Security

Comparison of DDOS Attacks and Fast ICA Algorithms on the Basis of Time Complexity

Free registration required

Executive Summary

In Distributed Denial Of Service (DDOS) attack, an attacker may use the user computer to attack another computer by taking security weakness an attacker could take control of their computer. They could then force the computer to send huge amounts of data to a website or send spam particular email address. The "Attack" is distributed because the attacker is using multiple computers including the user to enter the denial of service attack. DDoS attack is a continuous critical threat to the Internet. Derived from the low layers, new application layer-based DDoS attacks utilizing legitimate HTTP requests to overwhelm victim resources are more undetectable. The case may be more serious when such attacks mimic or occur during the flash crowd event of a popular Website.

  • Format: PDF
  • Size: 323.8 KB