Most Read Research Articles


Warning: Creating default object from empty value in /var/www/html/sandbox.ijcaonline.org/public_html/modules/mod_mostread/helper.php on line 79

Warning: Creating default object from empty value in /var/www/html/sandbox.ijcaonline.org/public_html/modules/mod_mostread/helper.php on line 79

Warning: Creating default object from empty value in /var/www/html/sandbox.ijcaonline.org/public_html/modules/mod_mostread/helper.php on line 79

Warning: Creating default object from empty value in /var/www/html/sandbox.ijcaonline.org/public_html/modules/mod_mostread/helper.php on line 79

Warning: Creating default object from empty value in /var/www/html/sandbox.ijcaonline.org/public_html/modules/mod_mostread/helper.php on line 79
Call for Paper - May 2015 Edition
IJCA solicits original research papers for the May 2015 Edition. Last date of manuscript submission is April 20, 2015. Read More

A Secure Lightweight Algorithm for Protecting Network from DoS Attack

Print
PDF
International Journal of Computer Applications
© 2014 by IJCA Journal
Volume 104 - Number 7
Year of Publication: 2014
Authors:
Meenakshi Choudhary
Sanjay Kumar Sharma
10.5120/18217-9244

Meenakshi Choudhary and Sanjay Kumar Sharma. Article: A Secure Lightweight Algorithm for Protecting Network from DoS Attack. International Journal of Computer Applications 104(7):39-44, October 2014. Full text available. BibTeX

@article{key:article,
	author = {Meenakshi Choudhary and Sanjay Kumar Sharma},
	title = {Article: A Secure Lightweight Algorithm for Protecting Network from DoS Attack},
	journal = {International Journal of Computer Applications},
	year = {2014},
	volume = {104},
	number = {7},
	pages = {39-44},
	month = {October},
	note = {Full text available}
}

Abstract

Protecting private networks from various attacks is the primary goal of Network managers of a company or office. The attack can be launched either from an insider or outsider. Among these attacks, Denial of service (DoS) attack is most important and has been attracting the interest of researchers. We are providing a lightweight Intrusion Detection and prevention system based on simple modified algorithm which protects the private networks from various DoS attacks. We have used a proper synchronization of IDS and Firewall for intrusion detection and blocking. We have implemented the system as a software application and also analyzed result and performance of the system.

References

  • Kiran Dhangar, Prof. Deepak Kulhare Arif Khan Intrusion Detection System (A Layered Based Approach for Finding Attacks) International Journal of Advanced Research in Computer Science and Software Engineering Volume 3, Issue 5, May 2013 ISSN: 2277 128X.
  • Karim Al-Saedi Selvakumar Manickam Sureswaran Ramadass, Wafaa Al-Salihy Ammar ALmomani Journal of Computer Science, 9 (4): 421-426, 2013 ISSN 1549-3636 2013.
  • K. Santhi, "A Defense Mechanism to Protect Cloud Comuputing Against Distributed Denial of Service Attacks", International Journal of Advanced Research in Computer Science and Software Engineering Volume 3, Issue 5, May 2013 ISSN: 2277 128X.
  • Roshani Gaidhane, Prof. C. Vaidya, Dr. M. Ranghuswami, "Survey: Learning Techniques for Intrusion Detection System (IDS) International Journal of Advance Foundation and Research in Computer (IJAFRC) Volume 1, Issue 2, Feb 2014. ISSN 2348 – 4853.
  • Munish Sharma and Anuradha "Network Intrusion Detection System for Denial of Service Attack based on Misuse Detection. " IJCEM International Journal of Computational Engineering & Management, Vol. 12, April 2011 ISSN (Online): 2230-7893.
  • Saman Taghavi Zargar, James Joshi and David Tipper A Survey of Defense Mechanisms Against Distributed Denial of Service (DDoS) Flooding Attacks Feb. 2013.
  • Nilotpal Chakraborty, "Intrusion Detection System and Intrusion Prevention System: A Comparative Study" International Journal of Computing and Business Research (IJCBR) ISSN (Online) : 2229-6166 Volume 4 Issue 2 May 2013.
  • Dong Lin Network Intrusion Detection and Mitigation against Denial of Service Attack April 15, 2013.
  • Suchita Patil, Dr. B. B. Meshram, "Network Intrusion Detection and Prevention techniques for DoS attacks", International Journal of Scientific and Research Publicat ions, Volume 2, Issue 7, July 2012 ISSN 2250-3153.
  • Ms. Parag K. Shelke, Ms. Sneha Sontakke, Dr. A. D. Gawande Intrusion Detection System for Cloud Computing International Journal of Scientific & Technology Research Volume 1, Issue 4, May 2012 ISSN 2277-8616.
  • T. Gil and M. Poletto. MULTOPS: a data-structure for bandwidth attack detection. 2001.
  • Amirreza Zarrabi, Alireza Zarrabi Internet Intrusion Detection System Service in a Cloud IJCSI International Journal of Computer Science Issues, Vol. 9, Issue 5, No 2, September 2012 ISSN (Online): 1694-0814.
  • Amrita Anand Brajesh Patel "An Overview on Intrusion Detection System and Types of Attacks It Can Detect Considering Different Protocols", International Journal of Advanced Research in Computer Science and Software EngineeringVolume 2, Issue 8, August 2012 ISSN: 2277 128X.
  • Monowar H. Bhuyan H. J. Kashyap D. K. Bhattacharyya J. K. Kalita Detecting Distributed Denial of Service Attacks: Methods, Tools and Future Directions December 2012.
  • Qijun Gu, Peng Liu Denial of Service Attacks 2007.