HTTP
POST requests (R-U-Dead-Yet).
• A DDoS attack usually comprises more than three attack
vectors thus increasing the attacker’s chances to hit its
target and escape basic DoS mitigation solutions[4].
In general there are two types of denial of service attacks:
those that target the network layer and those that target the
application layer. The server cannot simultaneously process
other requests from other legitimate users, if an attacker
overloads the server with many requests. Examples of DDoS
attacks are discussed as follows:
A. UDP Flood Attack
UDP Flood attack is a network layer DDoS attack. UDP is a
connectionless protocol and it does not require any connection
setup procedure to transformation. To consume the bandwidth
is the main purpose of UDP Flood type attack. In this attack,
Attacker send IP packets containing UDP datagrams with the
purpose of slowing down the victim to the point that the
victim can no longer handle valid connections.
B. HTTP GET Flood Attack
HTTP GET flood attack is an Application layer DDoS Attack.
In this, a large amount of legitimate requests(to an
application)use to send by HTTP attacker. The feature of
HTTP GET Flood attack is that it will establish a normal TCP
Connection to Servers, and constantly submit a lot of calling
requests which dramatically consume database resources. For
sample, an Http Flood attack can make hundreds of thousands
of page requests to a web server, which can wear out all of the
servers processing capability. So that the server cannot handle
the legitimate request [5]
An HTTP GET flood is as exactly as it sounds: it’s a massive
influx of legitimate HTTP GET requests that come from large
numbers of users. These requests mimic legitimate users are
nearly impossible for applications and even harder for
traditional security to detect. This result of this attack is
similar to the effect: server errors increasingly degraded the
performance, and resource exhaustion.
3. RELATED WORK
Distributed Denial-of-Service (DDoS) and Denial-of-Service
(DoS) are the most dreadful network threats in recent years.
Different techniques and challenges involved in anomaly
detection system [6].
Yonghua You and Zulkernine[7]introduce two distance-based
DDoS detection techniques: average distance estimation and
distance-based traffic separation. They detect attacks by
analyzing distance values and traffic rates. The distance
information of a packet can be inferred from the Time-to-Live
(TTL) value of the IP header. In the average distance
estimation DDoS detection technique, the prediction of mean
distance value is used to define normality. The prediction of
traffic arrival rates from different distances is used in the
distance-based traffic separation DDoS detection technique.
The mean absolute deviation (MAD)-based deviation model
provides the legal scope to separate the normality from the
abnormality for both the techniques. The results of the
proposed techniques show that the techniques can detect
attacks effectively.
Muhai and MingLi [8] propose a model for detecting DDoS
attacks automatically. In order to reduce the error to identify
attacks, we use discrete wavelet transform (DWT) technique.
Attacking
machine
Target/Victim
Machine
Attack control Mechanism
Zombie Zombie Zombie
Target/Victim
Network
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
__________________________________________________________________________________________
Volume: 02 Issue: 10 | Oct-2013, Available @ http://www.ijret.org 436
Author use actual data to validate proposed model and obtain
good results in terms of tradeoff between correct detections
and false alarms. The test results shows the approach not only
can be different the sudden increasing normal traffic from
anomaly traffic, but also has a well detect ratio.
Sumit Kar and Bibhudatta Sahoo[9]proposed method is based
upon attack detection and recovery, and uses an entropy based
anomaly detection system to detect DDoS attack. Author
design an anomaly detection system based on entropy and
entropy rate to detect DDoS attack. They uses normalized
entropy which calculates the over all probability distribution
in the captured flow in algorithm to get more accurate result.
Detection System is based on by analyzing the change in
entropy of distribution flow header feature and behavioral
features traffic distributions. The Result shows that the attack
must be detected and blocked before reaching the victim with
high detection rate and low false alarm rate.
Suratose Tritilanunt et al. [10] provide a detection mechanism
based on a technique of entropy-based input-output traffic
mode detection scheme. The experimental results demonstrate
that our approach is able to detect several kinds of denial-of-
service attacks, even small spike of such attacks. To minimize
this false positive, we introduce a technique called entropy-
based input-output traffic mode detection scheme. By
combining packet content observation for identifying DoS and
DDoS attacks in the system, this will help approach not only
to increase the accuracy for detecting DoS attacks, but also to
effectively discriminate legitimate users from suspicious
traffic.
Yi Zhang and Qiang Liu[11] present a real-time DDoS attack
detection and prevention system which can be deployed at the
leaf router to monitor and detect DDoS attacks. The
advantages of this system lie in its statelessness and low
computation overhead, which makes the system itself immune
to flooding attacks. A number of articles suggested entropy as
a metrics to summarizing trafficdistribution for anomaly
detection[12][13].
The authors of [9] use entropy rate to discriminate the DDoS
attack from legitimate traffic. The use of entropy for analyze
changes in traffic distribution has two benefit. i) Using
entropy for anomaly detection increases the detection
capability than volume based methods. ii) It provides
additional information to classify among different types
anomaly (worms, DoS attack. Port scanning) .We considers
two classes of distribution i) flow header features (IP address,
ports, and flow sizes) ii) behavioral features (the number of
distinct destination / source address that a host communicates
with) [14]. The anomaly detection system discussed in this
paper is based on by analyzing the change in entropy of above
two traffic distributions.
Our objective in this paper is to design an attack detection
system based on entropy and packet rate to detect DDoS
attack. We use normalized entropy which calculates the over
all probability distribution in the captured flow in our
algorithm to get more accurate result.
4. PROPOSED ENTROPY BASED DETECTION
TECHNIQUE
Shannon’s Entropy [15] based approach is used for DDoS
attack detection. entropy is a measure of the uncertainty in a
random variable or in this case data coming over the
network. The Shannon’s function is a useful tool for
inspecting a similarity and distribution of traffic in the
inspection time frame. When denial-of-service attacks occur in
the observation window, the entropy of that traffic will drop
noticeably and wecan identify that situation as DoS/DDoS
attacks. The value of sample entropy lies in range [0, logn].
The entropy shows its minimum value 0 when all the items (IP
address or port) are same and its maximum value logn when
all the items are different. The entropy of a random variable X
with possible values {x , x … … . . x } can be calculated as
H x = − ∑ P x logP x (1)
In our proposed DDoS detection algorithm we use entropy as
a principal matrix. We use change of entropy of traffic
distributions (IP address, port) for DDoS detection. If we are
interested in measuring the entropy of packets over unique
source or destination address then maximum value of n is 2
for ipv4address [9]. If we want to calculate entropy over
various applications port then n is the maximum number of
ports. Here p x where x ∈ X is the probability that X takes
the value x . Suppose we randomly observe X for a fixed time
window w, thenP x = m m⁄ , where m is the frequency or
number of times we observe X taking the value x i.e. m =
∑ m
H X = − ∑ m /m log m /m (2)
If we want calculate probability of any source MAC address
then,
mi = number of packets with xi as source MAC address and
m = total number of packets
P x =
Number of Packets with x as source
Total number of packets
Here total number of packets is the number of packets seen for
a time window T.
Normalized entropy calculates the over all probability
distribution in the captured flow for the time window T.
Normalized entropy = H log n5⁄ (3)
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
__________________________________________________________________________________________
Volume: 02 Issue: 10 | Oct-2013, Available @ http://www.ijret.org 437
Where n5 is the number of distinct x values in the given time
window.
In a DDoS attack from the captured traffic in time window T,
the attack flow dominates the whole traffic, as a result the
normalized entropy of the traffic decreased in a detectable
manner. But it is also possible in a case of massive legitimate
network accessing. To confirm the attack we have to again
calculate the packet rate P67 of suspected flow. Here flow is
packages which share the same destination address/port. In
this mechanism we have taken one assumption that the
attacker uses same function to generate attack packets at
“zombies”.
P67 x
Total	No. of	packets	coming	from
	same	MAC	address T;
Total	number	of	packets	 T
		 4
The steps in our proposed DDoS detection algorithm are
described below.
Algorithm 1 : DDoS Detection Algorithm
1: Collect sample flows for a time window T on the
edge routers.
2:Calculate router entropy H X ∑ P x log P x
3: Calculate NE H log n5⁄ where, NE = normalized
router entropy.
4: If NE > ?@ABC@DEF δ , identify the suspected attack
flow.
5: Calculate the packet rate P67 x
HI
	 H
of the suspected
flow inthat router
6:If P67 x J threshold δ , it is a DDoS attack.
Else legitimate traffics.
7: Generate alarm and Discard the attack flow.
5. EXPERIMENT AND RESULT
Section 5 provides the experiment and results of our approach
to detect distributed denial-of-service attacks. The system can
detect the attack by using an entropy detection method
because the value drops significantly from the stored profile
once the DoS/DDoS attacks occur in the system. We observe
that most DoS attacks immediately decrease the entropy of the
overall system. A prototype of the proposed system has been
implemented and evaluated on an real base system.
Experimental Setup: Fig-2 shows the experimental setup.
experiment includes 3 source, 1 intermediate routers and 1
destination node. Out of which 3 source nodes 2 nodes are
legitimate users and 1 node is attacker. The bandwidth of
legitimate traffic is set constant.
Fig-2: Experimental setup
The goal of our experiments is to assess the scalability of our
approach and the performance of the protection system.
5.1 UDP Attack:
UDP is a bandwidth depletion attack. Attacker consumes the
network bandwidth with unwanted UDP traffic so that
legitimate user cannot send packets to destination.We traced
no of packets received in every 1 second interval. Performance
metrics used is Network Utilization.
Experiment 1: UDP attack with 2 legitimate user and 1
attacker: Suppose node A3 is the attack source and node A1
and A2 are legitimate users and node D is the victim. All the
three users sending packets to specified destination
Experiment lasts at 6 second. We traced number of packets
received in a fixed time window T.Table-1 shows the traced
data in 6 seconds. The router entropy is calculated according
to Eq. (2), and the normalized router entropy is being
calculated using Eq. (3). Table-2 shows the normalized
entropy calculation for experiments.
Table 1: Traced data
Times in
Second
Number of attack
packets received
Number of
legitimate packets
received
0-1 80 63
1-2 80 65
2-3 699 150
3-4 766 125
4-5 700 100
5-6 615 80
Table-2: Normalized entropy calculations
Time in Second Normalized Router Entropy
0-1 0.98
1-2 0.99
2-3 0.535
3-4 0.45
4-5 0.51
5-6 0.76
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
__________________________________________________________________________________________
Volume: 02 Issue: 10 | Oct-2013, Available @ http://www.ijret.org 438
Captured flow for every source is shown in Table-3 when
NE=0.535.
Table-3: Traced Data when NE=0.535(UDP attack)
Source Node
with MAC
address
Destination IP No.
of
pac
kets
entropy
38-60-77-50-
b0-92
192.168.0.45 70 0.29
00-1c-c0-83-b7-
f8
192.168.0.45 80 0.32
70-71-BC-BE-
11-9B
192.168.0.45 699 0.23
Here router entropy = 0.29+0.32+0.23= 0.84
n5 3
Normalized router entropy NE = 0.84/ log2 3 = 0.535
The above data are taken practically for Edge Router. In the
above case one flow dominates the whole traffic as a result the
normalized entropy decreases. If the threshold δ is perfect,
suppose 0.94 for the above example, it will treat flow coming
from node A with MAC (70-71-BC-BE-11-9B) as suspected
flow. After which the packet rate is being calculated for every
suspected flow. While the packet rates of different flows
exceed the thresholdδ i.e.150 packets/second, the attack is
confirmed and attack flow is discarded. All the above
calculations are based on log .
We consider 2 situations in our experiment to evaluate the
performance of our proposed algorithm. In the first situation,
we start with 2 legitimate users and 1 attacker and study how
the system performance is being degraded. In the second
situation we examine the system for 2 legitimate users and two
attackers.
The graph in Fig-3 depicts the effect of DDoS attack with 2
legitimate users and 1 attacker. It shows numbers of attack
packets as well as legitimate packets with respect totime. The
graph in Figure 4 shows the network utilization of 3senders
with 1 attacker. It shows number of packets/second with
respect to network utilization.
Fig-3: Effect of UDP attack
Fig-4: Threesenders with 1 attacker
The graph in Fig-4 shows the Network utilization of 4 senders
with 2 attackers. It shows the packet rate with respect to
network utilization.
Fig-5: Foursenders with 2 attackers
0
100
200
300
400
500
600
700
800
900
1 2 3 4 5 6
Legitimate
traffic
Attack traffic
Time in Seconds
PacketCount
0
10
20
30
40
50
60
50 100 150 200 250
Network
Utilization
Packet rate
NetworkUtilizationin%
0
10
20
30
40
50
60
50 100 150 200 250
Network
Utilization
Packet rate
N/WUtilizationin%
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
__________________________________________________________________________________________
Volume: 02 Issue: 10 | Oct-2013, Available @ http://www.ijret.org 439
5.2 HTTP GET Flood Attack
We traced no of HTTP GET request received in every 1
second interval.We have taken two examples using Fig. 2 how
the detection scheme works. Suppose node A1 is the attack
source and node A2and A3 are legitimate users and node D1 is
the victim. Based on the DDoS detection algorithm flows
coming from all the client nodes will first captured by router 1
Suppose at router 1, we have captured flows as given in Fig-6
which shows the legitimate traffic as well as attack traffic with
respect to time in a fixed time window T. The router entropy is
calculated according to Eq. (2) and the normalized router
entropy is being calculated using Eq. (3).Table-4 shows the
Normalized entropy calculations and Table-5 shows the traced
data when NE=0.81
Table-4: Normalized entropy calculation
Times in Second Normalized Router Entropy
0-1 0.71
1-2 0.86
2-3 0.63
3-4 0.67
4-5 0.81
Table-5 Traced Data when NE=0.81
Source Node
with MAC
address
Destination
IP
No.of
request
entropy
38-60-77-50-
b0-92
192.168.0.45 217 0.41
00-1c-c0-83-
b7-f8
192.168.0.45 74 0.47
70-71-BC-
BE-11-9B
192.168.0.45 49 0.40
Here router entropy = 0.41+0.47+0.40= 1.28 and n5 3
Normalized router entropy 	NE 0.84 log 3⁄ 0.811
The above data are taken practically for Router1. In the above
case one flow dominates the whole traffic as a result the
normalized entropy decreases. If the threshold is perfect,
suppose 0.94 for the above example, it will treat flow coming
from node A3 with MAC(70-71-BC-BE-11-9B) as suspected
flow. After which the packet rate is being calculated for every
suspected flow. While the packet rates of different flows
exceed the threshold δ i.e. 150 p/s, the attack is confirmed
and attack flow is discarded.
Fig-6: Traced data
The graph in Fig-7 shows the Heap utilization of 3 senders
with 1 attacker. It shows packet rate with respect to Heap
Memory utilization in %.The graph in Fig-8 shows the Heap
utilization of 4 senders with 2attacker. It shows packet rate
with respect to Heap Memory utilization.
Fig-7: three senders with 1 attacker
Fig-8: four senders with 2 attackers
0
50
100
150
200
250
1 2 3 4 5
Legitimate
packets
Attack
packets
Time in Seconds
PacketCount
0
10
20
30
40
50
60
50 100 150 200 250
Heap
Memory
Utilization
Packet rate
HeapMemoryin%
0
10
20
30
40
50
60
70
80
50 100 150 200 250
Heap
Memory
Utilization
Packet rate
HeapMemoryin
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
__________________________________________________________________________________________
Volume: 02 Issue: 10 | Oct-2013, Available @ http://www.ijret.org 440
CONCLUSIONS
In this paper we discussed different types of DDoS attacks that
could exploit network and related detection strategies and
introduces an alternative technique to detect denial-of-service
and distributed denial-of-service attacks by using packet rates
and packet address entropy-based technique. As we will take
the detection threshold δ as0.94 then, the proposed anomaly
detection system can detect DDoS attack traffics with high
detection rate and without any false positive before reaching
the victim and taking threshold δ as 150 p/s then, proposed
system can achieve the efficient use of Network utilization in
case of UDP attack and Heap Memory utilization in case of
HTTP Get flood attack. we plan to test our approach with
other kinds of DoS/DDoS attacks in the future work.
REFERENCES
[1]. http://blogs.ixiacom.com/ixia-blog/application-layer-
ddos-attacks-growing.
[2]. http://www.linuxforu.com/2011/04/securing-apache-
part-8-dos-ddos-attacks.
[3]. http://en.wikipedia.org/wiki/Denial-of-service_attack.
[4]. http://security.radware.com/knowledge-
center/DDoSPedia/ddos-attack/
[5]. Saman Taghavi Zargar, James Joshi, David Tipper,”
Survey of Defense Mechanisms Against Distributed
Denial of Service (DDoS) Flooding Attacks”,ieee
communications surveys & tutorials 2009.
[6]. P. G. Teodoro, J. D.Verdejo, G. M.Fernandez,
E.Vazquez, “Anomaly-based network intrusion
detection: Techniques, systems and challenges”,
computer & security, Volume 28, Issues 1-2, pp.18-28,
2008.
[7]. Yonghua You and Zulkernine,”A Distributed Defense
Framework for Flooding-Based DDoS Attacks”, ICC
Proceeding, 2007
[8]. Muhai Li and Ming Li,” A New Approach for
Detecting DDoS Attacks Based on Wavelet
Analysis”,ieeeconference, 2009.
[9]. Sumit Kar and Bibhudatta Sahoo,” An Anomaly
Detection System for DDoS Attack”,ijca-se 2009.
[10]. Suratose Tritilanunt et al,” Entropy-based Input-Output
Traffic Mode Detection Scheme for DoS/DDoS
Attacks”,2010 .
[11]. Yi Zhang and Qiang Liu,” A Real-Time DDoS Attack
Detection and Prevention System Based on per-ITraffic
Behavioral Analysis”,2010.
[12]. Suratose Tritilanunt, SuphanneeSivakorn,
ChoochernJuengjincharoen, AusaneeSiripornpisan,”
Entropy-based Input-Output Traffic Mode Detection
Scheme for DoS/DDoS Attacks”, ISCIT 2010
[13]. Wonjun Lee and Squicciarini,”Detection and Protection
against Distributed Denial of Service Attacks in
Accountable Grid Computing Systems”,IEEEJournel
2011.
[14]. G. Nychis, V. Sekar, D. G Andersen, H. Kim and
H.Zhang, “An Empirical Evaluation of Entropy-Based
Traffic Anomaly Detection”. Tech. Rep. CMU-CS-08-
145, Computer Science Department, Carnegie Mellon
University, 2008
[15]. Thomas M. Cover and Joy A. Thomas, “Elements of
Information Theory”, second edition, 2007
BIOGRAPHIES
Ms. Kharat J.S. obtained her Bachelor’s
Degree in Computer Science from BAMU
University during 2008 and currently pursuing
Masters Degree from the same university. She
is working in Computer Dept. of Shreeyash
Polytechnic Aurangabad as Lecturer from last 5 years. Her
research area includes Network Security.
Dr. Radhakrishna Naik is working as
professor and Head in CSE Department of MIT
(E) Aurangabad. He did his PhD in Real Time
Systems and his subjects of interest are Real
Time systems, Real Time database
management and Network security.

