Assuage Bandwidth Utilization DDoS Attacks by Using Prototype Analyzer and Transfer Scheduling Scheme

Denial-of-Service (DoS) attacks occur when the attacks are from a single source, whereas Distributed Denial-of-Service (DDoS) attacks occur when many compromised systems flood the resources or bandwidth of a target system. Although the authors cannot alleviate the Denial-of-Service or Distributed Denial-of-Service attacks entirely, they can limit the attacks by controlling the transfer flow. In this paper, they propose a prototype analyzer and transfer scheduler scheme that analyzes the transfer prototype to distinguish the legitimate transfer with that of attack transfer and effectively schedule the transfer for better bandwidth usage, providing Quality-of-Service (QoS) for the legitimate user.

Provided by: IOSR Journal of Engineering Topic: Security Date Added: Aug 2012 Format: PDF

Find By Topic