- Prashant Chauhan and Abdul Jhummarwala and Manoj Pandya 2012. Detection of DDoS Attack in Semantic Web. International Journal of Applied Information Systems. 4, 6 (December 2012), 7-10. DOI=http://dx.doi.org/10.5120/ijais450750
-
@article{10.5120/ijais2017451568, author = {Prashant Chauhan and Abdul Jhummarwala and Manoj Pandya}, title = {Detection of DDoS Attack in Semantic Web}, journal = {International Journal of Applied Information Systems}, issue_date = {December 2012}, volume = {4}, number = {}, month = {December}, year = {2012}, issn = {}, pages = {7-10}, numpages = {}, url = {/archives/volume4/number6/360-0750}, doi = { 10.5120/ijais12-450750}, publisher = { xA9 2012 by IJAIS Journal}, address = {} }
-
%1 450750 %A Prashant Chauhan %A Abdul Jhummarwala %A Manoj Pandya %T Detection of DDoS Attack in Semantic Web %J International Journal of Applied Information Systems %@ %V 4 %N %P 7-10 %D 2012 %I xA9 2012 by IJAIS Journal
Abstract
The Paper evaluates the performance of Distance Vector Multicast Routing Protocol (DVMRP) Multicasting Network with two sources and four receivers, attack by five attackers. Attackers attacked the source 1 in network by ICMP Ping Flood. Here we execute the simulation and draw network throughput between source 1 and source 2, queuing transmission delay and drop out data packets at source 1 for ping packet of size 16, 64 and 96 Bytes for 500, 1500 and 2500 ping packets per second. The simulation results indicate that throughput decreases with the increase in attack packet size and intensity, delay increases with increase in attack packet size and decrease with increase in attacking intensity. Also, with the increase in attack packet size the number of dropped packets remain nearly same for different intensities.
References
- NathalieWeiler, Eleventh IEEE International Workshops on Enabling Technologies,2002, "Honeypots for Distributed Denial of Service Attacks"
- Yuqing Mai, Radhika Upadrashta and Xiao Su, ITCC'04 "J-Honeypot: A Java-Based Network Deception Tool with Monitoring and Intrusion Detection"
- Yeonhee Lee, Wonchul Kang, and Youngseok Lee, 51-63, TMA'11"A Hadoop-based Packet Trace Processing Tool"
- Yun Yang, Hongli Yang and JiaMi, IEEE, 2011, "Design of Distributed Honeypot System Based on Intrusion Tracking"
- Anup Suresh Talwalkar, 2011, "HadoopT - Breaking the Scalability Limits of Hadoop"
- Flavien Flandrin, 2010, "A Methodology To Evaluate Rate-Based Intrusion Prevention System Against Distributed Denial Of Service"
Keywords
Cloud Security, Network Monitoring, Distributed Log Processing