More Related Content

What's hot

A ROBUST MECHANISM FOR DEFENDING DISTRIBUTED DENIAL OF SERVICE ATTACKS ON WEB...
A ROBUST MECHANISM FOR DEFENDING DISTRIBUTED DENIAL OF SERVICE ATTACKS ON WEB...A ROBUST MECHANISM FOR DEFENDING DISTRIBUTED DENIAL OF SERVICE ATTACKS ON WEB...
A ROBUST MECHANISM FOR DEFENDING DISTRIBUTED DENIAL OF SERVICE ATTACKS ON WEB...
IJNSA Journal
 
DETECTION OF APPLICATION LAYER DDOS ATTACKS USING INFORMATION THEORY BASED ME...
DETECTION OF APPLICATION LAYER DDOS ATTACKS USING INFORMATION THEORY BASED ME...DETECTION OF APPLICATION LAYER DDOS ATTACKS USING INFORMATION THEORY BASED ME...
DETECTION OF APPLICATION LAYER DDOS ATTACKS USING INFORMATION THEORY BASED ME...
cscpconf
 
IRJET- A Study of DDoS Attacks in Software Defined Networks
IRJET- A Study of DDoS Attacks in Software Defined NetworksIRJET- A Study of DDoS Attacks in Software Defined Networks
IRJET- A Study of DDoS Attacks in Software Defined Networks
IRJET Journal
 
XDOSER, A BENCHMARKING TOOL FOR SYSTEM LOAD MEASUREMENT USING DENIAL OF SERVI...
XDOSER, A BENCHMARKING TOOL FOR SYSTEM LOAD MEASUREMENT USING DENIAL OF SERVI...XDOSER, A BENCHMARKING TOOL FOR SYSTEM LOAD MEASUREMENT USING DENIAL OF SERVI...
XDOSER, A BENCHMARKING TOOL FOR SYSTEM LOAD MEASUREMENT USING DENIAL OF SERVI...
IJNSA Journal
 
Ijartes v1-i2-007
Ijartes v1-i2-007Ijartes v1-i2-007
Ijartes v1-i2-007
IJARTES
 
Ix3615551559
Ix3615551559Ix3615551559
Ix3615551559
IJERA Editor
 
A Distributed Approach to Defend Web Service from DDoS Attacks
A Distributed Approach to Defend Web Service from DDoS AttacksA Distributed Approach to Defend Web Service from DDoS Attacks
A Distributed Approach to Defend Web Service from DDoS Attacks
CSCJournals
 
A SYNCHRONIZED DISTRIBUTED DENIAL OF SERVICE PREVENTION SYSTEM
A SYNCHRONIZED DISTRIBUTED DENIAL OF SERVICE PREVENTION SYSTEMA SYNCHRONIZED DISTRIBUTED DENIAL OF SERVICE PREVENTION SYSTEM
A SYNCHRONIZED DISTRIBUTED DENIAL OF SERVICE PREVENTION SYSTEM
cscpconf
 
A survey of trends in massive ddos attacks and cloud based mitigations
A survey of trends in massive ddos attacks and cloud based mitigationsA survey of trends in massive ddos attacks and cloud based mitigations
A survey of trends in massive ddos attacks and cloud based mitigations
IJNSA Journal
 
CREDIT BASED METHODOLOGY TO DETECT AND DISCRIMINATE DDOS ATTACK FROM FLASH CR...
CREDIT BASED METHODOLOGY TO DETECT AND DISCRIMINATE DDOS ATTACK FROM FLASH CR...CREDIT BASED METHODOLOGY TO DETECT AND DISCRIMINATE DDOS ATTACK FROM FLASH CR...
CREDIT BASED METHODOLOGY TO DETECT AND DISCRIMINATE DDOS ATTACK FROM FLASH CR...
IJNSA Journal
 
