Security

DDoS Traffic Verification Algorithm for Legitimate Clients Identification in Distributed Denial of Service (DDoS) Attacks

Download Now Free registration required

Executive Summary

Distributed Denial of Service (DDoS) attacks have become a major threat to the stability of the internet and there is no satisfactory solution yet. These attacks are familiar threats to internet users for more than 10 years. Such attacks are carried out by a "Bot-net", an army of zombie hosts spread around the internet, that overwhelm the bandwidth toward their victim web server, by sending traffic upon command. This paper introduces traffic verification algorithm is especially designed to protect the victim server from the harm attacks and legitimate clients are identified in an effective manner. The legitimate clients are maintained in a separate list called "Whitelist" and it will be refreshed frequently. So the attacker can't spoof the legitimate client addresses.

  • Format: PDF
  • Size: 437.86 KB