1 / 9

Modelling the Vulnerability of Feedback-Control Based

Feedback control is a critical element in many Inter- net services (e.g., quality-of-service aware applications). Recent research has demonstrated the vulnerability of some feedback- control based applications to low-rate denial-of-service (LRDoS) attacks,. which send high-intensity requests in an ON/OFF pattern to degrade the victim’s performance and evade the detection designed for traditional DoS attacks. However, the intricate interaction between LRDoS attacks and the feedback control mechanism remains largely unknown. http://kaashivinfotech.com/ http://inplanttrainingchennai.com/ http://inplanttraining-in-chennai.com/ http://internshipinchennai.in/ http://inplant-training.org/ http://kernelmind.com/ http://inplanttraining-in-chennai.com/ http://inplanttrainingchennai.com/

kaashivit
Télécharger la présentation

Modelling the Vulnerability of Feedback-Control Based

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. CUSTOM XSD VALIDATED WEB APPLICATION TRACER AGAINST UNSOLICITED USER REQUEST IEEE TRANSACTIONS ON INFORMATION FORENSICS ANDSECURITY, VOL. 9, NO. 3, MARCH 2014 Modellingthe Vulnerability of Feedback-Control Based Internet Services to Low-Rate DoSAttacks

  2. A Software /Manufacturing Research Company Run By Microsoft Most Valuable Professional VenkatesanPrabu .J MANAGING DIRECTOR Microsoft Web Developer Advisory Council team member and a well known Microsoft Most Valuable Professional (MVP) for the year 2008, 2009, 2010,2011,2012,2013 ,2014. LakshmiNarayanan.J GENERAL MANAGER BlackBerry Server Admin. Oracle 10g SQL Expert. Arunachalam.J Electronic Architect Human Resourse Manager

  3. Abstract • Feedback control is a critical element in many Inter- net services (e.g., quality-of-service aware applications). Recent research has demonstrated the vulnerability of some feedback- control based applications to low-rate denial-of-service (LRDoS) attacks,. • which send high-intensity requests in an ON/OFF pattern to degrade the victim’s performance and evade the detection designed for traditional DoS attacks. However, the intricate interaction between LRDoS attacks and the feedback control mechanism remains largely unknown. • In this paper, we address two fundamental questions: 1) what is the impact of an LRDoS attack on a general feedback-control based system and 2) how to conduct a systematic evaluation of the impact of an LRDoS attack on specific feedback-control based systems. • To tackle these problems, we model the system under attack as a switched system and then examine its properties. We conduct the first theoretical investigation on the impact of the LRDoS attack on a general feedback control system.

  4. Existing System • Existing System focus towards the low Rate DOS attack by providing the feedback controller in the mid of the data access. • Prediction of client access and the timing difference between the data access arise from the specific client provides a notable portion of analysis by the server. • In this case, the server invokes the proxy site which is considered as the feedback controller which can take care of reducing the rate of DOS attack. • The feedback controller will take care of evaluating the robot access or human access followed by reducing the DOS attack by prioritizing the direct request from the client to the website when compared to the request coming in from the feedback controller page.

  5. Proposed System • Proposed system focus on the specific instruction execution management on DOS attacks. • A live website is managed in our proposed system which involves, • Monitoring of invoked requests and automating redirection of temporary feedback controlled sites for Low Rate DOS. • Restricting the High privilege instruction executable clients from further accessing on the server. • Priority scheduling concept is implemented to provide more priority to the direct access client when compared to the request received through proxy feedback controlled client. • XML injection attack is one of the most vulnerable attack through which users can penetrate without any valid authenticated information's.

  6. SYSTEM ARCHITECTURE • HARWARE REQUIREMENT: Processor : Core 2 duo Speed : 2.2GHZ RAM : 2GB Hard Disk : 160GB • SOFTWARE REQUIREMENT: Platform : DOTNET (VS2010) , ASP.NET Dotnet framework 4.0 Database : SQL Server 2008 R2

  7. ARCHITECTURE DIAGRAM

  8. Records Breaks Asia Book Of Records Tamil Nadu Of Records India Of Records MVP Awards World Record

  9. Services: A Software /Manufacturing Research Company Run By Microsoft Most Valuable Professional Inplant Training. Internship. Workshop’s. Final Year Project’s. Industrial Visit. Contact Us: +91 98406 78906,+91 90037 18877 kaashiv.info@gmail.com www.kaashivinfotech.com Shivanantha Building (Second building to Ayyappan Temple),X41, 5th Floor, 2nd avenue,Anna Nagar,Chennai-40.

More Related