Detection of Denial of Service Attack on Data Network Using IP Traceback with Entropy Variation
DoS attacks, IP trace back, hop count, pheromone intensity, flow level
In internet data packets are typically routed through different networks until it gets to reach its destination. In the present state of affairs maximum numbers of day to day activities are performed through online using internet. As the easy accessibility of internet anybody share any information to anyone without any prerequisite. The design architecture of internet do not performs any security verification of the originality of each data packets. The lack of such verification opens the door for a variety of network security vulnerabilities like denial-of-service (DoS) attacks, man-in-the-middle attacks etc. One of the major threats to the Internet is DoS attack which is characterized by an explicit attempt by attackers to prevent legitimate users of a service from using that service include attempts to flood a network, thereby preventing legitimate network traffic .It attempts to disrupt connections between two machines, thereby preventing access to a service either to prevent a particular individual from accessing a service or to disrupt service to a specific system. A number of detection techniques are proposed by the research community to detect the origin of the attack. This article proposed a traceback based technique is used to identify the attack origin.
Article Details
Unique Paper ID: 147057

Publication Volume & Issue: Volume 1, Issue 12

Page(s): 1688 - 1692
Article Preview & Download

Share This Article

Join our RMS

Conference Alert

NCSEM 2024

National Conference on Sustainable Engineering and Management - 2024

Last Date: 15th March 2024

Call For Paper

Volume 10 Issue 10

Last Date for paper submitting for March Issue is 25 June 2024

About Us enables door in research by providing high quality research articles in open access market.

Send us any query related to your research on

Social Media

Google Verified Reviews