Research Article | OPEN ACCESS
Evaluating Energy based DDOS Attacks using Cosmic FFP and Energy Points
1P.C. Senthil Mahesh and 2Paul Rodrigues
1Department of CSE, Dhaanish Ahmed College of Engineering, Anna University, Chennai
2Department of CSE, Velammal Engineering College, Chennai, Tamil Nadu, India
Research Journal of Applied Sciences, Engineering and Technology 2014 13:2711-2713
Received: September 09, 2013 | Accepted: October 19, 2013 | Published: April 05, 2014
Abstract
The aim of the study is to improve security and identify DDOS attacks. Security should be considered affront during software development as millions of dollars are lost due to security breaches in software. There are many kinds of security breaches and of these DDOS attacks plays a leading role and as such it is vital that new techniques be identified to combat this rising menace. In this study a new sizing techniques called energy Points are used to identify the energy based DDOS attacks.
Keywords:
DDOS attacks, energy points, FFP,
References
-
Barroso, U.H., 2007. The case for energy-proportional computing. IEEE Comput., 40: 33-37.
CrossRef
-
Bickford, J., H.A. Lagar-Cavilla, A. Varshavsky, V. Ganapathy and L. Iftode, 2011. Security versus Energy Trade-offs in Host-based Mobile Malware Detection. MobySis 11, Bethesda, Maryland, USA.
-
BONE Project, 2009. WP 21 topical project green optical networks: Report on year 1 and updated plan for activities. NoE, FP7-ICT-2007 216863, BONE Project.
-
Carl, G., G. Kesidis, R.R. Brooks and S. Rai, 2006. Denial-of-Service attack-detection techniques. IEEE Internet Comput., 10(1): 82-89.
CrossRef
-
Denial of Service Attacks, 1999. (Accessed on: 2010.11.10).
Direct Link
-
Koomey, J.G., 2007. Estimating total power consumption by servers in the U.S and the world. Final Report, Lawrence Berkeley National Laboratory, Stanford University.
-
McDowell, M., 2004. Understanding Denial-of-service Attacks. National Cyber Alert System, Cyber Security Tip ST04 -015.
-
Moore, D., G.M. Voelker and S. Savage, 2006. Inferring internet denial of service activity. ACM T. Comput. Syst., 24(2): 115-139.
CrossRef
-
Palmieri, F., S. Ricciardi and U. Fiore, 2011. Evaluating network based Dos attacks under the energy consumption perspective. Proceeding of the International Conference on Broadband and Wireless Computing, Communication and Applications, pp: 374-379.
-
Ricciardi, S., D. Careglio, U. Fiore, F. Palmieri, G. Santos-Boada and J. Sol�-Pareta, 2011. Analyzing local strategies for energy-efficient networking. Proceeding of the IFIP TC 6th International Conference on Networking (NETWORKING, 2011). Valencia, Spain, LNCS 6827, pp: 291-300.
CrossRef
-
Stephen, S. and L. Ruby, 2003. Taxonomies of Distributed Denial of Service Networks, Attacks, Tools and Countermeasures.
Direct Link
Competing interests
The authors have no competing interests.
Open Access Policy
This article is distributed under the terms of the Creative Commons Attribution 4.0 International License (http://creativecommons.org/licenses/by/4.0/), which permits unrestricted use, distribution, and reproduction in any medium, provided you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons license, and indicate if changes were made.
Copyright
The authors have no competing interests.
|
|
|
ISSN (Online): 2040-7467
ISSN (Print): 2040-7459 |
|
Information |
|
|
|
Sales & Services |
|
|
|