Please use this identifier to cite or link to this item: https://idr.nitk.ac.in/jspui/handle/123456789/6808
Full metadata record
DC FieldValueLanguage
dc.contributor.authorGujjunoori, S.
dc.contributor.authorSyed, T.A.
dc.contributor.authorMadhu, B.J.
dc.contributor.authorAvinash, D.
dc.contributor.authorMohandas, R.
dc.contributor.authorPais, A.R.
dc.date.accessioned2020-03-30T09:46:10Z-
dc.date.available2020-03-30T09:46:10Z-
dc.date.issued2009
dc.identifier.citationICETE 2009 - International Joint Conference on e-Business and Telecommunications, 2009, Vol., , pp.121-126en_US
dc.identifier.urihttp://idr.nitk.ac.in/jspui/handle/123456789/6808-
dc.description.abstractDistributed Denial of Service poses a significant threat to the Internet today. In these attacks, an attacker runs a malicious process in compromised systems under his control and generates enormous number of requests, which in turn can easily exhaust the computing resources of a victim web server within a short period of time. Many mechanisms have been proposed till date to combat this attack. In this paper we propose a new solution to reduce the impact of a distributed denial of service attack on a web server by throttling the client's CPU. The concept of source throttling is used to make the client pay a resource stamp fee, which is negligible when the client is making a limited number of requests but becomes a limiting restriction when he is making a large number of requests. The proposed solution makes use of the integer factorization problem to generate the CPU stamps. We have packaged our solution as an API so that existing web applications can easily deploy our solution in a layer that is transparent to the underlying application.en_US
dc.titleThrottling DDoS attacksen_US
dc.typeBook chapteren_US
Appears in Collections:2. Conference Papers

Files in This Item:
There are no files associated with this item.


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.