DISTRIBUTED DENIAL OF SERVICE (DDOS) ATTACKS DETECTION MECHANISM
DISTRIBUTED DENIAL OF SERVICE (DDOS) ATTACKS DETECTION MECHANISM DISTRIBUTED DENIAL OF SERVICE (DDOS) ATTACKS DETECTION MECHANISM
DISTRIBUTED DENIAL OF SERVICE (DDOS) ATTACKS DETECTION MECHANISM
ijcseit
 
I0945056
I0945056I0945056
I0945056
IOSR Journals
 
DDOS Attacks-A Stealthy Way of Implementation and Detection
DDOS Attacks-A Stealthy Way of Implementation and DetectionDDOS Attacks-A Stealthy Way of Implementation and Detection
DDOS Attacks-A Stealthy Way of Implementation and Detection
IJRES Journal
 
Impact of Flash Crowd Attack in Online Retail Applications
Impact of Flash Crowd Attack in Online Retail ApplicationsImpact of Flash Crowd Attack in Online Retail Applications
Impact of Flash Crowd Attack in Online Retail Applications
IJEACS
 
ITSecurity_DDOS_Mitigation
ITSecurity_DDOS_MitigationITSecurity_DDOS_Mitigation
ITSecurity_DDOS_Mitigation
R. Blake Martin
 

What's hot (15)

A ROBUST MECHANISM FOR DEFENDING DISTRIBUTED DENIAL OF SERVICE ATTACKS ON WEB...
A ROBUST MECHANISM FOR DEFENDING DISTRIBUTED DENIAL OF SERVICE ATTACKS ON WEB...A ROBUST MECHANISM FOR DEFENDING DISTRIBUTED DENIAL OF SERVICE ATTACKS ON WEB...
A ROBUST MECHANISM FOR DEFENDING DISTRIBUTED DENIAL OF SERVICE ATTACKS ON WEB...
 
DETECTION OF APPLICATION LAYER DDOS ATTACKS USING INFORMATION THEORY BASED ME...
DETECTION OF APPLICATION LAYER DDOS ATTACKS USING INFORMATION THEORY BASED ME...DETECTION OF APPLICATION LAYER DDOS ATTACKS USING INFORMATION THEORY BASED ME...
DETECTION OF APPLICATION LAYER DDOS ATTACKS USING INFORMATION THEORY BASED ME...
 
IRJET- A Study of DDoS Attacks in Software Defined Networks
IRJET- A Study of DDoS Attacks in Software Defined NetworksIRJET- A Study of DDoS Attacks in Software Defined Networks
IRJET- A Study of DDoS Attacks in Software Defined Networks
 
XDOSER, A BENCHMARKING TOOL FOR SYSTEM LOAD MEASUREMENT USING DENIAL OF SERVI...
XDOSER, A BENCHMARKING TOOL FOR SYSTEM LOAD MEASUREMENT USING DENIAL OF SERVI...XDOSER, A BENCHMARKING TOOL FOR SYSTEM LOAD MEASUREMENT USING DENIAL OF SERVI...
XDOSER, A BENCHMARKING TOOL FOR SYSTEM LOAD MEASUREMENT USING DENIAL OF SERVI...
 
Ijartes v1-i2-007
Ijartes v1-i2-007Ijartes v1-i2-007
Ijartes v1-i2-007
 
Ix3615551559
Ix3615551559Ix3615551559
Ix3615551559
 
A Distributed Approach to Defend Web Service from DDoS Attacks
A Distributed Approach to Defend Web Service from DDoS AttacksA Distributed Approach to Defend Web Service from DDoS Attacks
A Distributed Approach to Defend Web Service from DDoS Attacks
 
A SYNCHRONIZED DISTRIBUTED DENIAL OF SERVICE PREVENTION SYSTEM
A SYNCHRONIZED DISTRIBUTED DENIAL OF SERVICE PREVENTION SYSTEMA SYNCHRONIZED DISTRIBUTED DENIAL OF SERVICE PREVENTION SYSTEM
A SYNCHRONIZED DISTRIBUTED DENIAL OF SERVICE PREVENTION SYSTEM
 
A survey of trends in massive ddos attacks and cloud based mitigations
A survey of trends in massive ddos attacks and cloud based mitigationsA survey of trends in massive ddos attacks and cloud based mitigations
A survey of trends in massive ddos attacks and cloud based mitigations
 
CREDIT BASED METHODOLOGY TO DETECT AND DISCRIMINATE DDOS ATTACK FROM FLASH CR...
CREDIT BASED METHODOLOGY TO DETECT AND DISCRIMINATE DDOS ATTACK FROM FLASH CR...CREDIT BASED METHODOLOGY TO DETECT AND DISCRIMINATE DDOS ATTACK FROM FLASH CR...
CREDIT BASED METHODOLOGY TO DETECT AND DISCRIMINATE DDOS ATTACK FROM FLASH CR...
 
DISTRIBUTED DENIAL OF SERVICE (DDOS) ATTACKS DETECTION MECHANISM
DISTRIBUTED DENIAL OF SERVICE (DDOS) ATTACKS DETECTION MECHANISM DISTRIBUTED DENIAL OF SERVICE (DDOS) ATTACKS DETECTION MECHANISM
DISTRIBUTED DENIAL OF SERVICE (DDOS) ATTACKS DETECTION MECHANISM
 
I0945056
I0945056I0945056
I0945056
 
DDOS Attacks-A Stealthy Way of Implementation and Detection
DDOS Attacks-A Stealthy Way of Implementation and DetectionDDOS Attacks-A Stealthy Way of Implementation and Detection
DDOS Attacks-A Stealthy Way of Implementation and Detection
 
Impact of Flash Crowd Attack in Online Retail Applications
Impact of Flash Crowd Attack in Online Retail ApplicationsImpact of Flash Crowd Attack in Online Retail Applications
Impact of Flash Crowd Attack in Online Retail Applications
 
ITSecurity_DDOS_Mitigation
ITSecurity_DDOS_MitigationITSecurity_DDOS_Mitigation
ITSecurity_DDOS_Mitigation
 

Viewers also liked

Qo s management for mobile satellite communication
Qo s management for mobile satellite communicationQo s management for mobile satellite communication
Qo s management for mobile satellite communication
eSAT Publishing House
 
3 d modeling and dynamic charectarization of steam turbine packet blade and c...
3 d modeling and dynamic charectarization of steam turbine packet blade and c...3 d modeling and dynamic charectarization of steam turbine packet blade and c...
3 d modeling and dynamic charectarization of steam turbine packet blade and c...
eSAT Publishing House
 
Load frequency control in co ordination with
Load frequency control in co ordination withLoad frequency control in co ordination with
Load frequency control in co ordination with
eSAT Publishing House
 
Design and implementation of network security using genetic algorithm
Design and implementation of network security using genetic algorithmDesign and implementation of network security using genetic algorithm
Design and implementation of network security using genetic algorithm
eSAT Publishing House
 
Flood modeling of river godavari using hec ras
Flood modeling of river godavari using hec rasFlood modeling of river godavari using hec ras
Flood modeling of river godavari using hec ras
eSAT Publishing House
 
Fpga based encryption design using vhdl
Fpga based encryption design using vhdlFpga based encryption design using vhdl
Fpga based encryption design using vhdl
eSAT Publishing House
 
Kinematic model of a car
Kinematic model of a carKinematic model of a car
Kinematic model of a car
eSAT Publishing House
 
An analysis of pfc converter with high speed dynamic
An analysis of pfc converter with high speed dynamicAn analysis of pfc converter with high speed dynamic
An analysis of pfc converter with high speed dynamic
eSAT Publishing House
 
Pe2 a public encryption with two ack approach to
Pe2 a public encryption with two ack approach toPe2 a public encryption with two ack approach to
Pe2 a public encryption with two ack approach to
eSAT Publishing House
 
A scheme for optical pulse generation using
A scheme for optical pulse generation usingA scheme for optical pulse generation using
A scheme for optical pulse generation using
eSAT Publishing House
 
Detection of speech under stress using spectral analysis
Detection of speech under stress using spectral analysisDetection of speech under stress using spectral analysis
Detection of speech under stress using spectral analysis
eSAT Publishing House
 
Explicit model predictive control of fast dynamic system
Explicit model predictive control of fast dynamic systemExplicit model predictive control of fast dynamic system
Explicit model predictive control of fast dynamic system
eSAT Publishing House
 
Treatment of distillery spent wash by anaerobic
Treatment of distillery spent wash by anaerobicTreatment of distillery spent wash by anaerobic
Treatment of distillery spent wash by anaerobic
eSAT Publishing House
 
Study of cigarette butts extract as corrosiveinhibiting agent in j55 steel ma...
Study of cigarette butts extract as corrosiveinhibiting agent in j55 steel ma...Study of cigarette butts extract as corrosiveinhibiting agent in j55 steel ma...
Study of cigarette butts extract as corrosiveinhibiting agent in j55 steel ma...
eSAT Publishing House
 
Effects of filtering on ber performance of an ofdm system
Effects of filtering on ber performance of an ofdm systemEffects of filtering on ber performance of an ofdm system
Effects of filtering on ber performance of an ofdm system
eSAT Publishing House
 
Energy saving model and application for smart phones
Energy saving model and application for smart phonesEnergy saving model and application for smart phones
Energy saving model and application for smart phones
eSAT Publishing House
 
Evaluation of operational efficiency of urban road
Evaluation of operational efficiency of urban roadEvaluation of operational efficiency of urban road
Evaluation of operational efficiency of urban road
eSAT Publishing House
 
Studies on effects of short coir fiber reinforcement on
Studies on effects of short coir fiber reinforcement onStudies on effects of short coir fiber reinforcement on
Studies on effects of short coir fiber reinforcement on
eSAT Publishing House
 
Stress resistance of owa stick reinforced grano periwinkle concrete slab subj...
Stress resistance of owa stick reinforced grano periwinkle concrete slab subj...Stress resistance of owa stick reinforced grano periwinkle concrete slab subj...
Stress resistance of owa stick reinforced grano periwinkle concrete slab subj...
eSAT Publishing House
 
Fpga based 128 bit customised vliw processor for executing dual scalarvector ...
Fpga based 128 bit customised vliw processor for executing dual scalarvector ...Fpga based 128 bit customised vliw processor for executing dual scalarvector ...
Fpga based 128 bit customised vliw processor for executing dual scalarvector ...
eSAT Publishing House
 

Viewers also liked (20)

Qo s management for mobile satellite communication
Qo s management for mobile satellite communicationQo s management for mobile satellite communication
Qo s management for mobile satellite communication
 
3 d modeling and dynamic charectarization of steam turbine packet blade and c...
3 d modeling and dynamic charectarization of steam turbine packet blade and c...3 d modeling and dynamic charectarization of steam turbine packet blade and c...
3 d modeling and dynamic charectarization of steam turbine packet blade and c...
 
