![]() We have simulated the network topology and attach the real time traces with the topology. ![]() ![]() In this project work, we have used the real time attack and legitimate traces in order to perform the simulation of DDoS attacks. One of the biggest challenges before researchers is to find the details of such attacks because due to damaging reputation issues, most of the commercial sites do not even disclose that they were blitzed by such a ttacks. ![]() As a result of it services of internet are severely degraded. Distributed Denial of Service (DDoS) is one of the major threats for the current Internet because of its ability to create a huge volume of malicio us data. Therefore, the availability of internet is very critical for the socio economic growth of t he society. They can use the internet to communicate with each other from all over the world, business can do their work over the internet, and students can take o nline classes and many more. There are about nine hundred million people, who are using internet now a day. It has changed the way we live in society and the way people interact with each other. Jaswinder Singh, Krishan Kumar, Monika Sachdeva, Navjot SidhuĪbstract - In this day and age, the internet is the new resource tool for the masses. International Journal of Scientific & Engineering Research, Volume 3, Issue 6, June-2012 1ĭDoS Attack’s Simulation u sing Legitimate and DDoS Attack’s Simulation Using Legitimate and Attack Real Data Sets
0 Comments
Leave a Reply. |