# Introduction Denial-of-Service (DoS) assault is an endeavor by aggressors to keep the true blue clients from utilizing the data administration. In a DDoS assault, these endeavors originate from an extensive number of circulated hosts that organize to surge the exploited person with a plenitude of assault bundles all the while. Conveyed foreswearing of-administration (DDoS) assaults present genuine dangers to servers in the Internet. DDoS assaults include in soaking the target machine with appeals, such that it can't react to authentic movement. Such assaults for the most part prompt a server over-burden. To dispatch a DDoS assault, the aggressors first creates a system of bargained PCs that are utilized to produce the colossal volume of activity expected to refuse any assistance to honest to goodness clients of the victimized person. At that point the aggressor introduces assault apparatuses on the bargained hosts of the assault system. The hosts running these assault apparatuses are known as zombies, and they can be utilized to complete any assault under the control of the aggressor. The vast majority of the current procedures can't segregate the DDoS assaults from the surge of honest to goodness getting to. These assaults are focusing on the application level. Application layer DDoS assaults may concentrate on debilitating the server assets, for example, Sockets, CPU, memory, circle/database data transmission, and I/O transfer speed. These assaults are normally more productive than TCP or UDP-based assaults, obliging less system associations with accomplish their malevolent purposes. They are likewise harder to distinguish, both on the grounds that they don't include a lot of activity and in light of the fact that they appear to be like ordinary kind movement. # II. # Rival Methods ? We have adopted a hidden semi-Markov process to present the behavior of Internet users .The hidden semi-Markov approach is a complex algorithm. When users visit a website, it traces and records the whole visiting history of each user. ? It is noticeable that the hidden semi-Markov method is unlikely to perform effectively in backbone traffic. ? Another typical approach against AL-DDoS attacks is to use CAPTCHA. This method requires users to recognize strings in a fuzzy picture and submit a response to a web server for authentication. However, users sometimes consider this operation as a negative experience to surf the Internet. ? The introduced wavelets to identify anomalies in network traffic. But wavelet analysis is generally a post-mortem analysis and cannot be used for online processing. Previously proposedsignal analysis of network traffic anomalies mechanism to voluntarily increase the bandwidth utilization of legitimate users. However, this approach cannot reduce the network congestion and the load of web servers. A countermeasure that consisted of a suspicion assignment process and a DDoS-resilient scheduler. The suspicion process assigns a continuous 'valued vs. binary' measure onto each client session. It further utilizes these values to determine if and when to schedule the requests of a session. However, this approach is still too time-consuming to detect AL-DDoS attacks in large volume traffic. # III. # Proposed System In this paper, we are motivated to design a defense system at the backbone level. This system is able to detect AL-DDoS attacks targeting Internet web servers. Currently, most of these web servers are deployed together in a data center connecting directly to the backbones. Thus, it is critical to implement an effective method to detect AL-DDoS attacks and filter the malicious traffic in backbones before they causes detriments to the web servers. The proposed system has low complexity and can real-timely run in high volume traffic. One way to protect from DoS attacks is to allow only authorized clients to access the web server. Compared with non-attack cases, the number of requests in a session increases significantly in a very short time period in DDoS attack cases. Considering the above two issues, a hybrid approach for countering application layer DDoSatttacks is proposed. This approach gives priority to the good (legitimate) clients, while severely limiting the access to the attackers. Each client is assigned with a trust value by the server based on the access behavior. A client's trust value is embedded in a HTTP cookie that is included in all server responses to the client. Using the cookie, a legitimate client can include the trust value in all its future requests to identify itself to the server. A client presenting a valid trust value to the server will be given the priority over other requests. New clients are assumed to be assigned with the lowest trust value by default by the server and updated in the response. The trust value varies according to the access pattern of the client. The trust values are assigned in such a way that trustattacker 0, then the new trust value is computed as follows: Trust new = trustold + ? * B(req)?..(2) Otherwise, Trust new = trust old /(?(1-B(req)))?.(3) The additive increase ensures that the trust value slowly increases as the client behaves benignly; while the multiplicative decrease ensures that the trust value drops very quickly upon detecting a DoS attack from the client. # b) Entropy calculation Let the request in a session be denoted as r xy , where x, y I, a set of positive integers. 