Beruflich Dokumente
Kultur Dokumente
131
Dev Gupta
Dept. of Computer Science
Galgotias College Of Engineering
And Technology
Greater Noida,India
Ayushi Chaudhary
Dept. Computer Science
Galgotias College Of Engineering
And Technology
GreaterNoida,India
II.
LITERATURE SURVEY
www.ijaert.org
132
B. Security
III.
IV.
CPU
Bandwidth
Disk space
Sometimes, a less obvious resource is targeted. Many
applications have fixed length internal structures and if
www.ijaert.org
133
Network attacks
Self-inflicted attacks
Traffic spikes
Local attacks
V.
ATTACK
MEMORY
ON
VIRTUAL
www.ijaert.org
134
VI.
PERFORMANCE EVALUATION
VII.
FUTURE SCOPE
VIII.
CONCLUSION
www.ijaert.org
135
10.
11.
REFERENCES
1. Intelligent
Information
Technology
Application, 2009. IITA 2009 ,Third
International Symposium on (Volume:1 ) in
IEEE system journel- Research on dos attack
and
detection
programming
Wentao
Liu ; Dept. of Comput. & Inf. Eng., Wuhan
Polytech. Univ., Wuhan, China.
2. IEEE SYSTEMS JOURNAL, VOL. 7, NO. 2,
JUNE 2013 335 Performance of Virtual
Machines Under Networked Denial of Service
Attacks: Experiments and Analysis Ryan Shea,
Student Member, IEEE, and Jiangchuan Liu,
Senior Member, IEEE.
3. Md. Abu Kausar and V. S. Dhaka ,Dept. of
Computer & System Sciences, Jaipur National
University, Jaipur, and Sanjeev Kumar Singh
,Dept. of Mathematics, Galgotias University,
Gr. Noida, India , Web Crawler Based on
Mobile
Agent and Java
Aglets ,I.J.
Information Technology and Computer
Science, 2013, 10, 85-91 Published Online
September 2013 in MECS (http://www.mecspress.org/) DOI: 10.5815/ijitcs.2013.10.09)
4. Ichiro Satoh Mobile Agents .2010
International Journal of Computer Applications
(0975 - 8887) Volume 1 No. 15 5 Security
on
Mobile
Agent
Based
Crawler
(SMABC):Nisha Pahal ,Y.M.C.A. Institute of
Engineering, Faridabad ,Sunil Kumar Lingayas
University, Faridabad and Ashu Bhardwaj
Y.M.C.A. Institute of Engineering, Faridabad
5. http://stackoverflow.com/questions/8000577/act
ual-memory-allocation-by-jvm-and-how-dothey-differ
6. Understanding the Impact of Denial of
Service Attacks on Virtual Machines Ryan
Shea
,Simon Fraser University ,Burnaby,
Canada and Jiangchuan Liu ,Simon Fraser
University ,Burnaby, Canada.
7. Denial of Service Attacks by Qijun Gu, PhD.
Assistant Professor Department of Computer
Science Texas State University and San Marcos
, TX, 78666 Peng Liu, PhD. Associate
Professor School of Information Sciences and
Technology Pennsylvania State University.
8. R. Nicole, Title of paper with only first word
capitalized, J. Name Stand. Abbrev., in press.
9. Y. Yorozu, M. Hirano, K. Oka, and Y. Tagawa,
Electron spectroscopy studies on magneto-
www.ijaert.org
12.
13.
14.
15.
16.
17.
18.
19.
20.
21.
22.