CFP last date
16 December 2024
Reseach Article

Detection of DDoS Attack in Semantic Web

by Prashant Chauhan, Abdul Jhummarwala, Manoj Pandya
International Journal of Applied Information Systems
Foundation of Computer Science (FCS), NY, USA
Volume 4 - Number 6
Year of Publication: 2012
Authors: Prashant Chauhan, Abdul Jhummarwala, Manoj Pandya
10.5120/ijais12-450750

Prashant Chauhan, Abdul Jhummarwala, Manoj Pandya . Detection of DDoS Attack in Semantic Web. International Journal of Applied Information Systems. 4, 6 ( December 2012), 7-10. DOI=10.5120/ijais12-450750

@article{ 10.5120/ijais12-450750,
author = { Prashant Chauhan, Abdul Jhummarwala, Manoj Pandya },
title = { Detection of DDoS Attack in Semantic Web },
journal = { International Journal of Applied Information Systems },
issue_date = { December 2012 },
volume = { 4 },
number = { 6 },
month = { December },
year = { 2012 },
issn = { 2249-0868 },
pages = { 7-10 },
numpages = {9},
url = { https://www.ijais.org/archives/volume4/number6/360-0750/ },
doi = { 10.5120/ijais12-450750 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2023-07-05T10:47:29.097079+05:30
%A Prashant Chauhan
%A Abdul Jhummarwala
%A Manoj Pandya
%T Detection of DDoS Attack in Semantic Web
%J International Journal of Applied Information Systems
%@ 2249-0868
%V 4
%N 6
%P 7-10
%D 2012
%I Foundation of Computer Science (FCS), NY, USA
Abstract

We are currently living in an era where information is very crucial and critical measure of success. Various forms of computing are also available and now a days it is an era of distributed computing where all the task and information are shared among participated nodes. This type of computing can have homogeneous or heterogeneous platform and hardware. The concept of cloud computing and virtualization has gained much momentum and has become a more popular phrase in information technology. Many organizations have started implementing these new technologies to further reduce costs through improved machine utilization, reduced administration time and infrastructure costs. Cloud computing also faces challenges. One of such problem is DDoS attack so in this paper we will focus on DDoS attack and how to overcome from it using honeypot. For this here open source tools and software are used. Typical DDoS solution mechanism is single host oriented and in this paper focused on distributed host oriented solution that meets scalability.

References
  1. NathalieWeiler, Eleventh IEEE International Workshops on Enabling Technologies,2002, "Honeypots for Distributed Denial of Service Attacks"
  2. Yuqing Mai, Radhika Upadrashta and Xiao Su, ITCC'04 "J-Honeypot: A Java-Based Network Deception Tool with Monitoring and Intrusion Detection"
  3. Yeonhee Lee, Wonchul Kang, and Youngseok Lee, 51-63, TMA'11"A Hadoop-based Packet Trace Processing Tool"
  4. Yun Yang, Hongli Yang and JiaMi, IEEE, 2011, "Design of Distributed Honeypot System Based on Intrusion Tracking"
  5. Anup Suresh Talwalkar, 2011, "HadoopT - Breaking the Scalability Limits of Hadoop"
  6. Flavien Flandrin, 2010, "A Methodology To Evaluate Rate-Based Intrusion Prevention System Against Distributed Denial Of Service"
Index Terms

Computer Science
Information Sciences

Keywords

Cloud Security Network Monitoring Distributed Log Processing