Download Now Free registration required
Denial-of-Service (DoS) attacks occur when the attacks are from a single source, whereas Distributed Denial-of-Service (DDoS) attacks occur when many compromised systems flood the resources or bandwidth of a target system. Although the authors cannot alleviate the Denial-of-Service or Distributed Denial-of-Service attacks entirely, they can limit the attacks by controlling the transfer flow. In this paper, they propose a prototype analyzer and transfer scheduler scheme that analyzes the transfer prototype to distinguish the legitimate transfer with that of attack transfer and effectively schedule the transfer for better bandwidth usage, providing Quality-of-Service (QoS) for the legitimate user.
- Format: PDF
- Size: 257.8 KB