Monitoring the Application Layer-DDoS Attack for Popular Websites full report
Thread Rating:
  • 1 Vote(s) - 5 Average
  • 1
  • 2
  • 3
  • 4
  • 5
project topics
Active In SP
**

Posts: 2,492
Joined: Mar 2010
#1
05-04-2010, 07:56 PM



.ppt   Monitoring the Application Layer-DDoS Attack for Popular Websites.ppt (Size: 2.37 MB / Downloads: 804)

Monitoring the Application Layer-DDoS Attack for Popular Websites

Presented By:
Team members:
B.Krishna kumar 06P1A0561
B.M.A.Chaitanya 06P1A0565
S.Siva krishna 06P1A05A2
M.Ram Gopal Reddy 06P1A05B7
Overview of the Project
SYSTEM ANALYSIS
PRESENT SYSTEM:

The existing systems are as follows Preventive Defense, Source Tracking & Reactive Solutions.
The preventive schemes aim at improving the security level of a computer system or network; thus preventing the
attacks from happening, or enhancing the resistance to attacks.
The source-tracking schemes, on the other hand, aim to track-down the sources of attacks, so that punitive
action can be taken against them and further attacks can be avoided.
The reactive measures for DDoS defense are designed to detect an ongoing attack and react to it by controlling
the flow of attack packets to mitigate the effects of the attack.
The existing solutions fall into four groups: packet marking, message traceback, logging, and traffic
observation
PROPOSED SYSTEM:

The proposed System used Inter domain Packet filters (IDPFs) architecture, a system that can be constructed
solely based on the locally exchanged BGP updates. Each node only selects and propagates to neighbors based on
two set of routing policies. They are Import and Export Routing policies.
The IDPFs uses a feasible path from source node to the destination node, and a packet can reach to the
destination through one of its upstream neighbors. Such a filtering will not discard the packets with valid
source address.
As the Internet was originally designed for openness and scalability without much concern for security, nasty
users can exploit the design weaknesses of the internet to inflict destruction in its operation.
Incidents disturbing the activities like e-mail viruses, computer worms and denial-of service attacks have been
on the rise.
The incidents which has raised the most concern in recent years are the denial-of service (DoS) attacks whose
sole purpose is to reduce or eliminate the availability of a service provided over the Internet, to its legal
users.
Advantages :

Minimize the denial of service attacks.
For finding possible path we donâ„¢t need globule routing information.
Reducing the IP spoofing through BGP updates, this will overcome the draw back of finding BEST route

FEASIBILITY STUDY:

A Feasibility Study is a first round study undertaken before the real work of a project and implimentation starts to ascertain the
likely hood of the project and implimentations success. It is an analysis of possible alternative solutions to a problem and a
recommendation on the best alternative.
2.3.1 Feasibility Consideration:

Three key consideration are involved in the feasibility analsis:
Economic Feasibility
Technical Feasibility
Operational Feasibility
Economic Feasibility:

Economic analysis is the most frequently used technique for evaluating the effectiveness of a proposed system.
It is more commonly known as cost/benefit analysis. The procedure is to determine the benefits and savings that
are expected from a proposed system and compare them with costs. If benefits outweigh cost, a decision is taken
to design and implement the system.
Technical Feasibility:

The technical feasibility infers whether the proposed system can be developed considering the technical issues
like availability of the necessary technology, technical capacity, adequate response and extensibility.
The project and implimentation is decided to build using Java Technology which can be easily accessed through any web browser. This
system uses Advanced Java Components which implements code behind functionality for implementing the business
logic. We can use this application in any OS. They can have their own security and transactional advantages.
But are the responsible for selecting suitable and secured OS, which is suitable to our application.

Operational Feasibility:

Operational feasibility is defined as the process of assessing the degree to which a proposed system solves
business problems or takes advantage of business opportunities.
The system is self-explanatory and doesnâ„¢t need any extra sophisticated training. The application can be
handled very easily with a novice user. As the software that is used for developing this application is very
economical and is readily available in the market the only time that is lost by the customer is just
installation time. Therefore the proposed system is operationally feasible
Automation system that is developed technically and that is used on installation is good investment for
organization. The financial benefit must equal or exceed that cost. The amount being spent on system study,
processing hardware, developing software is reasonable considering the loss of revenue owing to the prevailing
loopholes in the system. Benefits in the form of reduced costs like client side with minimum configuration,
system compatibility of any hardware and timing effective manner of allocating systems and registering
complaints
SYNOPSIS OF SOFTWERE USED:

Introduction to JAVA Environment:

Creation of Java:
Java was conceived by James Gosling, Patrick Naught on, ChrisWarth, Ed Frank and Mike Sheridan at
SUN Micro Systems Incorporation in 1991. It took 18 months to develop the first working version. This
language was intialy called OAK, but was renamed JAVA in 1995. Before the initial implementation of OAK in
1992 and the public announcement of Java in 1995, many more contributed to the design and evolution of the
language.
Overview of Java