Load frequency control in co ordination with
Load frequency control in co ordination withLoad frequency control in co ordination with
Load frequency control in co ordination with
 
Design and implementation of network security using genetic algorithm
Design and implementation of network security using genetic algorithmDesign and implementation of network security using genetic algorithm
Design and implementation of network security using genetic algorithm
 
Flood modeling of river godavari using hec ras
Flood modeling of river godavari using hec rasFlood modeling of river godavari using hec ras
Flood modeling of river godavari using hec ras
 
Fpga based encryption design using vhdl
Fpga based encryption design using vhdlFpga based encryption design using vhdl
Fpga based encryption design using vhdl
 
Kinematic model of a car
Kinematic model of a carKinematic model of a car
Kinematic model of a car
 
An analysis of pfc converter with high speed dynamic
An analysis of pfc converter with high speed dynamicAn analysis of pfc converter with high speed dynamic
An analysis of pfc converter with high speed dynamic
 
Pe2 a public encryption with two ack approach to
Pe2 a public encryption with two ack approach toPe2 a public encryption with two ack approach to
Pe2 a public encryption with two ack approach to
 
A scheme for optical pulse generation using
A scheme for optical pulse generation usingA scheme for optical pulse generation using
A scheme for optical pulse generation using
 
Detection of speech under stress using spectral analysis
Detection of speech under stress using spectral analysisDetection of speech under stress using spectral analysis
Detection of speech under stress using spectral analysis
 
Explicit model predictive control of fast dynamic system
Explicit model predictive control of fast dynamic systemExplicit model predictive control of fast dynamic system
Explicit model predictive control of fast dynamic system
 
Treatment of distillery spent wash by anaerobic
Treatment of distillery spent wash by anaerobicTreatment of distillery spent wash by anaerobic
Treatment of distillery spent wash by anaerobic
 
Study of cigarette butts extract as corrosiveinhibiting agent in j55 steel ma...
Study of cigarette butts extract as corrosiveinhibiting agent in j55 steel ma...Study of cigarette butts extract as corrosiveinhibiting agent in j55 steel ma...
Study of cigarette butts extract as corrosiveinhibiting agent in j55 steel ma...
 
Effects of filtering on ber performance of an ofdm system
Effects of filtering on ber performance of an ofdm systemEffects of filtering on ber performance of an ofdm system
Effects of filtering on ber performance of an ofdm system
 
Energy saving model and application for smart phones
Energy saving model and application for smart phonesEnergy saving model and application for smart phones
Energy saving model and application for smart phones
 
Evaluation of operational efficiency of urban road
Evaluation of operational efficiency of urban roadEvaluation of operational efficiency of urban road
Evaluation of operational efficiency of urban road
 
Studies on effects of short coir fiber reinforcement on
Studies on effects of short coir fiber reinforcement onStudies on effects of short coir fiber reinforcement on
Studies on effects of short coir fiber reinforcement on
 
Stress resistance of owa stick reinforced grano periwinkle concrete slab subj...
Stress resistance of owa stick reinforced grano periwinkle concrete slab subj...Stress resistance of owa stick reinforced grano periwinkle concrete slab subj...
Stress resistance of owa stick reinforced grano periwinkle concrete slab subj...
 
Fpga based 128 bit customised vliw processor for executing dual scalarvector ...
Fpga based 128 bit customised vliw processor for executing dual scalarvector ...Fpga based 128 bit customised vliw processor for executing dual scalarvector ...
Fpga based 128 bit customised vliw processor for executing dual scalarvector ...
 

Similar to A vivacious approach to detect and prevent d do s attack

PASSWORD BASED SCHEME AND GROUP TESTING FOR DEFENDING DDOS ATTACKS
PASSWORD BASED SCHEME AND GROUP TESTING FOR DEFENDING DDOS ATTACKSPASSWORD BASED SCHEME AND GROUP TESTING FOR DEFENDING DDOS ATTACKS
PASSWORD BASED SCHEME AND GROUP TESTING FOR DEFENDING DDOS ATTACKS
IJNSA Journal
 
Study of flooding based ddos attacks and their effect using deter testbed
Study of flooding based ddos attacks and their effect using deter testbedStudy of flooding based ddos attacks and their effect using deter testbed
Study of flooding based ddos attacks and their effect using deter testbed
eSAT Journals
 
A041201010
A041201010A041201010
A041201010
ijceronline
 
PREVENTING DISTRIBUTED DENIAL OF SERVICE ATTACKS IN CLOUD ENVIRONMENTS
PREVENTING DISTRIBUTED DENIAL OF SERVICE ATTACKS IN CLOUD ENVIRONMENTS PREVENTING DISTRIBUTED DENIAL OF SERVICE ATTACKS IN CLOUD ENVIRONMENTS
PREVENTING DISTRIBUTED DENIAL OF SERVICE ATTACKS IN CLOUD ENVIRONMENTS
IJITCA Journal
 
Preventing Distributed Denial of Service Attacks in Cloud Environments
Preventing Distributed Denial of Service Attacks in Cloud Environments Preventing Distributed Denial of Service Attacks in Cloud Environments
Preventing Distributed Denial of Service Attacks in Cloud Environments
IJITCA Journal
 
3-JournalofCommunicationsVol.14No.2February2019.pdf
3-JournalofCommunicationsVol.14No.2February2019.pdf3-JournalofCommunicationsVol.14No.2February2019.pdf
3-JournalofCommunicationsVol.14No.2February2019.pdf
PrasannaKumarpanda2
 
Encountering distributed denial of service attack utilizing federated softwar...
Encountering distributed denial of service attack utilizing federated softwar...Encountering distributed denial of service attack utilizing federated softwar...
Encountering distributed denial of service attack utilizing federated softwar...
IJECEIAES
 
IRJET- A Survey on DDOS Attack in Manet
IRJET-  	  A Survey on DDOS Attack in ManetIRJET-  	  A Survey on DDOS Attack in Manet
IRJET- A Survey on DDOS Attack in Manet
IRJET Journal
 
A REVIEW ON DDOS PREVENTION AND DETECTION METHODOLOGY
A REVIEW ON DDOS PREVENTION AND DETECTION METHODOLOGYA REVIEW ON DDOS PREVENTION AND DETECTION METHODOLOGY
A REVIEW ON DDOS PREVENTION AND DETECTION METHODOLOGY
ijasa
 
Deep learning approach to DDoS attack with imbalanced data at the application...
Deep learning approach to DDoS attack with imbalanced data at the application...Deep learning approach to DDoS attack with imbalanced data at the application...
Deep learning approach to DDoS attack with imbalanced data at the application...
TELKOMNIKA JOURNAL
 
Distributed reflection denial of service attack: A critical review
Distributed reflection denial of service attack: A critical review Distributed reflection denial of service attack: A critical review
Distributed reflection denial of service attack: A critical review
IJECEIAES
 
Unlimited Attempts AllowedDetailsVirtual Labs Perpetrators of D.docx
Unlimited Attempts AllowedDetailsVirtual Labs Perpetrators of D.docxUnlimited Attempts AllowedDetailsVirtual Labs Perpetrators of D.docx
Unlimited Attempts AllowedDetailsVirtual Labs Perpetrators of D.docx
jolleybendicty
 
WEB-BASED APPLICATION LAYER DISTRIBUTED DENIAL-OF-SERVICE ATTACKS: A DATA-DRI...
WEB-BASED APPLICATION LAYER DISTRIBUTED DENIAL-OF-SERVICE ATTACKS: A DATA-DRI...WEB-BASED APPLICATION LAYER DISTRIBUTED DENIAL-OF-SERVICE ATTACKS: A DATA-DRI...
WEB-BASED APPLICATION LAYER DISTRIBUTED DENIAL-OF-SERVICE ATTACKS: A DATA-DRI...
indexPub
 
XDOSER, A BENCHMARKING TOOL FOR SYSTEM LOAD MEASUREMENT USING DENIAL OF SERVI...
XDOSER, A BENCHMARKING TOOL FOR SYSTEM LOAD MEASUREMENT USING DENIAL OF SERVI...XDOSER, A BENCHMARKING TOOL FOR SYSTEM LOAD MEASUREMENT USING DENIAL OF SERVI...
XDOSER, A BENCHMARKING TOOL FOR SYSTEM LOAD MEASUREMENT USING DENIAL OF SERVI...
IJNSA Journal
 
I034_I041_I052_DDOS Attacks_Presentation.pdf
I034_I041_I052_DDOS Attacks_Presentation.pdfI034_I041_I052_DDOS Attacks_Presentation.pdf
I034_I041_I052_DDOS Attacks_Presentation.pdf
Devesh Pawar
 
Efficient ddos attacks security scheme using asvs
Efficient ddos attacks security scheme using asvsEfficient ddos attacks security scheme using asvs
Efficient ddos attacks security scheme using asvs
eSAT Publishing House
 
Efficient ddos attacks security scheme using asvs
Efficient ddos attacks security scheme using asvsEfficient ddos attacks security scheme using asvs
Efficient ddos attacks security scheme using asvs
eSAT Journals
 
Distributed Denial Of Service ( Ddos )
Distributed Denial Of Service ( Ddos )Distributed Denial Of Service ( Ddos )
Distributed Denial Of Service ( Ddos )
Sharon Lee
 
International Journal of Computational Science and Information Technology (I...
 International Journal of Computational Science and Information Technology (I... International Journal of Computational Science and Information Technology (I...
International Journal of Computational Science and Information Technology (I...
ijcsity
 
10. 23757.pdf
10. 23757.pdf10. 23757.pdf
10. 23757.pdf
TELKOMNIKA JOURNAL
 

Similar to A vivacious approach to detect and prevent d do s attack (20)

PASSWORD BASED SCHEME AND GROUP TESTING FOR DEFENDING DDOS ATTACKS
PASSWORD BASED SCHEME AND GROUP TESTING FOR DEFENDING DDOS ATTACKSPASSWORD BASED SCHEME AND GROUP TESTING FOR DEFENDING DDOS ATTACKS
PASSWORD BASED SCHEME AND GROUP TESTING FOR DEFENDING DDOS ATTACKS
 
Study of flooding based ddos attacks and their effect using deter testbed
Study of flooding based ddos attacks and their effect using deter testbedStudy of flooding based ddos attacks and their effect using deter testbed
Study of flooding based ddos attacks and their effect using deter testbed
 
A041201010
A041201010A041201010
A041201010
 
PREVENTING DISTRIBUTED DENIAL OF SERVICE ATTACKS IN CLOUD ENVIRONMENTS
PREVENTING DISTRIBUTED DENIAL OF SERVICE ATTACKS IN CLOUD ENVIRONMENTS PREVENTING DISTRIBUTED DENIAL OF SERVICE ATTACKS IN CLOUD ENVIRONMENTS
PREVENTING DISTRIBUTED DENIAL OF SERVICE ATTACKS IN CLOUD ENVIRONMENTS
 
Preventing Distributed Denial of Service Attacks in Cloud Environments
Preventing Distributed Denial of Service Attacks in Cloud Environments Preventing Distributed Denial of Service Attacks in Cloud Environments
Preventing Distributed Denial of Service Attacks in Cloud Environments
 
3-JournalofCommunicationsVol.14No.2February2019.pdf
3-JournalofCommunicationsVol.14No.2February2019.pdf3-JournalofCommunicationsVol.14No.2February2019.pdf
3-JournalofCommunicationsVol.14No.2February2019.pdf
 
Encountering distributed denial of service attack utilizing federated softwar...
Encountering distributed denial of service attack utilizing federated softwar...Encountering distributed denial of service attack utilizing federated softwar...
Encountering distributed denial of service attack utilizing federated softwar...
 
IRJET- A Survey on DDOS Attack in Manet
IRJET-  	  A Survey on DDOS Attack in ManetIRJET-  	  A Survey on DDOS Attack in Manet
IRJET- A Survey on DDOS Attack in Manet
 
A REVIEW ON DDOS PREVENTION AND DETECTION METHODOLOGY
A REVIEW ON DDOS PREVENTION AND DETECTION METHODOLOGYA REVIEW ON DDOS PREVENTION AND DETECTION METHODOLOGY
A REVIEW ON DDOS PREVENTION AND DETECTION METHODOLOGY
 
Deep learning approach to DDoS attack with imbalanced data at the application...
Deep learning approach to DDoS attack with imbalanced data at the application...Deep learning approach to DDoS attack with imbalanced data at the application...
Deep learning approach to DDoS attack with imbalanced data at the application...
 
