Entropy Based Approach to Prevent the DDoS Attacks for Secured Web Services

(*) Corresponding author

Authors' affiliations

DOI's assignment:
the author of the article can submit here a request for assignment of a DOI number to this resource!
Cost of the service: euros 10,00 (for a DOI)


A web service is a standards-based, language-agnostic software entity, that it accepts specially formatted requests from other software entities on remote machines via vendor and transport neutral communication protocols, producing application specific responses. Web services are used in every nook and corner of the world. The main strategy of web service is the availability of web service to all and its security over a distributed architecture. To ensure customer satisfaction web services must be available to all the users without any hindrance. The intrusion of attackers may be in any form such as a person or a program to cease the availability of the server. The Distributed Denial of Service attack is one of the severe attacks. The proposed system is an entropy based system which prevents the web service from the denial of service attack.
Copyright © 2013 Praise Worthy Prize - All rights reserved.


DDoS; Entropy; Security; Web Service

Full Text:



Aboosaleh Mohammad Sharifi,Saeed K. Amirgholipour,Mehdi Alirezanejad, Baharak Shakeri Aski , Mohammad Ghiami Availability challenge of cloud system under DDOS attack, Indian Journal of Science and Technology June 2012. ISSN: 0974- 6846

Amazon Web Services. Amazon Elastic Compute Cloud (ec2), Available on theWww, 2009. /http://aws.amazon.com/ec2S, last accessed 10, November 2009

Asayuki Murakami and Nakaji Honda (2007) A study on the modeling ability of the IDS method: A soft computing technique using pattern-based information processing. Int. J. Approx. Reasoning. 45(3), 470-487

Ashley Chonka ,Yang Xiang, Wanlei Zhou Alessio Bonti”Cloud security defence to protect cloud computing against HTTP-DoS and XML-DoS attacks” Journal of Network and Computer Applications ,Volume 34 Issue 4, July, 2011Pages 1097-1107

Basheer Al-Duwairi and Manimaran G (2009) JUSTgoogle: a search engine-based defense against botnet-based DDoS attacks. Proce. IEEE Int. Conf.Commun (ICC'09)

Belenky A, N. Ansari, Tracing Multiple Attackers with Deterministic Packet Marking (DPM), IEEE Pacific Rim Conference on Communications, Computers and Signal Processing, 2003, pp.49-52.

Chonka, Ashley, Zhou, Wanlei and Xiang, Yang 2008, Protecting web services with service oriented traceback architecture, in CIT 2008 : Proceedings of IEEE 8th International Conference on Computer and Information Technology, IEEE, Piscataway, N.J., pp. 706-711.

Chonka, A., Singh, J., Zhou, W. "Chaos Theory Based Detection against Network Mimicking. DDoS Attacks." International Journal of Computer and Electrical Engineering,April, 2010 ,IEEE Communications Letters, Vol. 13, No. 9

Dean D. An algebraic approach to IP traceback. ACM Transactions on Information and System Security (1094–9224) 2002;5(2):119

Dittrich D.The ‘mstream’ distributed denial of service attack tool. University of Washington, /http://staff.washington.edu/dittrich/misc/mstream.analysis.txtS,2000

Dittrich D. The DOS Project’s ‘‘trinoo’’ distributed denial of service attack tool.University of Washington analysis, 1999

L. Feinstein, D. Schnackenberg, R. Balupari, and D. Kindred. “Statistical approaches to DDoS attack detection and response”. In Proc of DARPA Information Survivability Conference and Exposition, 2003.

P. Garcı´a-Teodoro, J. Dı´az-Verdejo, G. Macia´-Ferna´ndez, E. Va´zquez Anomaly-based network intrusion detection:Techniques, systems and challenges computers & s e c u rity 2 8 ( 2 0 0 9 ) Elsevier Ltd.

Jensen,M. Gruschka, N.; Herkenhoner, R.; Luttenberger, N., SOA and Web Services: New Technologies, New Standards - New Attacks, Fifth European Conference on Web Services, 2007. ECOWS '07 ISBN: 978-0-7695-3044-4.

Jose Nazario (2008) DDoS attack evolution. Network Security. l7, 7–10.

He Y, Chen W, Peng, W, Yang, M. Efficient and Beneficial defense against DDOS Direct Attack and Reflector Attack, ISPA, 2005, LNCS, vol. 3758, p. 576–87 Springer-Verlag Berlin Heidelberg 2005.

Hibler,Ricci,Stoller, Duerig Guruprasad S, Stack T, et al. Large-scale virtualization in the emulab network testbed. In: Proceedings of the 2008 USENIX annual technical conference, 2008.

Loannis G. Baltopoulos, Introduction to Web Services, CERN School of Computing (iCSC), 2005 Geneva, Switzerland

A. Lakhina , M. Crovella and C. Diot , “ Mining anomalies using traffic feature Distributions “. In proc. of ACM SIGCOMM, 2005.

W. Lee, D. Xiang, “Information-theoretic measures for anomaly Detection”, In Proc. of IEEE Symposium on Security and Privacy, 2001.

G. Nychis, V. Sekar, D. G Andersen, H. Kim and H.Zhang, “An Empirical Evaluation of Entropy-Based Traffic Anomaly Detection”. Tech. Rep. CMUCS- 08-145, Computer Science Department, Carnegie Mellon University, 2008.


Thomas M. Cover and Joy A. Thomas, “Elements of Information Theory”, second edition, 2007.

S. Murugan, V. Ramachandran, Rough Sets Based Trustworthiness Evaluation of Web Services, (2012) International Review on Computers and Software (IRECOS), 7 (6), pp. 2974-2980.

He Li, Model of SNOD Algorithm of Spatial Outlier Data Mining and Analysis Based on Entropy, (2012) International Review on Computers and Software (IRECOS), 7 (6), pp. 2875-2879.


  • There are currently no refbacks.

Please send any question about this web site to info@praiseworthyprize.com
Copyright © 2005-2024 Praise Worthy Prize