首页    期刊浏览 2024年09月21日 星期六
登录注册

文章基本信息

  • 标题:Estimating the Exposure of Network Mechanisms to High-Tech DDoS Attacks
  • 本地全文:下载
  • 作者:S.Vasanthi ; R.Ravi ; Beulah Shekhar
  • 期刊名称:International Journal of Advanced Research in Computer Engineering & Technology (IJARCET)
  • 印刷版ISSN:2278-1323
  • 出版年度:2014
  • 卷号:3
  • 期号:3
  • 页码:683-686
  • 出版社:Shri Pannalal Research Institute of Technolgy
  • 摘要:The DDoS Attack are launched by malicious nodes, whose only motive is to degrade the performance of other users. To secure and improve the performance. The proposed scheme of anomaly detection to sense the cruel node in the system. In this proposal the training data of received signal strength are rationalized occasionally. The training data includes the convey of control packets in the system. The packet contains the information about the neighbor nodes in the system. The cruel node can be recognized with the help of the received signal strength of the training data and the information is sent to the base station concerning the occurrence of a cruel node in the system. The training data also includes the ridge expanse in the system. We use RSSI algorithm. There are several nodes are created, in that one node acts as base station. The communication and data transmission between the base station and other neighbor nodes are done by using topology discovery, In general DDoS attacks refers to many distributed attacks. The base station receiver many nodes and it analyzes the signal strength of each node by using RSSI, with the help of RSSI indication of the signal strength the base station will list the node which has low signal strength as malicious node and detect it for future use.
  • 关键词:Received Signal Strength Indicator (RSSI); ; Distributed Denial of Service (DDoS); Topology Discovery.
国家哲学社会科学文献中心版权所有