Distributed reflection denial of service attack: A critical review
Distributed reflection denial of service attack: A critical review Distributed reflection denial of service attack: A critical review
Distributed reflection denial of service attack: A critical review
 
Unlimited Attempts AllowedDetailsVirtual Labs Perpetrators of D.docx
Unlimited Attempts AllowedDetailsVirtual Labs Perpetrators of D.docxUnlimited Attempts AllowedDetailsVirtual Labs Perpetrators of D.docx
Unlimited Attempts AllowedDetailsVirtual Labs Perpetrators of D.docx
 
WEB-BASED APPLICATION LAYER DISTRIBUTED DENIAL-OF-SERVICE ATTACKS: A DATA-DRI...
WEB-BASED APPLICATION LAYER DISTRIBUTED DENIAL-OF-SERVICE ATTACKS: A DATA-DRI...WEB-BASED APPLICATION LAYER DISTRIBUTED DENIAL-OF-SERVICE ATTACKS: A DATA-DRI...
WEB-BASED APPLICATION LAYER DISTRIBUTED DENIAL-OF-SERVICE ATTACKS: A DATA-DRI...
 
XDOSER, A BENCHMARKING TOOL FOR SYSTEM LOAD MEASUREMENT USING DENIAL OF SERVI...
XDOSER, A BENCHMARKING TOOL FOR SYSTEM LOAD MEASUREMENT USING DENIAL OF SERVI...XDOSER, A BENCHMARKING TOOL FOR SYSTEM LOAD MEASUREMENT USING DENIAL OF SERVI...
XDOSER, A BENCHMARKING TOOL FOR SYSTEM LOAD MEASUREMENT USING DENIAL OF SERVI...
 
I034_I041_I052_DDOS Attacks_Presentation.pdf
I034_I041_I052_DDOS Attacks_Presentation.pdfI034_I041_I052_DDOS Attacks_Presentation.pdf
I034_I041_I052_DDOS Attacks_Presentation.pdf
 
Efficient ddos attacks security scheme using asvs
Efficient ddos attacks security scheme using asvsEfficient ddos attacks security scheme using asvs
Efficient ddos attacks security scheme using asvs
 
Efficient ddos attacks security scheme using asvs
Efficient ddos attacks security scheme using asvsEfficient ddos attacks security scheme using asvs
Efficient ddos attacks security scheme using asvs
 
Distributed Denial Of Service ( Ddos )
Distributed Denial Of Service ( Ddos )Distributed Denial Of Service ( Ddos )
Distributed Denial Of Service ( Ddos )
 
International Journal of Computational Science and Information Technology (I...
 International Journal of Computational Science and Information Technology (I... International Journal of Computational Science and Information Technology (I...
International Journal of Computational Science and Information Technology (I...
 
10. 23757.pdf
10. 23757.pdf10. 23757.pdf
10. 23757.pdf
 

More from eSAT Publishing House

Likely impacts of hudhud on the environment of visakhapatnam
Likely impacts of hudhud on the environment of visakhapatnamLikely impacts of hudhud on the environment of visakhapatnam
Likely impacts of hudhud on the environment of visakhapatnam
eSAT Publishing House
 
Impact of flood disaster in a drought prone area – case study of alampur vill...
Impact of flood disaster in a drought prone area – case study of alampur vill...Impact of flood disaster in a drought prone area – case study of alampur vill...
Impact of flood disaster in a drought prone area – case study of alampur vill...
eSAT Publishing House
 
Hudhud cyclone – a severe disaster in visakhapatnam
Hudhud cyclone – a severe disaster in visakhapatnamHudhud cyclone – a severe disaster in visakhapatnam
Hudhud cyclone – a severe disaster in visakhapatnam
eSAT Publishing House
 
Groundwater investigation using geophysical methods a case study of pydibhim...
Groundwater investigation using geophysical methods  a case study of pydibhim...Groundwater investigation using geophysical methods  a case study of pydibhim...
Groundwater investigation using geophysical methods a case study of pydibhim...
eSAT Publishing House
 
Flood related disasters concerned to urban flooding in bangalore, india
Flood related disasters concerned to urban flooding in bangalore, indiaFlood related disasters concerned to urban flooding in bangalore, india
Flood related disasters concerned to urban flooding in bangalore, india
eSAT Publishing House
 
Enhancing post disaster recovery by optimal infrastructure capacity building
Enhancing post disaster recovery by optimal infrastructure capacity buildingEnhancing post disaster recovery by optimal infrastructure capacity building
Enhancing post disaster recovery by optimal infrastructure capacity building
eSAT Publishing House
 
Effect of lintel and lintel band on the global performance of reinforced conc...
Effect of lintel and lintel band on the global performance of reinforced conc...Effect of lintel and lintel band on the global performance of reinforced conc...
Effect of lintel and lintel band on the global performance of reinforced conc...
eSAT Publishing House
 
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
eSAT Publishing House
 
Wind damage to buildings, infrastrucuture and landscape elements along the be...
Wind damage to buildings, infrastrucuture and landscape elements along the be...Wind damage to buildings, infrastrucuture and landscape elements along the be...
Wind damage to buildings, infrastrucuture and landscape elements along the be...
eSAT Publishing House
 
Shear strength of rc deep beam panels – a review
Shear strength of rc deep beam panels – a reviewShear strength of rc deep beam panels – a review
Shear strength of rc deep beam panels – a review
eSAT Publishing House
 
Role of voluntary teams of professional engineers in dissater management – ex...
Role of voluntary teams of professional engineers in dissater management – ex...Role of voluntary teams of professional engineers in dissater management – ex...
Role of voluntary teams of professional engineers in dissater management – ex...
eSAT Publishing House
 
Risk analysis and environmental hazard management
Risk analysis and environmental hazard managementRisk analysis and environmental hazard management
Risk analysis and environmental hazard management
eSAT Publishing House
 
Review study on performance of seismically tested repaired shear walls
Review study on performance of seismically tested repaired shear wallsReview study on performance of seismically tested repaired shear walls
Review study on performance of seismically tested repaired shear walls
eSAT Publishing House
 
Monitoring and assessment of air quality with reference to dust particles (pm...
Monitoring and assessment of air quality with reference to dust particles (pm...Monitoring and assessment of air quality with reference to dust particles (pm...
Monitoring and assessment of air quality with reference to dust particles (pm...
eSAT Publishing House
 
Low cost wireless sensor networks and smartphone applications for disaster ma...
Low cost wireless sensor networks and smartphone applications for disaster ma...Low cost wireless sensor networks and smartphone applications for disaster ma...
Low cost wireless sensor networks and smartphone applications for disaster ma...
eSAT Publishing House
 
Coastal zones – seismic vulnerability an analysis from east coast of india
Coastal zones – seismic vulnerability an analysis from east coast of indiaCoastal zones – seismic vulnerability an analysis from east coast of india
Coastal zones – seismic vulnerability an analysis from east coast of india
eSAT Publishing House
 
Can fracture mechanics predict damage due disaster of structures
Can fracture mechanics predict damage due disaster of structuresCan fracture mechanics predict damage due disaster of structures
Can fracture mechanics predict damage due disaster of structures
eSAT Publishing House
 
Assessment of seismic susceptibility of rc buildings
Assessment of seismic susceptibility of rc buildingsAssessment of seismic susceptibility of rc buildings
Assessment of seismic susceptibility of rc buildings
eSAT Publishing House
 
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
eSAT Publishing House
 
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
eSAT Publishing House
 

More from eSAT Publishing House (20)

Likely impacts of hudhud on the environment of visakhapatnam
Likely impacts of hudhud on the environment of visakhapatnamLikely impacts of hudhud on the environment of visakhapatnam
Likely impacts of hudhud on the environment of visakhapatnam
 
Impact of flood disaster in a drought prone area – case study of alampur vill...
Impact of flood disaster in a drought prone area – case study of alampur vill...Impact of flood disaster in a drought prone area – case study of alampur vill...
Impact of flood disaster in a drought prone area – case study of alampur vill...
 
Hudhud cyclone – a severe disaster in visakhapatnam
Hudhud cyclone – a severe disaster in visakhapatnamHudhud cyclone – a severe disaster in visakhapatnam
Hudhud cyclone – a severe disaster in visakhapatnam
 
Groundwater investigation using geophysical methods a case study of pydibhim...
Groundwater investigation using geophysical methods  a case study of pydibhim...Groundwater investigation using geophysical methods  a case study of pydibhim...
Groundwater investigation using geophysical methods a case study of pydibhim...
 
Flood related disasters concerned to urban flooding in bangalore, india
Flood related disasters concerned to urban flooding in bangalore, indiaFlood related disasters concerned to urban flooding in bangalore, india
Flood related disasters concerned to urban flooding in bangalore, india
 
Enhancing post disaster recovery by optimal infrastructure capacity building
Enhancing post disaster recovery by optimal infrastructure capacity buildingEnhancing post disaster recovery by optimal infrastructure capacity building
Enhancing post disaster recovery by optimal infrastructure capacity building
 
Effect of lintel and lintel band on the global performance of reinforced conc...
Effect of lintel and lintel band on the global performance of reinforced conc...Effect of lintel and lintel band on the global performance of reinforced conc...
Effect of lintel and lintel band on the global performance of reinforced conc...
 
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
 
Wind damage to buildings, infrastrucuture and landscape elements along the be...
Wind damage to buildings, infrastrucuture and landscape elements along the be...Wind damage to buildings, infrastrucuture and landscape elements along the be...
Wind damage to buildings, infrastrucuture and landscape elements along the be...
 
Shear strength of rc deep beam panels – a review
Shear strength of rc deep beam panels – a reviewShear strength of rc deep beam panels – a review
Shear strength of rc deep beam panels – a review
 
Role of voluntary teams of professional engineers in dissater management – ex...
Role of voluntary teams of professional engineers in dissater management – ex...Role of voluntary teams of professional engineers in dissater management – ex...
Role of voluntary teams of professional engineers in dissater management – ex...
 
Risk analysis and environmental hazard management
Risk analysis and environmental hazard managementRisk analysis and environmental hazard management
Risk analysis and environmental hazard management
 
Review study on performance of seismically tested repaired shear walls
Review study on performance of seismically tested repaired shear wallsReview study on performance of seismically tested repaired shear walls
Review study on performance of seismically tested repaired shear walls
 
Monitoring and assessment of air quality with reference to dust particles (pm...
Monitoring and assessment of air quality with reference to dust particles (pm...Monitoring and assessment of air quality with reference to dust particles (pm...
Monitoring and assessment of air quality with reference to dust particles (pm...
 
Low cost wireless sensor networks and smartphone applications for disaster ma...
Low cost wireless sensor networks and smartphone applications for disaster ma...Low cost wireless sensor networks and smartphone applications for disaster ma...
Low cost wireless sensor networks and smartphone applications for disaster ma...
 
