DefinePK

DefinePK hosts the largest index of Pakistani journals, research articles, news headlines, and videos. It also offers chapter-level book search.

Prevention Mechanism For RUDY Attack And Its Comparison


Article Information

View Article

Title: Prevention Mechanism For RUDY Attack And Its Comparison

Authors: Sheena Qadir Memon, Liaquat Ali Thebo, Syed Naveed Jafri, Hyder Zaman Brohi

Journal: University of Sindh Journal of Information and Communication Technology

HEC Recognition History
Category From To
Y 2024-10-01 2025-12-31
Y 2023-07-01 2024-09-30
Y 2022-07-01 2023-06-30
Y 2021-07-01 2022-06-30
Y 2020-07-01 2021-06-30

Publisher: University of Sindh, Jamshoro

Country: Pakistan

Year: 2020

Volume: 4

Issue: 1

Language: English

Keywords: SecurityRUDY AttackHTTP attackWeb Server

Categories

Abstract

Rapid growth in the area of information technology causes IT professionals to make greater efforts to secure their network from Hackers. IT world called that attack RUDY (R U Dead Yet) attack Basically, RUDY attack is used by hackers to block or disrupt web-server services. Hacker is also trying to attack a web server using open ports. Each web server in the world has its exposed client ports (80, 8080,443 and 4433), and hackers use these ports to target web servers. You may want to use a web server on Microsoft Based Server (IIS) or Linux Based Server (Apache). RUDY attack on the 7th layer of HTTP traffic (DoS) attack, which basically injects POST body traffic to the server at a low rate to create so many sessions on the server. In this  proposed work, a RUDY attack would be undertaken and tested for its impact on the Microsoft Based Web-server as well as the Linux Based Web-server at the end of which the key would be bounced to lock the Web-server.


Paper summary is not available for this article yet.

Loading PDF...

Loading Statistics...