Please use this identifier to cite or link to this item: http://hdl.handle.net/2080/816
Full metadata record
DC FieldValueLanguage
dc.contributor.authorSwain, Biswa Ranjan-
dc.contributor.authorSahoo, Bibhudatta-
dc.date.accessioned2009-04-28T11:04:34Z-
dc.date.available2009-04-28T11:04:34Z-
dc.date.issued2009-
dc.identifier.citationIEEE International Advance Computing Conference, 2009. IACC 2009.Patiala, India, P 1170-1172en
dc.identifier.urihttp://dx.doi.org/10.1109/IADCC.2009.4809180-
dc.identifier.urihttp://hdl.handle.net/2080/816-
dc.descriptionCopyright for this paper belongs to IEEEen
dc.description.abstractThis paper discusses the mitigation of Distributed Denial of Service (DDoS) attack and as well preservation of computational time on wireless network. The DDoS effects upon the QoS in the loss of bandwidth and the resources available at the server. The uncertainty of Distributed denial of Service attack can be best simulated with the help of probabilistic model. The simple Hop Count method was used to calculate the hop count from the Time-To-Live (TTL) field of each packet. In this approach calculation of hop count for each packet is not required to detect the malicious packet. The number of packet we need to examine depends upon the probabilistic approach. This method mitigates the DDoS attack by reducing computational time and memory during the processing of a packet.en
dc.format.extent310406 bytes-
dc.format.mimetypeapplication/pdf-
dc.language.isoen-
dc.publisherIEEEen
dc.subjectDDoS Attacken
dc.subjectHCF Methoden
dc.subjectTime-To-Liveen
dc.titleMitigating DDoS attack and Saving Computational Time using a Probabilistic approach and HCF methoden
dc.typeArticleen
Appears in Collections:Conference Papers

Files in This Item:
File Description SizeFormat 
swain.pdf303.13 kBAdobe PDFView/Open


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.