Coastal zones – seismic vulnerability an analysis from east coast of india
Coastal zones – seismic vulnerability an analysis from east coast of indiaCoastal zones – seismic vulnerability an analysis from east coast of india
Coastal zones – seismic vulnerability an analysis from east coast of india
 
Can fracture mechanics predict damage due disaster of structures
Can fracture mechanics predict damage due disaster of structuresCan fracture mechanics predict damage due disaster of structures
Can fracture mechanics predict damage due disaster of structures
 
Assessment of seismic susceptibility of rc buildings
Assessment of seismic susceptibility of rc buildingsAssessment of seismic susceptibility of rc buildings
Assessment of seismic susceptibility of rc buildings
 
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
 
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
 

Recently uploaded

Seminar on Distillation study-mafia.pptx
Seminar on Distillation study-mafia.pptxSeminar on Distillation study-mafia.pptx
Seminar on Distillation study-mafia.pptx
Madan Karki
 
Mechanical Engineering on AAI Summer Training Report-003.pdf
Mechanical Engineering on AAI Summer Training Report-003.pdfMechanical Engineering on AAI Summer Training Report-003.pdf
Mechanical Engineering on AAI Summer Training Report-003.pdf
21UME003TUSHARDEB
 
Data Driven Maintenance | UReason Webinar
Data Driven Maintenance | UReason WebinarData Driven Maintenance | UReason Webinar
Data Driven Maintenance | UReason Webinar
UReason
 
Software Engineering and Project Management - Introduction, Modeling Concepts...
Software Engineering and Project Management - Introduction, Modeling Concepts...Software Engineering and Project Management - Introduction, Modeling Concepts...
Software Engineering and Project Management - Introduction, Modeling Concepts...
Prakhyath Rai
 
Rainfall intensity duration frequency curve statistical analysis and modeling...
Rainfall intensity duration frequency curve statistical analysis and modeling...Rainfall intensity duration frequency curve statistical analysis and modeling...
Rainfall intensity duration frequency curve statistical analysis and modeling...
bijceesjournal
 
原版制作(Humboldt毕业证书)柏林大学毕业证学位证一模一样
原版制作(Humboldt毕业证书)柏林大学毕业证学位证一模一样原版制作(Humboldt毕业证书)柏林大学毕业证学位证一模一样
原版制作(Humboldt毕业证书)柏林大学毕业证学位证一模一样
ydzowc
 
spirit beverages ppt without graphics.pptx
spirit beverages ppt without graphics.pptxspirit beverages ppt without graphics.pptx
spirit beverages ppt without graphics.pptx
Madan Karki
 
Welding Metallurgy Ferrous Materials.pdf
Welding Metallurgy Ferrous Materials.pdfWelding Metallurgy Ferrous Materials.pdf
Welding Metallurgy Ferrous Materials.pdf
AjmalKhan50578
 
Embedded machine learning-based road conditions and driving behavior monitoring
Embedded machine learning-based road conditions and driving behavior monitoringEmbedded machine learning-based road conditions and driving behavior monitoring
Embedded machine learning-based road conditions and driving behavior monitoring
IJECEIAES
 
Generative AI leverages algorithms to create various forms of content
Generative AI leverages algorithms to create various forms of contentGenerative AI leverages algorithms to create various forms of content
Generative AI leverages algorithms to create various forms of content
Hitesh Mohapatra
 
An improved modulation technique suitable for a three level flying capacitor ...
An improved modulation technique suitable for a three level flying capacitor ...An improved modulation technique suitable for a three level flying capacitor ...
An improved modulation technique suitable for a three level flying capacitor ...
IJECEIAES
 
LLM Fine Tuning with QLoRA Cassandra Lunch 4, presented by Anant
LLM Fine Tuning with QLoRA Cassandra Lunch 4, presented by AnantLLM Fine Tuning with QLoRA Cassandra Lunch 4, presented by Anant
LLM Fine Tuning with QLoRA Cassandra Lunch 4, presented by Anant
Anant Corporation
 
Properties Railway Sleepers and Test.pptx
Properties Railway Sleepers and Test.pptxProperties Railway Sleepers and Test.pptx
Properties Railway Sleepers and Test.pptx
MDSABBIROJJAMANPAYEL
 
Certificates - Mahmoud Mohamed Moursi Ahmed
Certificates - Mahmoud Mohamed Moursi AhmedCertificates - Mahmoud Mohamed Moursi Ahmed
Certificates - Mahmoud Mohamed Moursi Ahmed
Mahmoud Morsy
 
Unit-III-ELECTROCHEMICAL STORAGE DEVICES.ppt
Unit-III-ELECTROCHEMICAL STORAGE DEVICES.pptUnit-III-ELECTROCHEMICAL STORAGE DEVICES.ppt
Unit-III-ELECTROCHEMICAL STORAGE DEVICES.ppt
KrishnaveniKrishnara1
 
Use PyCharm for remote debugging of WSL on a Windo cf5c162d672e4e58b4dde5d797...
Use PyCharm for remote debugging of WSL on a Windo cf5c162d672e4e58b4dde5d797...Use PyCharm for remote debugging of WSL on a Windo cf5c162d672e4e58b4dde5d797...
Use PyCharm for remote debugging of WSL on a Windo cf5c162d672e4e58b4dde5d797...
shadow0702a
 
学校原版美国波士顿大学毕业证学历学位证书原版一模一样
学校原版美国波士顿大学毕业证学历学位证书原版一模一样学校原版美国波士顿大学毕业证学历学位证书原版一模一样
学校原版美国波士顿大学毕业证学历学位证书原版一模一样
171ticu
 
Null Bangalore | Pentesters Approach to AWS IAM
Null Bangalore | Pentesters Approach to AWS IAMNull Bangalore | Pentesters Approach to AWS IAM
Null Bangalore | Pentesters Approach to AWS IAM
Divyanshu
 
ITSM Integration with MuleSoft.pptx
ITSM  Integration with MuleSoft.pptxITSM  Integration with MuleSoft.pptx
ITSM Integration with MuleSoft.pptx
VANDANAMOHANGOUDA
 
Curve Fitting in Numerical Methods Regression
Curve Fitting in Numerical Methods RegressionCurve Fitting in Numerical Methods Regression
Curve Fitting in Numerical Methods Regression
Nada Hikmah
 

Recently uploaded (20)

Seminar on Distillation study-mafia.pptx
Seminar on Distillation study-mafia.pptxSeminar on Distillation study-mafia.pptx
Seminar on Distillation study-mafia.pptx
 
Mechanical Engineering on AAI Summer Training Report-003.pdf
Mechanical Engineering on AAI Summer Training Report-003.pdfMechanical Engineering on AAI Summer Training Report-003.pdf
Mechanical Engineering on AAI Summer Training Report-003.pdf
 
Data Driven Maintenance | UReason Webinar
Data Driven Maintenance | UReason WebinarData Driven Maintenance | UReason Webinar
Data Driven Maintenance | UReason Webinar
 
Software Engineering and Project Management - Introduction, Modeling Concepts...
Software Engineering and Project Management - Introduction, Modeling Concepts...Software Engineering and Project Management - Introduction, Modeling Concepts...
Software Engineering and Project Management - Introduction, Modeling Concepts...
 
Rainfall intensity duration frequency curve statistical analysis and modeling...
Rainfall intensity duration frequency curve statistical analysis and modeling...Rainfall intensity duration frequency curve statistical analysis and modeling...
Rainfall intensity duration frequency curve statistical analysis and modeling...
 
原版制作(Humboldt毕业证书)柏林大学毕业证学位证一模一样
原版制作(Humboldt毕业证书)柏林大学毕业证学位证一模一样原版制作(Humboldt毕业证书)柏林大学毕业证学位证一模一样
原版制作(Humboldt毕业证书)柏林大学毕业证学位证一模一样
 
spirit beverages ppt without graphics.pptx
spirit beverages ppt without graphics.pptxspirit beverages ppt without graphics.pptx
spirit beverages ppt without graphics.pptx
 
Welding Metallurgy Ferrous Materials.pdf
Welding Metallurgy Ferrous Materials.pdfWelding Metallurgy Ferrous Materials.pdf
Welding Metallurgy Ferrous Materials.pdf
 
Embedded machine learning-based road conditions and driving behavior monitoring
Embedded machine learning-based road conditions and driving behavior monitoringEmbedded machine learning-based road conditions and driving behavior monitoring
Embedded machine learning-based road conditions and driving behavior monitoring
 
Generative AI leverages algorithms to create various forms of content
Generative AI leverages algorithms to create various forms of contentGenerative AI leverages algorithms to create various forms of content
Generative AI leverages algorithms to create various forms of content
 
An improved modulation technique suitable for a three level flying capacitor ...
An improved modulation technique suitable for a three level flying capacitor ...An improved modulation technique suitable for a three level flying capacitor ...
An improved modulation technique suitable for a three level flying capacitor ...
 
LLM Fine Tuning with QLoRA Cassandra Lunch 4, presented by Anant
LLM Fine Tuning with QLoRA Cassandra Lunch 4, presented by AnantLLM Fine Tuning with QLoRA Cassandra Lunch 4, presented by Anant
LLM Fine Tuning with QLoRA Cassandra Lunch 4, presented by Anant
 
Properties Railway Sleepers and Test.pptx
Properties Railway Sleepers and Test.pptxProperties Railway Sleepers and Test.pptx
Properties Railway Sleepers and Test.pptx
 
Certificates - Mahmoud Mohamed Moursi Ahmed
Certificates - Mahmoud Mohamed Moursi AhmedCertificates - Mahmoud Mohamed Moursi Ahmed
Certificates - Mahmoud Mohamed Moursi Ahmed
 
Unit-III-ELECTROCHEMICAL STORAGE DEVICES.ppt
Unit-III-ELECTROCHEMICAL STORAGE DEVICES.pptUnit-III-ELECTROCHEMICAL STORAGE DEVICES.ppt
Unit-III-ELECTROCHEMICAL STORAGE DEVICES.ppt
 
Use PyCharm for remote debugging of WSL on a Windo cf5c162d672e4e58b4dde5d797...
Use PyCharm for remote debugging of WSL on a Windo cf5c162d672e4e58b4dde5d797...Use PyCharm for remote debugging of WSL on a Windo cf5c162d672e4e58b4dde5d797...
Use PyCharm for remote debugging of WSL on a Windo cf5c162d672e4e58b4dde5d797...
 
