Work place: Dept of Computer Application, Guru Nanak Khalsa College, Yamunanagar, INDIA
E-mail: bharat_dhiman@sify.com
Website:
Research Interests: Neural Networks, Computer Networks, Information Security, Network Security, Data Structures and Algorithms
Biography
Bharat Bhushan is employed as Head and Associate Professor in Department of Computer Science & Applications, Guru Nanak Khalsa College, Yamunanagar, India. He has done Ph.D. in Computer Science & Applications from Kurukshetra University, Kurukshetra, India. His qualification also includes M.C.A and Master of Science (Physics). He has teaching and research experience of more than 26 years. He is professional Member of various National and International Associations. He has more than 30 research papers to his credit in various international/national journals and conferences. His research interests are in the fields of Software Quality and Mobile Networks.
By Karanbir Singh Kanwalvir Singh Dhindsa Bharat Bhushan
DOI: https://doi.org/10.5815/ijcnis.2017.03.05, Pub. Date: 8 Mar. 2017
Distributed Denial of Service (DDoS) attack is a large-scale, coordinated attack on the availability of services of a target/victim system or network resource/service. It can be launched indirectly through many compromised machines on the Internet. The Purpose behind these attacks is exhausting the existing bandwidth and makes servers deny from providing services to legitimate users. Most detection systems depend on some type of centralized processing to analyze the data necessary to detect an attack. In centralized defense, all modules are placed on single point. A centralized approach can be vulnerable to attack. But in distributed defense, all of the defense modules are placed at different points and do not succumb to the high volume of DDoS attack and can discover the attacks timely as well as fight the attacks with more resources. These factors clearly indicate that the DDoS problem requires a distributed solution than the centralized solution. In this paper, we compare both types of defense mechanisms and identify their relative advantages and disadvantages. Later they are compared against some performance metrics to know which kind of solution is best.
[...] Read more.Subscribe to receive issue release notifications and newsletters from MECS Press journals