Google scholar arxiv informatics ads IJAIS publications are indexed with Google Scholar, NASA ADS, Informatics et. al.

Call for Paper


March Edition 2023

International Journal of Applied Information Systems solicits high quality original research papers for the March 2023 Edition of the journal. The last date of research paper submission is February 15, 2023.

Detection of DDoS Attack in Semantic Web

Prashant Chauhan, Abdul Jhummarwala, Manoj Pandya Published in Information Sciences

International Journal of Applied Information Systems
Year of Publication: 2012
© 2012 by IJAIS Journal
Download full text
  1. Prashant Chauhan, Abdul Jhummarwala and Manoj Pandya. Article: Detection of DDoS Attack in Semantic Web. International Journal of Applied Information Systems 4(6):7-10, December 2012. BibTeX

    	author = "Prashant Chauhan and Abdul Jhummarwala and Manoj Pandya",
    	title = "Article: Detection of DDoS Attack in Semantic Web",
    	journal = "International Journal of Applied Information Systems",
    	year = 2012,
    	volume = 4,
    	number = 6,
    	pages = "7-10",
    	month = "December",
    	note = "Published by Foundation of Computer Science, New York, USA"


We are currently living in an era where information is very crucial and critical measure of success. Various forms of computing are also available and now a days it is an era of distributed computing where all the task and information are shared among participated nodes. This type of computing can have homogeneous or heterogeneous platform and hardware. The concept of cloud computing and virtualization has gained much momentum and has become a more popular phrase in information technology. Many organizations have started implementing these new technologies to further reduce costs through improved machine utilization, reduced administration time and infrastructure costs. Cloud computing also faces challenges. One of such problem is DDoS attack so in this paper we will focus on DDoS attack and how to overcome from it using honeypot. For this here open source tools and software are used. Typical DDoS solution mechanism is single host oriented and in this paper focused on distributed host oriented solution that meets scalability.


  1. NathalieWeiler, Eleventh IEEE International Workshops on Enabling Technologies,2002, "Honeypots for Distributed Denial of Service Attacks"
  2. Yuqing Mai, Radhika Upadrashta and Xiao Su, ITCC'04 "J-Honeypot: A Java-Based Network Deception Tool with Monitoring and Intrusion Detection"
  3. Yeonhee Lee, Wonchul Kang, and Youngseok Lee, 51-63, TMA'11"A Hadoop-based Packet Trace Processing Tool"
  4. Yun Yang, Hongli Yang and JiaMi, IEEE, 2011, "Design of Distributed Honeypot System Based on Intrusion Tracking"
  5. Anup Suresh Talwalkar, 2011, "HadoopT - Breaking the Scalability Limits of Hadoop"
  6. Flavien Flandrin, 2010, "A Methodology To Evaluate Rate-Based Intrusion Prevention System Against Distributed Denial Of Service"


Cloud Security, Network Monitoring, Distributed Log Processing