EST

Call for paper
April Edition 2017

International Journal of Applied Information Systems solicits high quality original research papers for the
March 15, 2017
April 2017 Edition of the journal.
The last date of research paper submission is
March 15, 2017
SUBMIT YOUR PAPER

Number 6

Detection of DDoS Attack in Semantic Web

journal image
 Download
1483
  • Prashant Chauhan and Abdul Jhummarwala and Manoj Pandya 2012. Detection of DDoS Attack in Semantic Web. International Journal of Applied Information Systems. 4, 6 (December 2012), 7-10. DOI=http://dx.doi.org/10.5120/ijais450750
  • @article{10.5120/ijais2017451568,
    author = {Prashant Chauhan and Abdul Jhummarwala and Manoj Pandya},
    title = {Detection of DDoS Attack in Semantic Web},
    journal = {International Journal of Applied Information Systems},
    issue_date = {December 2012},
    volume = {4},
    number = {},
    month = {December},
    year = {2012},
    issn = {},
    pages = {7-10},
    numpages = {},
    url = {/archives/volume4/number6/360-0750},
    doi = { 10.5120/ijais12-450750},
    publisher = { xA9 2012 by IJAIS Journal},
    address = {}
    }
    
  • %1 450750
    %A Prashant Chauhan
    %A Abdul Jhummarwala
    %A Manoj Pandya
    %T Detection of DDoS Attack in Semantic Web
    %J International Journal of Applied Information Systems
    %@ 
    %V 4
    %N 
    %P 7-10
    %D 2012
    %I  xA9 2012 by IJAIS Journal
    

Abstract

The Paper evaluates the performance of Distance Vector Multicast Routing Protocol (DVMRP) Multicasting Network with two sources and four receivers, attack by five attackers. Attackers attacked the source 1 in network by ICMP Ping Flood. Here we execute the simulation and draw network throughput between source 1 and source 2, queuing transmission delay and drop out data packets at source 1 for ping packet of size 16, 64 and 96 Bytes for 500, 1500 and 2500 ping packets per second. The simulation results indicate that throughput decreases with the increase in attack packet size and intensity, delay increases with increase in attack packet size and decrease with increase in attacking intensity. Also, with the increase in attack packet size the number of dropped packets remain nearly same for different intensities.

References

  1. NathalieWeiler, Eleventh IEEE International Workshops on Enabling Technologies,2002, "Honeypots for Distributed Denial of Service Attacks"
  2. Yuqing Mai, Radhika Upadrashta and Xiao Su, ITCC'04 "J-Honeypot: A Java-Based Network Deception Tool with Monitoring and Intrusion Detection"
  3. Yeonhee Lee, Wonchul Kang, and Youngseok Lee, 51-63, TMA'11"A Hadoop-based Packet Trace Processing Tool"
  4. Yun Yang, Hongli Yang and JiaMi, IEEE, 2011, "Design of Distributed Honeypot System Based on Intrusion Tracking"
  5. Anup Suresh Talwalkar, 2011, "HadoopT - Breaking the Scalability Limits of Hadoop"
  6. Flavien Flandrin, 2010, "A Methodology To Evaluate Rate-Based Intrusion Prevention System Against Distributed Denial Of Service"

Keywords

Cloud Security, Network Monitoring, Distributed Log Processing

Index Terms

Computer Science
Information Sciences