In this method while sending the data towards destination a proper method of accepting that data packet is performed so the source known that the data has been received elaborate with diagram and example.[10 marks]
Research gaps:-
1) In proposed technique for Distibuted Denial of services (DDOS) attack Tool TFN 2K is used under restricted invironment. In future other tools with number of different environments can be experimented to get clearer results.
2) The proposed technique works under intimated domain hence damages under DDOS attacks are not handled realistically.
3) The proposed technique ignored inception of attack reaserchers can work in the direction.
Comments
Leave a comment