Anomaly Detection Based on Access Behavior and Document Rank Algorithm

Distributed Denial of Service (DDoS) attack is ongoing dangerous threat to the Internet. Commonly, DDoS attacks are carried out at the network layer, e.g., SYN flooding, ICMP flooding and UDP flooding, which are called DDoS attacks. The intention of these DDoS attacks is to utilize the network bandwidth and deny service to authorize users of the victim systems. Obtain from the low layers, new application-layer-based DDoS attacks utilizing authorize HTTP requests to overload victim resources are more undetectable. When these are taking place during crowd events of any popular website, this is the case is very serious.

Provided by: IJCTT-International Journal of Computer Trends and Technology Topic: Security Date Added: Dec 2013 Format: PDF

Find By Topic