An Object Oriented Programming Language (OOPL) developed at Sun Microsystems. A Virtual Machine Run
Time Environment that can be embedded in web browser (IE, NN).
Java is powerful but lean object oriented programming language. It has generated a lot of excitement
because it makes it possible to program for internet by creating applets, programs that can be embedded in web
page.
Java is more than a programming language for writing applets. It is being used more and more for
writing standalone applications as well.
Java is actually a platform consisting of three components:
1. Java programming Language.
2. Java Library of Classes and Interfaces.
3. Java Virtual Machine.
A Standardized set of Package (Class, Interfaces)
Creating Graphical User Interfaces
Controlling Multi Media Data
Communicating Over Network
JAVA is Portable:

One of the biggest advantage Java offers is that it is portable. An application written in Java will
run on all the major platforms. Any computer with a java based browser can run the applications or applets
written in the Java programming Language. A programmer no longer has to write one program to run on a
Macintosh, another program to run on a windows machine, still another to run on a UNIX machine, and so on. In
other words , with Java, developers write their programs only once.
JAVA is Object-Oriented
JAVA makes it easy to write correct code
JAVA is Extensible
JAVA is Secure
JAVA is multithread
JAVA is impotent to the Internet
SYSTEM DESIGN


The most creative and challenging phase of the life cycle is system design. The term design describes a final
system and the process by which it is developed. It refers to the technical specifications that will be applied
in implementations the candidate system. The design may be defined as the process of applying various
techniques and principles for the purpose of defining a device, a process or a system in sufficient details to
permit its physical realization.
The designerâ„¢s goal is how the output is to be produced and in what format samples of the output and input are
also presented. Second input data and database files have to be designed to meet the requirements of the
proposed output. The processing phases are handled through the program Construction and Testing. Finally,
details related to justification of the system and an estimate of the impact of the candidate system on the user
and the organization are documented and evaluated by management as a step toward implementation.
The importance of software design can be stated in a single word Quality. Design provides us with
representations of software that can be assessed for quality. Design is the only way that we can accurately
translate a customerâ„¢s requirements into a finished software product or system without design we risk building
an unstable system, that might fail it small changes are made or may be difficult to test, or one whoâ„¢s quality
canâ„¢t be tested. So it is an essential phase in the development of a software product.
UML DIAGRAMS

INTRODUCTION

UML is a notation that resulted from the unification of Object Modeling Technique and Object Oriented Software
Technology .UML has been designed for broad range of application.
Hence, it provides constructs for a broad range of systems and activities.
An Overview of UML in five notations

1.use case diagrams

Use cases are used during requirements elicitation and analysis To represent the functionality of the system.
Use cases focus on the behavior of the system from the external point of view. The actor are
Outside the boundary of the system, where as the use cases are inside the boundary of the system.
2.class diagrams


Class diagrams to describe the structure of the system. Classes Are abstraction that specify the common
structure and behaviour of a set
Class diagrams describe the system in terms of objects, classes, attributes, operations and their associations.
3.Sequence diagrams


Sequence diagrams are used to formalize the behaviour of the system and to visualize the communication among
objects. They are useful for identifying additional objects that participate in the use cases. A Sequence
diagram represents the interaction that take place among these objects.
4.Statechart diagrams


State chart diagrams describe the behaviour of an individual object as a number of states and transitions
between these states. A state represents a particular set of values for an object. The sequence diagram focuses
on the messages exchanged between objects, the state chart diagrams focuses on the transition between states.
5.Activity diagrams


An activity diagram describes a system in terms of activities. Activities are states that represents the
execution of a set of operations. Activity diagrams are similar to flowchart diagram and data flow.
Use Search at http://topicideas.net/search.php wisely To Get Information About Project Topic and Seminar ideas with report/source code along pdf and ppt presenaion
Reply
sriram.duggirala
Active In SP
**

Posts: 1
Joined: Jun 2010
#2
13-06-2010, 10:11 AM

pls tell me the input and output of this project and implimentation wit picturisation plss...
Reply
sameerali
Active In SP
**

Posts: 1
Joined: Jun 2010
#3
18-06-2010, 02:18 PM

can u please send me the various module s and its description
Reply
computer science topics
Active In SP
**

Posts: 610
Joined: Jun 2010
#4
02-07-2010, 06:19 PM

[b]Monitoring the Application-Layer DDoS Attacks for Popular Websites.

