Risk Mitigation of Denial of Service Attack

Download Now
Provided by: International Journal of Engineering and Advanced Technology (IJEAT)
Topic: Security
Format: PDF
In this paper, the author proposes to mitigate the risk of denial of service attack. This involves identification of genuine traffic and giving it a higher priority. This results in lower priority for suspected malicious traffic. The priority of threads below the specified threshold will be discarded. Spoofed Denial of Service (DoS) attacks have also been taken care of thereby providing maximum security to the system by the attacker. The attacker suffers from a reduced priority of service. The reduced priority means greater response time for service request. The attacker might find his attack to be effective whereas the system might still be handling the request of genuine traffic.
Download Now

Find By Topic