Beruflich Dokumente
Kultur Dokumente
DDoS Attack
Prof. Minal P.Nerkar, Mayur Hiwarkar, Kunal Parkar, Rutuja Butle, Sukirti Singh
nerkar.minal@gmail.com, hiwarkarmayur9@gmail.com, kunal.parkar886@gmail.com, butlerutuja@gmail.com,
sukirtisingh18@gmail.com
Computer Department AISSMS IOIT,
Pune.
3.3 Classification
4. Test Cases
5.Architecture Diagram
This figure shows the rough idea of how our proposed system
works. Our system will continuously monitor the IP's which
are requesting for a service. Based on the threshold value the
IP's will be segregated into 2 parts. The IP count which is less
than the threshold will be treated as genuine while the IP
count which is greater than the threshold will be updated in
the IP table and blocked on run time.
7. REFERENCES
[1] Preeti Daffu, Amanpreet Kaur, "Mitigation of DDoS
attacks in Cloud Computing," 5th International
Conference on Wireless Networks and Embedded
Systems (WECON), pp. 01-05, 2016.
[3] Jin Tang, Yong Hao, Wei Song, "SIP Flooding Attack
Detection with a Multi-Dimensional Sketch Design,"
IEEE Transactions on Dependable and Secure
Computing, Vol.11, Issue 6, pp. 582-595, 2013.