SVM Approach with CTNT to Detect DDoS Attacks in Grid Computing

Author(s):  
Jungtaek Seo ◽  
Cheolho Lee ◽  
Taeshik Shon ◽  
Jongsub Moon
Keyword(s):  
Author(s):  
Kai Hwang ◽  
Yu-Kwong Kwok ◽  
Shanshan Song ◽  
Min Cai Yu Chen ◽  
Ying Chen ◽  
...  

2011 ◽  
Vol 3 (3) ◽  
pp. 54-56
Author(s):  
Prof. Milan Kantilal Vachhani ◽  
◽  
Dr. Kishor H Atkotiya

2012 ◽  
Vol 2 (3) ◽  
pp. 137-138
Author(s):  
S. Murali S. Murali ◽  
◽  
C. B. Selvalakshmi C. B. Selvalakshmi ◽  
S. Padmadevi S. Padmadevi ◽  
P. N. Karthikayan P. N. Karthikayan
Keyword(s):  

Author(s):  
Priyanshu Srivastava ◽  
Rizwan Khan

Today is the era of Cloud Computing Technology in IT Industries. Cloud computing which is based on Internet has the most powerful architecture of computation. It reckons in of a compilation of integrated and networked hardware, software and internet infrastructure. It has various avails atop grid computing and other computing. In this paper, I have given a brief of evaluation of cloud computing by reviewing more than 30 articles on cloud computing. The outcome of this review signalizes the face of the IT industries before and after the cloud computing.


Author(s):  
Amit Sharma

Distributed Denial of Service attacks are significant dangers these days over web applications and web administrations. These assaults pushing ahead towards application layer to procure furthermore, squander most extreme CPU cycles. By asking for assets from web benefits in gigantic sum utilizing quick fire of solicitations, assailant robotized programs use all the capacity of handling of single server application or circulated environment application. The periods of the plan execution is client conduct checking and identification. In to beginning with stage by social affair the data of client conduct and computing individual user’s trust score will happen and Entropy of a similar client will be ascertained. HTTP Unbearable Load King (HULK) attacks are also evaluated. In light of first stage, in recognition stage, variety in entropy will be watched and malevolent clients will be recognized. Rate limiter is additionally acquainted with stop or downsize serving the noxious clients. This paper introduces the FAÇADE layer for discovery also, hindering the unapproved client from assaulting the framework.


Sign in / Sign up

Export Citation Format

Share Document