Application Layer Proxy Detection, Prevention with Predicted Load Optimization

被引:0
|
作者
Dhaka, Vijaypal Singh [1 ]
Lamba, Vikas [2 ]
Anubhav [2 ]
Pathania, Divyanshu [2 ]
机构
[1] Manipal Univ, Comp Sci, Jaipur, Rajasthan, India
[2] Jaipur Natl Univ, Comp Sci, Jaipur, Rajasthan, India
关键词
Neural Networks; Digital Signature; Machine Learning; Computer Networks;
D O I
暂无
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
In this paper, we have formulated a solution for proxy usages in a network. We all are surrounded with digital signatures around us, we just need to filter those to make our network clean, secure, efficient. Is what we did in this research work. There is also a great need of load optimization at different points in the network. We have proposed a way to use machine learning and neural networks to apply it on a network. Our basic approach to do this work is a time quantum analysis for load prediction over a network and digital signature validation for proxy detection at the application layer. There are many methods to detect network statistics and security at different layers, but we need real-time analysis in the network and prevention measure right before it happens.
引用
收藏
页数:7
相关论文
共 50 条
  • [1] An Overview on Detection and Prevention of Application Layer DDoS Attacks
    Black, Samuel
    Kim, Yoohwan
    2022 IEEE 12TH ANNUAL COMPUTING AND COMMUNICATION WORKSHOP AND CONFERENCE (CCWC), 2022, : 791 - 800
  • [2] TCP Splice for application layer proxy performance
    Maltz, DA
    Bhagwat, P
    JOURNAL OF HIGH SPEED NETWORKS, 1999, 8 (03) : 225 - 240
  • [3] Exploring dynamic load imbalance solutions with the CoMD proxy application
    Pearce, Olga
    Ahmed, Hadia
    Larsen, Rasmus W.
    Pirkelbauer, Peter
    Richards, David F.
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2019, 92 : 920 - 932
  • [4] Media-Aware Proxy: Application Layer Filtering and L3 Mobility for Media Streaming Optimization
    Mysirlidis, Charalampos
    Lykoyrgiotist, Asimakis
    Dagiuklas, Tasos
    Politis, Ilias
    Kotsopoulos, Stavros
    2015 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2015, : 6912 - 6917
  • [5] Optimization and comparison of bacterial load and sampling time for bioaerosol detection systems in a poultry layer house
    Woodward, CL
    Park, SY
    Jackson, DR
    Li, XI
    Birkhold, SG
    Pillai, SD
    Ricke, SC
    JOURNAL OF APPLIED POULTRY RESEARCH, 2004, 13 (03): : 433 - 442
  • [6] Application Layer Security Proxy for Smart Grid Substation Automation Systems
    Wei, Dong
    Darie, Florin
    Shen, Ling
    2013 IEEE PES INNOVATIVE SMART GRID TECHNOLOGIES (ISGT), 2013,
  • [7] Application layer access path selection by using mobile proxy agents
    Tomikawa, Y
    Takai, Y
    ELECTRONICS AND COMMUNICATIONS IN JAPAN PART II-ELECTRONICS, 2001, 84 (12): : 46 - 53
  • [8] Utilization of SIP Contact Header for Reducing the Load on Proxy Servers in FoIP Application
    Sarvakar, Ketan J.
    Amin, Kiran
    Patel, Rajendra
    Patel, Menka
    Maheta, Komal
    Patel, Bhavesh
    2009 1ST INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE, COMMUNICATION SYSTEMS AND NETWORKS(CICSYN 2009), 2009, : 202 - 206
  • [9] Optimization enabled elastic scaling in cloud based on predicted load for resource management
    Trivedi, Naimisha Shashikant
    Panchal, Shailesh D.
    MULTIAGENT AND GRID SYSTEMS, 2023, 19 (04) : 289 - 311
  • [10] PROGESI: A PROxy Grammar to Enhance Web Application Firewall for SQL Injection Prevention
    Coscia, Antonio
    Dentamaro, Vincenzo
    Galantucci, Stefano
    Maci, Antonio
    Pirlo, Giuseppe
    IEEE ACCESS, 2024, 12 : 107689 - 107703