MONITORING THE APPLICATION LAYER FOR DDOS ATTACK FOR POPULAR WEBSITE
Active In SP
Joined: Sep 2010
05-10-2010, 09:49 AM
DOCUMENT.doc (Size: 1.31 MB / Downloads: 196)
1.1 ORGANIZATION PROFILE:
Focus Tech Media-An Overview
Focus Tech Media, Nasscom Certified, is a group company of ‘Omne Agate Systems Pvt. Ltd.’, An Omne Agate system is an Rs100 Crore company with interests in Digital metering, Software, Multimedia and ‘Out of Home’ advertisements.
Being a pioneer developer of software for the Utility sector in India , we provide various automated solution to the Electricity boards,which increase their efficiency.
The major services offered by Focus Tech Media are:
- Software solutions
- R&D in Engineering Design
- Corporate Training
- Educational services
We, at ‘Focus Tech Media’ provide technology driven business solutions that help the customers meet their business objectives. We believe in providing IT solutions based on contemporary technologies & practices , innovation and enduring relation.
Our flagship product, Energy Audit and Accounting Application (E3A) has been implemented as part of Advanced Metering Infrastructure project and implimentation by various Indian state Electricity Boards.
GSM based communication forms the basis of many innovative products and services that constitute our product lineup
Our R & D team equipped with state-of-art infrastructure specializes in:
- Embedded software development
- Automated Meter Reading Solution for Utilities
- Embedded application solutions for textile industries
- Healthcare domain
We specialize in Automotive and other manufacturing domains and have executed project and implimentations for American, European & Indian manufacturing industries.
- Modeling (concept to prototype)
- Preparation of manufacturing drawings and parametric modeling
- Engineering Animation Services
- Reverse Engineering
- Vectorization and Digitization services
GIS & Mapping:
FTM provides custom developed GPS based Geographical Information System applications.
- GIS based Asset Management System
- GPS based Navigation and Tracking System
New technologies, languages, frameworks and tools are emerging faster than one can master the current. Today companies need to adopt newer and newer technologies to stay ahead of the competition.
In other words, companies need to keep running to stay where they are. The employees need to trained and retrained as the need arises.
If the new technology being learnt is a paradigm shift from the one already used, it could be extremely difficult for the company to find the trainer in-house. Most of the time, such in-house
Training tends to ignore best practices applicable for the new technology.
Keeping all these factors in mind, we have developed courses for skill upgrading of employees at all levels.
Our courses are designed and delivered by experts who have in-depth understanding of the subject and great instructional ability.
We serve a sophisticated customer base of Engineers, Scientists and R&D personnel who demand high quality and timely service.
With such an innovative expertise, we do encourage Graduates and Research scholars to complete their project and implimentation work in our organization and give project and implimentation assistance in the following domains:
- Embedded Systems
- DSP/VLSI/Mat Lab/Bio Medical/PLC/SCADA
- Wireless communication technologies
- DotNet technologies
- Advanced Java applications
Our Life-Skills and Placement Enhancement Program (PEP) enables the student to handle The interview process with ease.
1.2 PROJECT PROFILE
Distributed denial of service (DDoS) attack is a continuous critical threat to the Internet. Derived from the low layers, new application-layer-based DDoS attacks utilizing legitimate HTTP requests to overwhelm victim resources are more undetectable. The case may be more serious when such attacks mimic or occur during the flash crowd event of a popular Website.
Focusing on the detection for such new DDoS attacks, a scheme based on document popularity is introduced. An Access Matrix is defined to capture the spatial-temporal patterns of a normal flash crowd. Principal component analysis and independent component analysis are applied to abstract the multidimensional Access Matrix. A novel anomaly detector based on hidden semi-Markov model is proposed to describe the dynamics of Access Matrix and to detect the attacks. The entropy of document popularity fitting to the model is used to detect the potential application-layer
DDoS attacks. Numerical results based on real Web traffic data are presented to demonstrate the effectiveness of the proposed method.
The following are the modules present in monitoring application layer DDOS Attacks in popular websites
- Victim server & User Login
- Training phase
- Data Preparation
Active In SP
Joined: Sep 2010
30-12-2010, 09:47 AM
for more details, visit the below given thread too
Active In SP
Joined: Jun 2010
04-05-2011, 12:49 PM
hi to all
please any body can send me the source code for the project and implimentation it is very urgent for me
please mail me the code to firstname.lastname@example.org
Joined: Jul 2011
26-01-2012, 10:19 AM
to get information about the topic Monitoring the Application-Layer DDoS Attacks for popular sites full report,ppt and related topic refer the link bellow
seminar and presentationproject and implimentationsattachment.php?aid=9271