Risk Mitigation of Denial of Service Attack
Ankit Pincha, Information Technology, Sardar Patel Institute of Technology, Mumbai, India.
Manuscript received on September 22, 2012. | Revised Manuscript received on October 26, 2012. | Manuscript published on October 30, 2012. | PP: 212-213 | Volume-2 Issue-1, October 2012. | Retrieval Number: F0619081612/2012©BEIESP
Open Access | Ethics and Policies | Cite
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)
Abstract: In this paper, I propose to mitigate the risk of denial of service attack. This involves identification of genuine traffic and giving it a higher priority. This results in lower priority for suspected malicious traffic. The priority of threads below the specified threshold will be discarded. Spoofed Denial of service attacks have also been taken care of thereby providing maximum security to the system by the attacker. The attacker suffers from a reduced priority of service. The reduced priority means greater response time for service request. The attacker might find his attack to be effective whereas the system might still be handling the request of genuine traffic.
Keywords: DOS, Risk, Mitigation, Attack, Denial of Service, Prevention.