MONITORING THE APPLICATION LAYER FOR DDOS ATTACK FOR POPULAR WEBSITE
Thread Rating:
  • 0 Vote(s) - 0 Average
  • 1
  • 2
  • 3
  • 4
  • 5
seminar surveyer
Active In SP
**

Posts: 3,541
Joined: Sep 2010
#1
05-10-2010, 09:49 AM


Presented by:
M.BHUVANA


.doc   DOCUMENT.doc (Size: 1.31 MB / Downloads: 196)


1. INTRODUCTION:

1.1 ORGANIZATION PROFILE:

Focus Tech Media-An Overview

Focus Tech Media, Nasscom Certified, is a group company of ‘Omne Agate Systems Pvt. Ltd.’, An Omne Agate system is an Rs100 Crore company with interests in Digital metering, Software, Multimedia and ‘Out of Home’ advertisements.


Being a pioneer developer of software for the Utility sector in India , we provide various automated solution to the Electricity boards,which increase their efficiency.



The major services offered by Focus Tech Media are:

- Software solutions
- R&D in Engineering Design
- Corporate Training
- Educational services



Software Development:

We, at ‘Focus Tech Media’ provide technology driven business solutions that help the customers meet their business objectives. We believe in providing IT solutions based on contemporary technologies & practices , innovation and enduring relation.


Our flagship product, Energy Audit and Accounting Application (E3A) has been implemented as part of Advanced Metering Infrastructure project and implimentation by various Indian state Electricity Boards.


GSM based communication forms the basis of many innovative products and services that constitute our product lineup

Our R & D team equipped with state-of-art infrastructure specializes in:

- Embedded software development
- Automated Meter Reading Solution for Utilities
- Embedded application solutions for textile industries
- Healthcare domain



Engineering Services:

We specialize in Automotive and other manufacturing domains and have executed project and implimentations for American, European & Indian manufacturing industries.


Services Offered:
- Modeling (concept to prototype)
- Preparation of manufacturing drawings and parametric modeling
- Engineering Animation Services
- Reverse Engineering
- Vectorization and Digitization services


GIS & Mapping:

FTM provides custom developed GPS based Geographical Information System applications.

Solution Offered:

- GIS based Asset Management System
- GPS based Navigation and Tracking System


Corporate Training:

New technologies, languages, frameworks and tools are emerging faster than one can master the current. Today companies need to adopt newer and newer technologies to stay ahead of the competition.


In other words, companies need to keep running to stay where they are. The employees need to trained and retrained as the need arises.


If the new technology being learnt is a paradigm shift from the one already used, it could be extremely difficult for the company to find the trainer in-house. Most of the time, such in-house
Training tends to ignore best practices applicable for the new technology.


Keeping all these factors in mind, we have developed courses for skill upgrading of employees at all levels.


Our courses are designed and delivered by experts who have in-depth understanding of the subject and great instructional ability.


Educational Services:

We serve a sophisticated customer base of Engineers, Scientists and R&D personnel who demand high quality and timely service.


With such an innovative expertise, we do encourage Graduates and Research scholars to complete their project and implimentation work in our organization and give project and implimentation assistance in the following domains:

- Embedded Systems
- DSP/VLSI/Mat Lab/Bio Medical/PLC/SCADA
- Wireless communication technologies
- DotNet technologies
- Advanced Java applications


Our Life-Skills and Placement Enhancement Program (PEP) enables the student to handle The interview process with ease.



1.2 PROJECT PROFILE


Distributed denial of service (DDoS) attack is a continuous critical threat to the Internet. Derived from the low layers, new application-layer-based DDoS attacks utilizing legitimate HTTP requests to overwhelm victim resources are more undetectable. The case may be more serious when such attacks mimic or occur during the flash crowd event of a popular Website.
Focusing on the detection for such new DDoS attacks, a scheme based on document popularity is introduced. An Access Matrix is defined to capture the spatial-temporal patterns of a normal flash crowd. Principal component analysis and independent component analysis are applied to abstract the multidimensional Access Matrix. A novel anomaly detector based on hidden semi-Markov model is proposed to describe the dynamics of Access Matrix and to detect the attacks. The entropy of document popularity fitting to the model is used to detect the potential application-layer
DDoS attacks. Numerical results based on real Web traffic data are presented to demonstrate the effectiveness of the proposed method.

The following are the modules present in monitoring application layer DDOS Attacks in popular websites


- Victim server & User Login
- Training phase
- PCA
- ICA
- HSMM
- Data Preparation
- Monitoring
Reply
seminar surveyer
Active In SP
**

Posts: 3,541
Joined: Sep 2010
#2
30-12-2010, 09:47 AM

for more details, visit the below given thread too

topicideashow-to-monitoring-the-application-layer-ddos-attack-for-popular-websites-full-report?pid=32378#pid32378
Reply
sai_1218
Active In SP
**

Posts: 3
Joined: Jun 2010
#3
04-05-2011, 12:49 PM

hi to all
please any body can send me the source code for the project and implimentation it is very urgent for me
please mail me the code to sailakshmi1218@gmail.com
Reply
seminar addict
Super Moderator
******

Posts: 6,592
Joined: Jul 2011
#4
26-01-2012, 10:19 AM


to get information about the topic Monitoring the Application-Layer DDoS Attacks for popular sites full report,ppt and related topic refer the link bellow

topicideashow-to-monitoring-the-application-layer-ddos-attack-for-popular-websites-full-report

topicideashow-to-monitoring-the-application-layer-for-ddos-attack-for-popular-website

seminar and presentationproject and implimentationsattachment.php?aid=9271
Reply

Important Note..!

If you are not satisfied with above reply ,..Please

ASK HERE

So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page

Quick Reply
Message
Type your reply to this message here.


Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Possibly Related Threads...
Thread Author Replies Views Last Post
  ON THE EFFECTIVENESS OF MONITORING FOR INTRUSION DETECTION IN MOBILE AD HOC abstract seminar tips 2 817 09-05-2014, 09:43 AM
Last Post: seminar project topic
  Developing a web application to transfer image and patient information project report maker 2 4,977 17-03-2014, 03:03 PM
Last Post: MichaelKa
  INTELLIGENT RAILWAY STATION MONITORING AND ALERT SYSTEM (IRSMAS) seminar-database 3 3,352 10-01-2014, 02:05 PM
Last Post: seminar project topic
  Google Map Application using Andriod SDK Abstract seminar projects maker 0 372 19-09-2013, 03:48 PM
Last Post: seminar projects maker
  SMS Protection Application Abstract seminar projects maker 0 372 19-09-2013, 03:47 PM
Last Post: seminar projects maker
  Website in Indian Languages- A Java Approach Abstract seminar projects maker 0 371 19-09-2013, 03:39 PM
Last Post: seminar projects maker
  TRACEBACK OF DDOS ATTACKS USING ENTROPHY VARIATIONS seminar ideas 3 764 09-09-2013, 09:27 AM
Last Post: study tips
  Analysis of Black Hole Attack on MANETs Using Different MANET Routing Protocols pdf study tips 0 346 20-08-2013, 03:43 PM
Last Post: study tips
  Secret Communication through Audio for Defense Application PPT project girl 1 726 03-08-2013, 03:10 PM
Last Post: study tips
  Sensor Network Based Oilwell Health Monitoring and Intelligent Control pdf study tips 0 424 01-08-2013, 12:47 PM
Last Post: study tips