Abstract:

Distributed denial of service (DDoS) attack is a continuous critical threat to the Internet. Derived from the low layers, new application-layer-based DDoS attacks utilizing legitimate HTTP requests to overwhelm victim resources are more undetectable. The case may be more serious when such attacks mimic or occur during the flash crowd event of a popular Website. Focusing on the detection for such new DDoS attacks, a scheme based on document popularity is introduced. An Access Matrix is defined to capture the spatial-temporal patterns of a normal flash crowd. Principal component analysis and independent component analysis are applied to abstract the multidimensional Access Matrix.

Algorithm / Technique used:

Dynamics of Access Matrix.

Algorithm Description:


1) We define the Access Matrix (AM) to capture spatial-temporal patterns of normal flash crowd and to monitor App-DDoS attacks during flash crowd event.
2) We use hidden semi-Markov model (HsMM) to describe the dynamics of AM and to achieve a numerical and automatic detection.
3) We apply principal component analysis (PCA) and independent component analysis (ICA) to deal with the multidimensional data for HsMM. and
4) We design the monitoring architecture and validate it by real flash crowd traffic and three emulated App-DDoS attacks.


Proposed System:

A novel anomaly detector based on hidden semi-Markov model is proposed t[/b]o describe the dynamics of Access Matrix and to detect the attacks. The entropy of document popularity fitting to the model is used to detect the potential application-layer DDoS attacks. Numerical results based on real Web traffic data are presented to demonstrate the effectiveness of the proposed method.


:
Hardware Requirements

¢ SYSTEM : Pentium IV 2.4 GHz
¢ HARD DISK : 40 GB
¢ FLOPPY DRIVE : 1.44 MB
¢ MONITOR : 15 VGA colour
¢ MOUSE : Logitech.
¢ RAM : 256 MB
¢ KEYBOARD : 110 keys enhanced.

Software Requirements

¢ Operating system :- Windows XP Professional
¢ Front End :- Java Technology


read 69.50.213.96:8080/javaabstracts/Monitoring%20the%20Application-Layer%20DDoS%20Attacks%20for%20popular%20websites.pdf to get full report of Monitoring the Application Layer-DDoS Attack for Popular Websites
Use Search at http://topicideas.net/search.php wisely To Get Information About Project Topic and Seminar ideas with report/source code along pdf and ppt presenaion
Reply
smd.imtiaz
Active In SP
**

Posts: 2
Joined: Dec 2010
#5
29-12-2010, 02:26 PM

hi,
thanks a lot for the ppt, can u provide the overall functionality of this. How we are going to protect/minimizing the attacks (depth about it) or any sample code...
Reply
seminar surveyer
Active In SP
**

Posts: 3,541
Joined: Sep 2010
#6
30-12-2010, 09:45 AM

for more on Monitoring the Application-Layer DDoS Attacks for Popular Websites, go through the following thread too

topicideashow-to-monitoring-the-application-layer-for-ddos-attack-for-popular-website

Reply
seminar surveyer
Active In SP
**

Posts: 3,541
Joined: Sep 2010
#7
10-01-2011, 02:18 PM



PRESENTED BY:
Yi Xie and Shun-Zheng Yu, Member, IEEE


Abstract
Distributed denial of service (DDoS) attack is a continuous critical threat to the Internet. Derived from the low layers, new application-layer-based DDoS attacks utilizing legitimate HTTP requests to overwhelm victim resources are more undetectable. The case may be more serious when such attacks mimic or occur during the flash crowd event of a popularWebsite. Focusing on the detection for such new DDoS attacks, a scheme based on document popularity is introduced. An Access Matrix is defined to capture the spatial-temporal patterns of a normal flash crowd. Principal component analysis and independent component analysis are applied to abstract the multidimensional Access Matrix. A novel anomaly detector based on hidden semi-Markov model is proposed to describe the dynamics of Access Matrix and to detect the attacks. The entropy of document popularity fitting to the model is used to detect the potential application-layer DDoS attacks. Numerical results based on real Web traffic data are presented to demonstrate the effectiveness of the proposed method.

INTRODUCTION
DISTRIBUTED denial of service (DDoS) attack has caused severe damage to servers and will cause even greater intimidation to the development of new Internet services. Traditionally, DDoS attacks are carried out at the network layer, such as ICMP flooding, SYN flooding, and UDP flooding, which are called Net-DDoS attacks in this paper. The intent of these attacks is to consume the network bandwidth and deny service to legitimate users of the victim systems. Since many studies have noticed this type of attack and have proposed different schemes (e.g., network measure or anomaly detection) to protect the network and equipment from bandwidth attacks, it is not as easy as in the past for attackers to launch the DDoS attacks based on network layer. When the simple Net-DDoS attacks fail, attackers shift their offensive strategies to application-layer attacks and establish a more sophisticated type of DDoS attacks. To circumvent detection, they attack the victim Web servers by HTTP GET requests (e.g., HTTP Flooding) and pulling large image files from the victim server in overwhelming numbers. In another instance, attackers run a massive number of queries through the victim’s search engine or database query to bring the server down [1]. We call such attacks application-layer DDoS (App-DDoS) attacks. The MyDoom worm] and the CyberSlam are all instances of this type attack. On the other hand, a new special phenomenon of network traffic called flash crow has been noticed by researchers during the past several years. On the Web, “flash crowd” refers to the situation when a very large number of users simultaneously accesses a popular Website, which produces a surge in traffic to theWebsite and might cause the site to be virtually unreachable.


