Hrishikesh Salunkhe - Academia.edu (original) (raw)
Uploads
Papers by Hrishikesh Salunkhe
International Journal of Engineering Research and, 2017
The Denial of Service (DOS) attack is most widely employed technique used by attackers on the net... more The Denial of Service (DOS) attack is most widely employed technique used by attackers on the network in order to disrupt the network functionality. The intention is clearly to pull down the service of the victimized network by making it busy for legitimate users to be accessed and get the desired service; thus ultimately resulting in the poor performance. Among various DOS attacks the SYN flood attack is mostly implemented by attackers. The attack is implemented by focusing and targeting on the TCP's 'three-way handshake mechanism', as there is limitation on maintaining half opened connections. In this the attacker attempts to exploit all the available resources by bogus half connections and thus there may not be resources left to establish new legitimate connection with host. Due to this attack the server may get hang, it may crash or may be occupied fully with the large volume of traffic. In order to check whether the system is under influence of attack, its behavior is compared with normal system on the basis of different parameters. The Adaptive threshold algorithm and the cumulative sum (CUSUM) algorithm are the algorithms for detection which can serve as detection mechanism on the basis of some logical and mathematical model.
International Journal of Engineering Research and, 2017
The Denial of Service (DOS) attack is most widely employed technique used by attackers on the net... more The Denial of Service (DOS) attack is most widely employed technique used by attackers on the network in order to disrupt the network functionality. The intention is clearly to pull down the service of the victimized network by making it busy for legitimate users to be accessed and get the desired service; thus ultimately resulting in the poor performance. Among various DOS attacks the SYN flood attack is mostly implemented by attackers. The attack is implemented by focusing and targeting on the TCP's 'three-way handshake mechanism', as there is limitation on maintaining half opened connections. In this the attacker attempts to exploit all the available resources by bogus half connections and thus there may not be resources left to establish new legitimate connection with host. Due to this attack the server may get hang, it may crash or may be occupied fully with the large volume of traffic. In order to check whether the system is under influence of attack, its behavior is compared with normal system on the basis of different parameters. The Adaptive threshold algorithm and the cumulative sum (CUSUM) algorithm are the algorithms for detection which can serve as detection mechanism on the basis of some logical and mathematical model.