学校原版美国波士顿大学毕业证学历学位证书原版一模一样
学校原版美国波士顿大学毕业证学历学位证书原版一模一样学校原版美国波士顿大学毕业证学历学位证书原版一模一样
学校原版美国波士顿大学毕业证学历学位证书原版一模一样
 
Null Bangalore | Pentesters Approach to AWS IAM
Null Bangalore | Pentesters Approach to AWS IAMNull Bangalore | Pentesters Approach to AWS IAM
Null Bangalore | Pentesters Approach to AWS IAM
 
ITSM Integration with MuleSoft.pptx
ITSM  Integration with MuleSoft.pptxITSM  Integration with MuleSoft.pptx
ITSM Integration with MuleSoft.pptx
 
Curve Fitting in Numerical Methods Regression
Curve Fitting in Numerical Methods RegressionCurve Fitting in Numerical Methods Regression
Curve Fitting in Numerical Methods Regression
 

A vivacious approach to detect and prevent d do s attack

  • 1. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 __________________________________________________________________________________________ Volume: 02 Issue: 10 | Oct-2013, Available @ http://www.ijret.org 434 A VIVACIOUS APPROACH TO DETECT AND PREVENT DDoS ATTACK Kharat J.S.1 , Radhakrishna Naik2 1 Student ME (CSE), 2 Head, Computer Science and Engineering, MIT (E) Aurangabad, Maharashtra, India, kharat.jyo@gmail.com, naikradhakrishna@gmail.com Abstract A serious problem on the Internet nowadays is Distributed Denial of Service (DDoS) attacks and this is coordinated attack performed by hackers to immobilize a particular Computer service through manipulation of techniques those are used to provide the Services. In this attack, normally attackers generate a huge amount of requests to victims through compromised computers. DDoS attacks are a critical threat to the internet. Packet flooding DDoS attack is a very common way to attack a victim machine by sending large amount of unwanted traffic. This paper proposes a threshold based approach to detect and prevent the DDoS attack before reaching the victim end with high detection rate and low false positive rate to achieve high performance. The result obtained from various experiments on UDP Flood attack and HTTP GET attack show the effectiveness and the efficiency of our approach. Keywords: Denial of Service (DoS), Distributed Denial of Service (DDoS), Entropy, flooding attack. ---------------------------------------------------------------------***------------------------------------------------------------------------- 1. INTRODUCTION Internet Operators have been observed that DDoS attacks are increasing noticeably and individual attacks are more strong and complicated. Furthermore, the Arbor Worldwide Infrastructure Security Report highlighted important trends in distributed denial of service (DDoS) attacks. Several findings stand out, including the overall expansion of attack surface and the escalation of attack size and frequency [1].Distributed denial-of-service (DDoS) attacks consist of an overwhelming quantity of packets being sent from multiple attack sites to a victim site. These packets get there in such a high quantity that some key resource at the victim (bandwidth, buffers, CPU time to compute responses) is quickly exhausted. The victim cannot attend its real work due to spending so much time in handling the attack traffic. Thus legitimate clients are deprived of the victim’s service for as long as the attack lasts. The first large-scale appearance of distributed denial-of- service (DDoS) attacks occurred in mid-1999 and still researchers are struggling to devise an effective solution to the DDoS problem. There are many commercial and research defenses has been appeared, but none of them provide complete security from the threat. Rather, they detect a small range of attacks that either use malformed packets or create severe disturbances in the network; and they handle those attacks by non-selectively dropping a portion of the traffic destined for the victim[1]. This strategy relieves the victim from the high-volume attack, but also inflicts damage to legitimate traffic that is speciously dropped. 2. OVERVIEW OF DoS AND DDoS ATTACK 2.1 Denial of Service (Dos) Attacks The DoS attack generally consists of efforts to temporarily or indefinitely interrupt or suspend services of a host connected to the internet. The goal of a Denial of Service (DoS) attack is to interrupt some legitimate activity, such as browsing Web pages, email functionality or net banking. It could even shutdown the whole Web server. To obstruct legitimate operations is to exploit vulnerabilities on the target machine or application, by sending specially crafted requests targeting the given vulnerabilities. Denial-of-service effect is achieved by sending messages to the target machine such that the “message” hampers with its operation and makes it hang, crash, reboot, or do useless work. Also some key resources of the target machine such as bandwidth, CPU time, memory, etc can be consumed by sending a vast number of packets. One cannot attend to legitimate clients because the target application, machine, or network spends all of its critical resources on handling the attack traffic [2]. 2.2 Distributed Denial-Of-Service (DDoS) Attacks It is simply an extension of DoS attack. DoS and DDoS attack scenario is shown in Fig-2.Making a machine or network resources unavailable to its intended user-s is the DDoS attempt. It generally consist of the efforts of one or more people to temporarily or indefinitely interrupt or suspend services of a host connected to the internet. DDoS attacks are able to take out an entire server in a matter of minutes. To overwhelm a service to the point where it no longer works is the goal of any DDoS attack.
  • 2. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 __________________________________________________________________________________________ Volume: 02 Issue: 10 | Oct-2013, Available @ http://www.ijret.org 435 In a DDoS attack, the incoming traffic flooding the victim originates from many different sources potentially hundreds of thousands or more. To saturate a target computer or device with external communications requests, such that it cannot respond to other legitimate traffic, or responds so slowly[3] is the most common method of DDoS attack. In general terms, DDoS attacks are implemented by either forcing the targeted computers to reset, or to consume their resources so that they can no longer provide services, or obstructing the communication media between communicators so that they can no longer communicate. DoS Attack DDoS Attack Fig-1: DoS and DDoS Attack Scenario There are many types of DDoS attacks targeting both the network and the application layers. They could be classified upon their impact on the targeted computing resources (saturating bandwidth, consuming server’s resources, shattering an application) or upon the targeted resources as well: • Attacks targeting Network Resources: UDP Floods, ICMP Floods, IGMP Floods. • Attacks targeting Server Resources: the TCP/IP weaknesses –TCP SYN Floods, TCP RST attacks, TCP PSH+ACK attacks – but also Low and Slow attacks as Sock stress for example and SSL-based attacks, which detection is particularly challenging. • Attacks targeting the Application Resources: HTTP Floods, DNS Floods and other Low and Slow attacks as Slow HTTP GET requests (Slowloris) and Slow HTTP POST requests (R-U-Dead-Yet). • A DDoS attack usually comprises more than three attack vectors thus increasing the attacker’s chances to hit its target and escape basic DoS mitigation solutions[4]. In general there are two types of denial of service attacks: those that target the network layer and those that target the application layer. The server cannot simultaneously process other requests from other legitimate users, if an attacker overloads the server with many requests. Examples of DDoS attacks are discussed as follows: A. UDP Flood Attack UDP Flood attack is a network layer DDoS attack. UDP is a connectionless protocol and it does not require any connection setup procedure to transformation. To consume the bandwidth is the main purpose of UDP Flood type attack. In this attack, Attacker send IP packets containing UDP datagrams with the purpose of slowing down the victim to the point that the victim can no longer handle valid connections. B. HTTP GET Flood Attack HTTP GET flood attack is an Application layer DDoS Attack. In this, a large amount of legitimate requests(to an application)use to send by HTTP attacker. The feature of HTTP GET Flood attack is that it will establish a normal TCP Connection to Servers, and constantly submit a lot of calling requests which dramatically consume database resources. For sample, an Http Flood attack can make hundreds of thousands of page requests to a web server, which can wear out all of the servers processing capability. So that the server cannot handle the legitimate request [5] An HTTP GET flood is as exactly as it sounds: it’s a massive influx of legitimate HTTP GET requests that come from large numbers of users. These requests mimic legitimate users are nearly impossible for applications and even harder for traditional security to detect. This result of this attack is similar to the effect: server errors increasingly degraded the performance, and resource exhaustion. 3. RELATED WORK Distributed Denial-of-Service (DDoS) and Denial-of-Service (DoS) are the most dreadful network threats in recent years. Different techniques and challenges involved in anomaly detection system [6]. Yonghua You and Zulkernine[7]introduce two distance-based DDoS detection techniques: average distance estimation and distance-based traffic separation. They detect attacks by analyzing distance values and traffic rates. The distance information of a packet can be inferred from the Time-to-Live (TTL) value of the IP header. In the average distance estimation DDoS detection technique, the prediction of mean distance value is used to define normality. The prediction of traffic arrival rates from different distances is used in the distance-based traffic separation DDoS detection technique. The mean absolute deviation (MAD)-based deviation model provides the legal scope to separate the normality from the abnormality for both the techniques. The results of the proposed techniques show that the techniques can detect attacks effectively. Muhai and MingLi [8] propose a model for detecting DDoS attacks automatically. In order to reduce the error to identify attacks, we use discrete wavelet transform (DWT) technique. Attacking machine Target/Victim Machine Attack control Mechanism Zombie Zombie Zombie Target/Victim Network
  • 3. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 __________________________________________________________________________________________ Volume: 02 Issue: 10 | Oct-2013, Available @ http://www.ijret.org 436 Author use actual data to validate proposed model and obtain good results in terms of tradeoff between correct detections and false alarms. The test results shows the approach not only can be different the sudden increasing normal traffic from anomaly traffic, but also has a well detect ratio. Sumit Kar and Bibhudatta Sahoo[9]proposed method is based upon attack detection and recovery, and uses an entropy based anomaly detection system to detect DDoS attack. Author design an anomaly detection system based on entropy and entropy rate to detect DDoS attack. They uses normalized entropy which calculates the over all probability distribution in the captured flow in algorithm to get more accurate result. Detection System is based on by analyzing the change in entropy of distribution flow header feature and behavioral features traffic distributions. The Result shows that the attack must be detected and blocked before reaching the victim with high detection rate and low false alarm rate. Suratose Tritilanunt et al. [10] provide a detection mechanism based on a technique of entropy-based input-output traffic mode detection scheme. The experimental results demonstrate that our approach is able to detect several kinds of denial-of- service attacks, even small spike of such attacks. To minimize this false positive, we introduce a technique called entropy- based input-output traffic mode detection scheme. By combining packet content observation for identifying DoS and DDoS attacks in the system, this will help approach not only to increase the accuracy for detecting DoS attacks, but also to effectively discriminate legitimate users from suspicious traffic. Yi Zhang and Qiang Liu[11] present a real-time DDoS attack detection and prevention system which can be deployed at the leaf router to monitor and detect DDoS attacks. The advantages of this system lie in its statelessness and low computation overhead, which makes the system itself immune to flooding attacks. A number of articles suggested entropy as a metrics to summarizing trafficdistribution for anomaly detection[12][13]. The authors of [9] use entropy rate to discriminate the DDoS attack from legitimate traffic. The use of entropy for analyze changes in traffic distribution has two benefit. i) Using entropy for anomaly detection increases the detection capability than volume based methods. ii) It provides additional information to classify among different types anomaly (worms, DoS attack. Port scanning) .We considers two classes of distribution i) flow header features (IP address, ports, and flow sizes) ii) behavioral features (the number of distinct destination / source address that a host communicates with) [14]. The anomaly detection system discussed in this paper is based on by analyzing the change in entropy of above two traffic distributions. Our objective in this paper is to design an attack detection system based on entropy and packet rate to detect DDoS attack. We use normalized entropy which calculates the over all probability distribution in the captured flow in our algorithm to get more accurate result. 4. PROPOSED ENTROPY BASED DETECTION TECHNIQUE Shannon’s Entropy [15] based approach is used for DDoS attack detection. entropy is a measure of the uncertainty in a random variable or in this case data coming over the network. The Shannon’s function is a useful tool for inspecting a similarity and distribution of traffic in the inspection time frame. When denial-of-service attacks occur in the observation window, the entropy of that traffic will drop noticeably and wecan identify that situation as DoS/DDoS attacks. The value of sample entropy lies in range [0, logn]. The entropy shows its minimum value 0 when all the items (IP address or port) are same and its maximum value logn when all the items are different. The entropy of a random variable X with possible values {x , x … … . . x } can be calculated as H x = − ∑ P x logP x (1) In our proposed DDoS detection algorithm we use entropy as a principal matrix. We use change of entropy of traffic distributions (IP address, port) for DDoS detection. If we are interested in measuring the entropy of packets over unique source or destination address then maximum value of n is 2 for ipv4address [9]. If we want to calculate entropy over various applications port then n is the maximum number of ports. Here p x where x ∈ X is the probability that X takes the value x . Suppose we randomly observe X for a fixed time window w, thenP x = m m⁄ , where m is the frequency or number of times we observe X taking the value x i.e. m = ∑ m H X = − ∑ m /m log m /m (2) If we want calculate probability of any source MAC address then, mi = number of packets with xi as source MAC address and m = total number of packets P x = Number of Packets with x as source Total number of packets Here total number of packets is the number of packets seen for a time window T. Normalized entropy calculates the over all probability distribution in the captured flow for the time window T. Normalized entropy = H log n5⁄ (3)
