Sei sulla pagina 1di 20

WELCOME

DISCRIMINATING DDOS ATTACKS FROM


FLASH CROWDS USING FLOW CORRELATION
COEFFICIENT

GUIDE
R.SANTHINI RAJESWARI, M.C.A, M.Phil.,

S RATHI PRIYA
II M.SC [CS & IT]
B2711416
OBJECTIVE
Wireless network has developed enormously more
business model using cloud for data transaction it
lead to many hacking network attack .
In this attack DDOS attack is one of the vulnerable
attack , so the proposed aim to detect and protect
data from DDOS attack.
EXISTING SYSTEM
Previous work focused on extracting DDoS attack
features, and was followed by detecting and
filtering DDoS attack packets by the known
features.
However, these Methods cannot actively detect
DDoS attacks.
Flash crowds are unexpected, but legitimate,
dramatic surges of access to a server, such as
breaking news.
PROPOSED SYSTEM
The current most popular defense against flash crowd
attacks is the use of graphical puzzles to differentiate
between humans and bots.
This method involves human responses and can be
annoying to users.
Bots are caught and analyzed thoroughly via inverse
engineering techniques.
The proposed algorithm works independently of
specific DDoS flooding attack genres. Therefore, it is
effective against unknown forthcoming flooding
attacks.

FRONT END :DOT NET


BACK END :SQL SERVER



PROJECT DESCRIPTION
Command Authentication

Individualized Log File

Network

Correlation threshold analysis


DATABASE DESIGN
S. No FIELD NAME DATATYPE
& SIZE
DESCRIPTION
1 User_Name Varchar(25) User id
2 Password Varchar(25) Password
3 Date Date/Time Date
User Details
S NO FIELD NAME DATATYPE&
SIZE
DESCRIPTION
1 Fname Varchar(25) User id
2 Sname Varchar(25) Server id
3 Date Date & time Date
4 Acod Varchar(25) Acod
Admin Details
DATA FLOW DIAGRAM
Upper Thresold
Complete
the
Process
Find DDOS
ATTACK
Filtering
Process
Co Path
Threshold
Analysis
Lower
Threshold
TESTING
Testing is an investigation process of learning
information about the quality of the product or
service under test.
Unit testing : In this project unit was individual
source code was tested with or without network to
confirm the project architecture performing well.
IMPLEMENTATION
This project can be implement on client server
,WSN ,cluster and cloud computer network.

It perform freely without any modification on
WSN network,either it was restricted or
unrestricted.
CONCLUSION
Both Flash crowds and DDOS (Distributed Denial -of-
Service) attacks have very similar properties in terms of
internet traffic, however Flash crowds are legitimate flows
and DDOS attacks are illegitimate flows, and DDOS attacks
have been a serious threat to internet security and stability.
Propose a set of novel methods using probability metrics to
distinguish DDOS attacks from Flash crowds effectively and
simulations show that the proposed methods work well.
FUTURE ENHANCEMENT
Now days DDOS Attack can be overcome as
like in proposed system ,more dangerous and
fast growing seen is Sybil attack over WSN, A
WSN is a dynamic wireless network that can
be formed without any fixed and preexisting
infrastructure in which each node can act as a
router.
SCREEN SHOTS
Register Form
View File
File Request
Server Login Form


QUESTIONS?
THANK YOU

Potrebbero piacerti anche