Home            Contact us            FAQs
    
      Journal Home      |      Aim & Scope     |     Author(s) Information      |      Editorial Board      |      MSP Download Statistics

     Research Journal of Applied Sciences, Engineering and Technology


Evaluating Energy based DDOS Attacks using Cosmic FFP and Energy Points

1P.C. Senthil Mahesh and 2Paul Rodrigues
1Department of CSE, Dhaanish Ahmed College of Engineering, Anna University, Chennai
2Department of CSE, Velammal Engineering College, Chennai, Tamil Nadu, India
Research Journal of Applied Sciences, Engineering and Technology  2014  13:2711-2713
http://dx.doi.org/10.19026/rjaset.7.590  |  © The Author(s) 2014
Received: September 09, 2013  |  Accepted: October 19, 2013  |  Published: April 05, 2014

Abstract

The aim of the study is to improve security and identify DDOS attacks. Security should be considered affront during software development as millions of dollars are lost due to security breaches in software. There are many kinds of security breaches and of these DDOS attacks plays a leading role and as such it is vital that new techniques be identified to combat this rising menace. In this study a new sizing techniques called energy Points are used to identify the energy based DDOS attacks.

Keywords:

DDOS attacks, energy points, FFP,


References

  1. Barroso, U.H., 2007. The case for energy-proportional computing. IEEE Comput., 40: 33-37.
    CrossRef    
  2. Bickford, J., H.A. Lagar-Cavilla, A. Varshavsky, V. Ganapathy and L. Iftode, 2011. Security versus Energy Trade-offs in Host-based Mobile Malware Detection. MobySis 11, Bethesda, Maryland, USA.
  3. BONE Project, 2009. WP 21 topical project green optical networks: Report on year 1 and updated plan for activities. NoE, FP7-ICT-2007 216863, BONE Project.
  4. Carl, G., G. Kesidis, R.R. Brooks and S. Rai, 2006. Denial-of-Service attack-detection techniques. IEEE Internet Comput., 10(1): 82-89.
    CrossRef    
  5. Denial of Service Attacks, 1999. (Accessed on: 2010.11.10).
    Direct Link
  6. Koomey, J.G., 2007. Estimating total power consumption by servers in the U.S and the world. Final Report, Lawrence Berkeley National Laboratory, Stanford University.
  7. McDowell, M., 2004. Understanding Denial-of-service Attacks. National Cyber Alert System, Cyber Security Tip ST04 -015.
  8. Moore, D., G.M. Voelker and S. Savage, 2006. Inferring internet denial of service activity. ACM T. Comput. Syst., 24(2): 115-139.
    CrossRef    
  9. Palmieri, F., S. Ricciardi and U. Fiore, 2011. Evaluating network based Dos attacks under the energy consumption perspective. Proceeding of the International Conference on Broadband and Wireless Computing, Communication and Applications, pp: 374-379.
  10. Ricciardi, S., D. Careglio, U. Fiore, F. Palmieri, G. Santos-Boada and J. Sol�-Pareta, 2011. Analyzing local strategies for energy-efficient networking. Proceeding of the IFIP TC 6th International Conference on Networking (NETWORKING, 2011). Valencia, Spain, LNCS 6827, pp: 291-300.
    CrossRef    
  11. Stephen, S. and L. Ruby, 2003. Taxonomies of Distributed Denial of Service Networks, Attacks, Tools and Countermeasures.
    Direct Link

Competing interests

The authors have no competing interests.

Open Access Policy

This article is distributed under the terms of the Creative Commons Attribution 4.0 International License (http://creativecommons.org/licenses/by/4.0/), which permits unrestricted use, distribution, and reproduction in any medium, provided you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons license, and indicate if changes were made.

Copyright

The authors have no competing interests.

ISSN (Online):  2040-7467
ISSN (Print):   2040-7459
Submit Manuscript
   Information
   Sales & Services
Home   |  Contact us   |  About us   |  Privacy Policy
Copyright © 2024. MAXWELL Scientific Publication Corp., All rights reserved