期刊名称:International Journal of Engineering and Computer Science
印刷版ISSN:2319-7242
出版年度:2013
卷号:2
期号:9
页码:2810-2813
出版社:IJECS
摘要:Flash crowd are unexpected, when the attackers is to simulate the traffic patterns of flash troops to fly below theradar. In such a case, use similarity based detection method analyzes of network packets that share the same designation addressas one network flow. The network packets are clustered and the flows of network packets are analyzed, the information of flow ofpackets are stored in a database. The network packets are transmitting from the source to designation is through router. In router,authentications may be analyzed when the network packets are authenticated. If this is a chance of anonymous networks packetswhile enters into the router, the alarm is fixed and intimate to the router not to allow the packets within it. Majorly the flashcrowds’ attacks are leads to the distributed denial of services attacks. DDos bout flow can be distinguished from ostentatiouscrowds by the flow correlation coefficient at edge router, the length of the sampled flow is satisfactorilyhuge and the DDosboutforte is satisfactorily strong. This algorithm examines the router value based on method Similarity based detection methodstored in the database. The research work includes the concepts of flash crowd, router value and analyzes the information basedon router value.