Estimating the Exposure of Network Mechanisms to High-Tech DDoS Attacks

Provided by: International Journal of Advanced Research in Computer Engineering & Technology
Topic: Security
Format: PDF
The DDoS attack is launched by malicious nodes, whose only motive is to degrade the performance of other users. To secure and improve the performance, they proposed scheme of anomaly detection to sense the cruel node in the system. In this proposal the training data of received signal strength are rationalized occasionally. The training data includes convey of control packets in the system. The packet contains the information about the neighbor nodes in the system.

Find By Topic