International Journal of Engineering and Advanced Technology (IJEAT)
In this paper, the author proposes to mitigate the risk of denial of service attack. This involves identification of genuine traffic and giving it a higher priority. This results in lower priority for suspected malicious traffic. The priority of threads below the specified threshold will be discarded. Spoofed Denial of Service (DoS) attacks have also been taken care of thereby providing maximum security to the system by the attacker. The attacker suffers from a reduced priority of service. The reduced priority means greater response time for service request. The attacker might find his attack to be effective whereas the system might still be handling the request of genuine traffic.