Defence Mechanism of Distributed Reflective Denial of Service (DRDOS) Attack by using Hybrid (CPU-GPU) Computing System

Author(s):  
Gagan deep ◽  
◽  
Er. Meena kshi
Author(s):  
Giancarlo Alfonsi ◽  
Stefania A. Ciliberti ◽  
Marco Mancini ◽  
Leonardo Primavera

2014 ◽  
Vol 13s7 ◽  
pp. CIN.S16349 ◽  
Author(s):  
Sungyoung Lee ◽  
Min-Seok Kwon ◽  
Taesung Park

In genome-wide association studies (GWAS), regression analysis has been most commonly used to establish an association between a phenotype and genetic variants, such as single nucleotide polymorphism (SNP). However, most applications of regression analysis have been restricted to the investigation of single marker because of the large computational burden. Thus, there have been limited applications of regression analysis to multiple SNPs, including gene–gene interaction (GGI) in large-scale GWAS data. In order to overcome this limitation, we propose CARAT-GxG, a GPU computing system-oriented toolkit, for performing regression analysis with GGI using CUDA (compute unified device architecture). Compared to other methods, CARAT-GxG achieved almost 700-fold execution speed and delivered highly reliable results through our GPU-specific optimization techniques. In addition, it was possible to achieve almost-linear speed acceleration with the application of a GPU computing system, which is implemented by the TORQUE Resource Manager. We expect that CARAT-GxG will enable large-scale regression analysis with GGI for GWAS data.


Computation ◽  
2016 ◽  
Vol 4 (1) ◽  
pp. 13 ◽  
Author(s):  
Giancarlo Alfonsi ◽  
Stefania Ciliberti ◽  
Marco Mancini ◽  
Leonardo Primavera

2021 ◽  
Vol 37 ◽  
pp. 01016
Author(s):  
B N Ramkumar ◽  
T Subbulakshmi

Transmission Control Protocol Synchronized (SYN) flooding contributes to a major part of the Denial of service attacks (Dos) because of the easy to exploit nature of the TCP three way handshake mechanism. Attackers use this weakness to overflow the TCP queue of the server and make its re-sources consumed resulting it to be unavailable for the requests of legitimate users. So we are in need of a quick and precise defence mechanism to detect the TCP-SYN Flood attack. The main objective of the paper is to propose a detection and prevention mechanism of the TCP-SYN flood attack using adaptive thresholding. Adaptive threshold algorithm (ATA) is used to calculate dynamic threshold .Thus this algorithm helps to overcome the limitations of static thresholding like high false positive ratio and also alert users after violation of the threshold calculated by adaptive thresholding algorithm. The result of the suggested mechanism is very effective in the detection and prevention of the TCP SYN flood attack using adaptive thresholding algorithm.


2019 ◽  
Vol 8 (4) ◽  
pp. 10766-10774

In the digital world, maintaining information is much difficult. Without security measures and controls in place, data might be subjected to an attack. Now a day’s several attacks are evolved & Distributed Denial of Service (DDOS) is one of them. There are various categories of DDOS attack.SYN flood is addressed as one of the most dangerous attacks. In three way handshaking method a SYN packet is generated and a received ACK acknowledgement is provided to the corresponding. When the SYN packet is generated continuously from random sourcesis considered as flooding. And it’s known as SYN flood attacks. This paper is constructed with a proposed technique for the betterment of both the detection and defense techniques against it. The detection process is improved by a database added in the server for accepting random flooding for a limited time interval. And the defense algorithm is a developed design operated by scrolling the pending requests from database and checking the accessibility of the user and stop requesting otherwise. There are two parts of this research paper. The first one is to discuss extensively the various aspects of SYN Flood attack and developing the knowledge of this flooding attack mechanisms and the second one is to detect the SYN Flood attack and finding a better mitigation process through which we can reduce the loss of any information that generally happens by this deadly flooding. For saving server from crush it is important to mitigate this attack. So it may prove effective in home appliance servers like IoT, IoE that any of the fraud can't get access into the server for any harmful activity


Sign in / Sign up

Export Citation Format

Share Document