Phishing Attacks in Wireless Networks and Their Remedies

Implementing a Multi-stage Detection System for Mitigating DDoS Attacks in HTTP-based Client-Server Applications

Authors

  • Milind Bhalchandra Tadwalkar
  • Dr. Athar Ali

Keywords:

phishing attacks, wireless networks, remedies, DoS attacks, security tools, web-world, wireless systems, counter-offensive systems, 802.11 supported wireless systems, Client-Server application

Abstract

In this result paper we present study and Analysis of Phishing Attacks in Wireless Networks and Their Remedies. Denial of service (DoS) attacks has turned out to be a chief danger to existing computer systems. To include a superior perceptive on DoS attacks, this piece of writing gives an outline on accessible DoS attacks and main security tools in the web-world and wireless systems. Above all, here system supported and host supported DoS attack systems are expressed to demonstrate attack standards. DoS attacks have been categorized as per their main attack features. Pre-transmitted counter-offensive systems are too evaluated, together with chief security goods in use and delegated security techniques in study. Finally, DoS attacks and protections in 802.11 supported wireless systems are investigated at material, MAC as well as network layers.A Client-Server application assumes a noteworthy part to get ready with appropriated applications while decreasing the expense and executing the elite registering gadgets. The circulated framework in Client-Server application that depends on HTTP association experiences numerous security dangers including DDoS. Therefore, the point of HTTP based association permits us to make less defenceless framework against all conceivable DDoS attack. This framework fuses with Source Monitoring, Counting, Attack Detection and Prevention module with Turing test module to recognize the malignant hub. In this work, a Multi-stage identification framework is proposed which also incorporates Store based data Turing and Question era pool Turing tests to challenge the suspicious intruders all the more successfully and proficiently. The proposed framework is executed to check the proficiency of the work and to judge how adequately the proposed framework is fit to relieve the DDoS movement from system.

Downloads

Published

2018-11-01

How to Cite

[1]
“Phishing Attacks in Wireless Networks and Their Remedies: Implementing a Multi-stage Detection System for Mitigating DDoS Attacks in HTTP-based Client-Server Applications”, JASRAE, vol. 15, no. 11, pp. 581–587, Nov. 2018, Accessed: Jul. 08, 2024. [Online]. Available: https://ignited.in/jasrae/article/view/9113

How to Cite

[1]
“Phishing Attacks in Wireless Networks and Their Remedies: Implementing a Multi-stage Detection System for Mitigating DDoS Attacks in HTTP-based Client-Server Applications”, JASRAE, vol. 15, no. 11, pp. 581–587, Nov. 2018, Accessed: Jul. 08, 2024. [Online]. Available: https://ignited.in/jasrae/article/view/9113