'x' denotes the request number in session 'y'. Let |(r y ,t)| denote the number of requests per session y, at a given time t. Then, For a given interval Î?"t, the variation in the number of requests per session y is given as follows; The probability of the requests per session y, is given by Let R be the random variable of the number of requests per session during the interval Î?"t, therefore, the entropy of requests per session is given as Based on the characteristics of entropy function, the upper and lower bound of the entropy H(R) is defined as 0 ? H(R) ? log N? (8) where N is the number of the requests. Under DoS attack, the number of request increases significantly and the following equation holds Where C is the maximum capacity of the session. # c) Rate Limiter To avoid falsely detection, rate-limiter is introduced. Once the entropy is calculated, compute the degree of deviation from the predefined entropy. The system first sets a threshold for acceptable deviation. If the computed deviation exceeds the threshold, then the session is forced to terminate immediately. Otherwise, second level filter is applied by the rate limiter. The system also defines a threshold for validating a user based on the trust score. A user is considered to be legitimate only if the trust score exceeds the threshold. Otherwise, the user is considered malicious and the session is dropped immediately. The legitimate sessions are then passed to the scheduler for getting service from the server. # d) Scheduler If the user is legitimate, then the scheduler schedules the session based on the highest trust value first (user with highest trust value) policy. The wellbehaved users will have a little or no deviation. In such case, the legitimate user gets a quicker service. In addition to the scheduling policy, system workload is also considered before scheduling the request for getting service. # e) Algorithms Algorithm to compute the entropy from system log Input: system log 1. Extract the request arrivals for all sessions, page viewing time and the sequence of requested objects for each user from the system log. 2. Compute the entropy of the requests per session using the formula: a. Detection Algorithm Input the predefined entropy of requests per session. Define the threshold for allowable deviation (Td) For each session waiting for detection Extract the trust value from the request Validate the trust value If the trust value issued is valid Extract the requests arrivals Compute the entropy for each session using (7) Compute the degree of deviation # Conclusion In this paper, an effective and efficient hybrid scheme against DDoS attacks based on trust value and information metric (entropy) is proposed. This approach not only counters the illegitimate flows but also avoids the flooding of the legitimate flows. Further is add detect trust value is used to detect the legitimate user from the attackers at the first level. Then, based on the information metric of the current session, the sessions that are assumed to be suspicious are dropped. The legitimate flows are then scheduled by the scheduler based on the system workload the trust value of the client. Thus the legitimate clients gets more priority in accessing the information and services. 11![Journal of C omp uter S cience and T echnology Volume XV Issue III Version I Year ( ) & Generally, DDoS assaults are completed at the system layer. As of late, there are an expanding number of DDoS assaults against online administrations and Web applications.](image-2.png "A 11 Global") ![The trust value(Trust new ) is updated and embedded in the response message of the server for future use.](image-3.png "?") ![, t+?t) = |(ry, t+?t)| -|(ry, t)|?. (5) Py(ry) = Ny(ry, t+?t) / ? ? Ny(ry, t + ?t) ) = -? y Py(ry) log Py(ry)?(7) |H(R) -C| > threshold, t ?(9) H(R) = -? y Py(ry) log Py(ry) Hnew(R) = -? y Py(ry) log Py(ry) 13 Global Journal of C omp uter S cience and T echnology Volume XV Issue III Version I Year ( ) If the degree of deviation is less than the allowable threshold (Td), then Allow the session to get service from the web server Update the trust value Embed the trust value in the response message and send it to client Else The session is malicious; drop it Else Assign the lowest trust value to the client Drop the session b.Expected Table](image-4.png "") 1 © 2015 Global Journals Inc. (US) 1 © 2015 Global Journals Inc. (US) * Detection and defense of application-layer DDoS attacks in backbone Web traffic WeiZhou Weijiajia YangxiangShengwen WanleiZhou Future Generation Computer Systems 38 2014 * A Hybrid Approach to Counter Application Layer DDoS Attacks SDevi PYogesh International Journal on Cryptography and Information Security (IJCIS) 2 2 June 2012 * Worldwide network infrastructure security report Arbor Networks 2011 Arbor Networks Tech. Rep. * A large-scale hidden semi-Markov model for anomaly Detectionon user browsing behaviors YXie SYu IEEE/ACM Trans.Netw 17 1 2009 * Captcha: using hardai problemsFor security LVon Ahn MBlum NJHopper JLangford 2003 EUROCRYPT * Botz-4-sale: surviving organized Ddos attacks that mimic flash crowds SKandula DKatabi MJacob ABerger Proceedings of the 2nd Conference On Symposiumon Networked Systems Design and Implementation," NSDI'05,USENIX Association the 2nd Conference On Symposiumon Networked Systems Design and Implementation," NSDI'05,USENIX AssociationBerkeley, CA, USA 2005 * A signal analysis of network traffic anomalies PBarford JKline DPlonka ARon Proceedings of the 2 nd ACMSIGCOMM Work shop on Internet Measurement the 2 nd ACMSIGCOMM Work shop on Internet MeasurementNew York, NY, USA IMW' 02, ACM 2002 * DDoS defense by offense MWalfish MVutukuru HBalakrishnan DKarger SShenker ACM Trans. Comput. Syst 28 1 2010 * DDoS-resilient scheduling to counter application layer attacks under imperfect detection SRanjan RSwaminathan MUysal EKnightly Proceedings". INFOCOM 2006. 25th IEEE International Conference on Computer Communications ". INFOCOM 2006. 25th IEEE International Conference on Computer Communications 2006 * Monitoring the application-layer ddos attacks for popular websites YXie SZhengyu IEEE/ACM Trans. Netw 17 1 2009 * D = |hnew R)| -|H(R)|