  • 4. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 __________________________________________________________________________________________ Volume: 02 Issue: 10 | Oct-2013, Available @ http://www.ijret.org 437 Where n5 is the number of distinct x values in the given time window. In a DDoS attack from the captured traffic in time window T, the attack flow dominates the whole traffic, as a result the normalized entropy of the traffic decreased in a detectable manner. But it is also possible in a case of massive legitimate network accessing. To confirm the attack we have to again calculate the packet rate P67 of suspected flow. Here flow is packages which share the same destination address/port. In this mechanism we have taken one assumption that the attacker uses same function to generate attack packets at “zombies”. P67 x Total No. of packets coming from same MAC address T; Total number of packets T 4 The steps in our proposed DDoS detection algorithm are described below. Algorithm 1 : DDoS Detection Algorithm 1: Collect sample flows for a time window T on the edge routers. 2:Calculate router entropy H X ∑ P x log P x 3: Calculate NE H log n5⁄ where, NE = normalized router entropy. 4: If NE > ?@ABC@DEF δ , identify the suspected attack flow. 5: Calculate the packet rate P67 x HI H of the suspected flow inthat router 6:If P67 x J threshold δ , it is a DDoS attack. Else legitimate traffics. 7: Generate alarm and Discard the attack flow. 5. EXPERIMENT AND RESULT Section 5 provides the experiment and results of our approach to detect distributed denial-of-service attacks. The system can detect the attack by using an entropy detection method because the value drops significantly from the stored profile once the DoS/DDoS attacks occur in the system. We observe that most DoS attacks immediately decrease the entropy of the overall system. A prototype of the proposed system has been implemented and evaluated on an real base system. Experimental Setup: Fig-2 shows the experimental setup. experiment includes 3 source, 1 intermediate routers and 1 destination node. Out of which 3 source nodes 2 nodes are legitimate users and 1 node is attacker. The bandwidth of legitimate traffic is set constant. Fig-2: Experimental setup The goal of our experiments is to assess the scalability of our approach and the performance of the protection system. 5.1 UDP Attack: UDP is a bandwidth depletion attack. Attacker consumes the network bandwidth with unwanted UDP traffic so that legitimate user cannot send packets to destination.We traced no of packets received in every 1 second interval. Performance metrics used is Network Utilization. Experiment 1: UDP attack with 2 legitimate user and 1 attacker: Suppose node A3 is the attack source and node A1 and A2 are legitimate users and node D is the victim. All the three users sending packets to specified destination Experiment lasts at 6 second. We traced number of packets received in a fixed time window T.Table-1 shows the traced data in 6 seconds. The router entropy is calculated according to Eq. (2), and the normalized router entropy is being calculated using Eq. (3). Table-2 shows the normalized entropy calculation for experiments. Table 1: Traced data Times in Second Number of attack packets received Number of legitimate packets received 0-1 80 63 1-2 80 65 2-3 699 150 3-4 766 125 4-5 700 100 5-6 615 80 Table-2: Normalized entropy calculations Time in Second Normalized Router Entropy 0-1 0.98 1-2 0.99 2-3 0.535 3-4 0.45 4-5 0.51 5-6 0.76
  • 5. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 __________________________________________________________________________________________ Volume: 02 Issue: 10 | Oct-2013, Available @ http://www.ijret.org 438 Captured flow for every source is shown in Table-3 when NE=0.535. Table-3: Traced Data when NE=0.535(UDP attack) Source Node with MAC address Destination IP No. of pac kets entropy 38-60-77-50- b0-92 192.168.0.45 70 0.29 00-1c-c0-83-b7- f8 192.168.0.45 80 0.32 70-71-BC-BE- 11-9B 192.168.0.45 699 0.23 Here router entropy = 0.29+0.32+0.23= 0.84 n5 3 Normalized router entropy NE = 0.84/ log2 3 = 0.535 The above data are taken practically for Edge Router. In the above case one flow dominates the whole traffic as a result the normalized entropy decreases. If the threshold δ is perfect, suppose 0.94 for the above example, it will treat flow coming from node A with MAC (70-71-BC-BE-11-9B) as suspected flow. After which the packet rate is being calculated for every suspected flow. While the packet rates of different flows exceed the thresholdδ i.e.150 packets/second, the attack is confirmed and attack flow is discarded. All the above calculations are based on log . We consider 2 situations in our experiment to evaluate the performance of our proposed algorithm. In the first situation, we start with 2 legitimate users and 1 attacker and study how the system performance is being degraded. In the second situation we examine the system for 2 legitimate users and two attackers. The graph in Fig-3 depicts the effect of DDoS attack with 2 legitimate users and 1 attacker. It shows numbers of attack packets as well as legitimate packets with respect totime. The graph in Figure 4 shows the network utilization of 3senders with 1 attacker. It shows number of packets/second with respect to network utilization. Fig-3: Effect of UDP attack Fig-4: Threesenders with 1 attacker The graph in Fig-4 shows the Network utilization of 4 senders with 2 attackers. It shows the packet rate with respect to network utilization. Fig-5: Foursenders with 2 attackers 0 100 200 300 400 500 600 700 800 900 1 2 3 4 5 6 Legitimate traffic Attack traffic Time in Seconds PacketCount 0 10 20 30 40 50 60 50 100 150 200 250 Network Utilization Packet rate NetworkUtilizationin% 0 10 20 30 40 50 60 50 100 150 200 250 Network Utilization Packet rate N/WUtilizationin%
  • 6. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 __________________________________________________________________________________________ Volume: 02 Issue: 10 | Oct-2013, Available @ http://www.ijret.org 439 5.2 HTTP GET Flood Attack We traced no of HTTP GET request received in every 1 second interval.We have taken two examples using Fig. 2 how the detection scheme works. Suppose node A1 is the attack source and node A2and A3 are legitimate users and node D1 is the victim. Based on the DDoS detection algorithm flows coming from all the client nodes will first captured by router 1 Suppose at router 1, we have captured flows as given in Fig-6 which shows the legitimate traffic as well as attack traffic with respect to time in a fixed time window T. The router entropy is calculated according to Eq. (2) and the normalized router entropy is being calculated using Eq. (3).Table-4 shows the Normalized entropy calculations and Table-5 shows the traced data when NE=0.81 Table-4: Normalized entropy calculation Times in Second Normalized Router Entropy 0-1 0.71 1-2 0.86 2-3 0.63 3-4 0.67 4-5 0.81 Table-5 Traced Data when NE=0.81 Source Node with MAC address Destination IP No.of request entropy 38-60-77-50- b0-92 192.168.0.45 217 0.41 00-1c-c0-83- b7-f8 192.168.0.45 74 0.47 70-71-BC- BE-11-9B 192.168.0.45 49 0.40 Here router entropy = 0.41+0.47+0.40= 1.28 and n5 3 Normalized router entropy NE 0.84 log 3⁄ 0.811 The above data are taken practically for Router1. In the above case one flow dominates the whole traffic as a result the normalized entropy decreases. If the threshold is perfect, suppose 0.94 for the above example, it will treat flow coming from node A3 with MAC(70-71-BC-BE-11-9B) as suspected flow. After which the packet rate is being calculated for every suspected flow. While the packet rates of different flows exceed the threshold δ i.e. 150 p/s, the attack is confirmed and attack flow is discarded. Fig-6: Traced data The graph in Fig-7 shows the Heap utilization of 3 senders with 1 attacker. It shows packet rate with respect to Heap Memory utilization in %.The graph in Fig-8 shows the Heap utilization of 4 senders with 2attacker. It shows packet rate with respect to Heap Memory utilization. Fig-7: three senders with 1 attacker Fig-8: four senders with 2 attackers 0 50 100 150 200 250 1 2 3 4 5 Legitimate packets Attack packets Time in Seconds PacketCount 0 10 20 30 40 50 60 50 100 150 200 250 Heap Memory Utilization Packet rate HeapMemoryin% 0 10 20 30 40 50 60 70 80 50 100 150 200 250 Heap Memory Utilization Packet rate HeapMemoryin
  • 7. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 __________________________________________________________________________________________ Volume: 02 Issue: 10 | Oct-2013, Available @ http://www.ijret.org 440 CONCLUSIONS In this paper we discussed different types of DDoS attacks that could exploit network and related detection strategies and introduces an alternative technique to detect denial-of-service and distributed denial-of-service attacks by using packet rates and packet address entropy-based technique. As we will take the detection threshold δ as0.94 then, the proposed anomaly detection system can detect DDoS attack traffics with high detection rate and without any false positive before reaching the victim and taking threshold δ as 150 p/s then, proposed system can achieve the efficient use of Network utilization in case of UDP attack and Heap Memory utilization in case of HTTP Get flood attack. we plan to test our approach with other kinds of DoS/DDoS attacks in the future work. REFERENCES [1]. http://blogs.ixiacom.com/ixia-blog/application-layer- ddos-attacks-growing. [2]. http://www.linuxforu.com/2011/04/securing-apache- part-8-dos-ddos-attacks. [3]. http://en.wikipedia.org/wiki/Denial-of-service_attack. [4]. http://security.radware.com/knowledge- center/DDoSPedia/ddos-attack/ [5]. Saman Taghavi Zargar, James Joshi, David Tipper,” Survey of Defense Mechanisms Against Distributed Denial of Service (DDoS) Flooding Attacks”,ieee communications surveys & tutorials 2009. [6]. P. G. Teodoro, J. D.Verdejo, G. M.Fernandez, E.Vazquez, “Anomaly-based network intrusion detection: Techniques, systems and challenges”, computer & security, Volume 28, Issues 1-2, pp.18-28, 2008. [7]. Yonghua You and Zulkernine,”A Distributed Defense Framework for Flooding-Based DDoS Attacks”, ICC Proceeding, 2007 [8]. Muhai Li and Ming Li,” A New Approach for Detecting DDoS Attacks Based on Wavelet Analysis”,ieeeconference, 2009. [9]. Sumit Kar and Bibhudatta Sahoo,” An Anomaly Detection System for DDoS Attack”,ijca-se 2009. [10]. Suratose Tritilanunt et al,” Entropy-based Input-Output Traffic Mode Detection Scheme for DoS/DDoS Attacks”,2010 . [11]. Yi Zhang and Qiang Liu,” A Real-Time DDoS Attack Detection and Prevention System Based on per-ITraffic Behavioral Analysis”,2010. [12]. Suratose Tritilanunt, SuphanneeSivakorn, ChoochernJuengjincharoen, AusaneeSiripornpisan,” Entropy-based Input-Output Traffic Mode Detection Scheme for DoS/DDoS Attacks”, ISCIT 2010 [13]. Wonjun Lee and Squicciarini,”Detection and Protection against Distributed Denial of Service Attacks in Accountable Grid Computing Systems”,IEEEJournel 2011. [14]. G. Nychis, V. Sekar, D. G Andersen, H. Kim and H.Zhang, “An Empirical Evaluation of Entropy-Based Traffic Anomaly Detection”. Tech. Rep. CMU-CS-08- 145, Computer Science Department, Carnegie Mellon University, 2008 [15]. Thomas M. Cover and Joy A. Thomas, “Elements of Information Theory”, second edition, 2007 BIOGRAPHIES Ms. Kharat J.S. obtained her Bachelor’s Degree in Computer Science from BAMU University during 2008 and currently pursuing Masters Degree from the same university. She is working in Computer Dept. of Shreeyash Polytechnic Aurangabad as Lecturer from last 5 years. Her research area includes Network Security. Dr. Radhakrishna Naik is working as professor and Head in CSE Department of MIT (E) Aurangabad. He did his PhD in Real Time Systems and his subjects of interest are Real Time systems, Real Time database management and Network security.