for more:
docs.googleviewer?a=v&q=cache:zcpI7P5mSGgJConfusedist.sysu.edu.cn/~syu/Publications/IEEE_TN09_4548145.pdf+characteristics+of+traffic.+Therefore,+App-DDoS+attacks+may+be+stealthi&hl=en&gl=in&pid=bl&srcid=ADGEESifFTU0v6jMInwrR0GP25w34nyLqkhzaiS92wICJ8d4RwpP1w8KUxIFXQOM1lzfP9HoVFbTzzd8bNUDY20mT2u2i8qtFGgj1mDeb3pCjkI2llJpHgobKi8O29LUiB6W1Q-8r2JA&sig=AHIEtbRMXZxI64N7AjwnSJn_XwpdQvzeoA



Reply
rajendra_p
Active In SP
**

Posts: 1
Joined: Feb 2011
#8
23-02-2011, 12:14 AM

Hi,

This is prasad.

Could you please provide me the full document
Reply
sai_1218
Active In SP
**

Posts: 3
Joined: Jun 2010
#9
17-03-2011, 07:13 PM

please send me the full documentation for this project and implimentation its very urgent my mail id is SAI_1218@YAHOO.CO.IN
Reply
usha kumari
Active In SP
**

Posts: 1
Joined: Apr 2011
#10
15-04-2011, 04:03 PM

Hi can u give the Project source code please... i am at neck of the moment and my company is not finishing it... can u give me the source code i am an MCA guy... i am having final review in a week... reply me to sathishbece@gmail.com
Reply
brianbucknor
Active In SP
**

Posts: 4
Joined: Apr 2011
#11
18-04-2011, 08:37 AM

This is the main thing about it. An Access Matrix is defined to capture the spatial-temporal patterns of a normal flash crowd. Principal component analysis and independent component analysis are applied to abstract the multidimensional Access Matrix.
Reply
radhaA
Active In SP
**

Posts: 1
Joined: May 2011
#12
18-05-2011, 07:37 PM

Sir, I need the coding to apply the algorithm in Monitoring the application layer -ddos attack for popular website. Please guide me to do the project and implimentation. If you have coding please send to my mailid:krnradha@gmail.com
Thank you
Reply
seminar addict
Super Moderator
******

Posts: 6,592
Joined: Jul 2011
#13
26-01-2012, 10:17 AM

to get information about the topic Monitoring the Application-Layer DDoS Attacks for popular sites full report,ppt and related topic refer the link bellow

topicideashow-to-monitoring-the-application-layer-ddos-attack-for-popular-websites-full-report

topicideashow-to-monitoring-the-application-layer-for-ddos-attack-for-popular-website

seminar and presentationproject and implimentationsattachment.php?aid=9271
Reply

Important Note..!

If you are not satisfied with above reply ,..Please

ASK HERE

So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page

Quick Reply
Message
Type your reply to this message here.


Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Possibly Related Threads...
Thread Author Replies Views Last Post
  web spoofing full report computer science technology 13 9,012 20-05-2016, 11:59 AM
Last Post: Dhanabhagya
  DETECTION OF WORMHOLE ATTACK IN MANET seminar ideas 5 1,399 26-08-2015, 12:37 AM
Last Post: Leenas
  heinous crime monitoring system jaseelati 0 274 06-12-2014, 03:36 PM
Last Post: jaseelati
  android full report computer science technology 57 73,217 24-09-2014, 05:05 PM
Last Post: Michaelnof
  steganography full report project report tiger 23 25,789 01-09-2014, 11:05 AM
Last Post: computer science crazy
  3D PASSWORD FOR MORE SECURE AUTHENTICATION full report computer science topics 144 92,700 13-05-2014, 10:16 AM
Last Post: seminar project topic
Video Random Access Memory ( Download Full Seminar Report ) computer science crazy 2 2,419 10-05-2014, 09:44 AM
Last Post: seminar project topic
Brick Virtual keyboard (Download Full Report And Abstract) computer science crazy 37 31,030 08-04-2014, 07:07 AM
Last Post: Guest
  Towards Secure and Dependable Storage Services in Cloud Computing FULL REPORT seminar ideas 5 4,152 24-03-2014, 02:51 PM
Last Post: seminar project topic
  eyeOS cloud operating system full report seminar topics 8 11,474 24-03-2014, 02:49 PM
Last Post: seminar project topic