2013
DOI: 10.1016/j.jksuci.2012.05.003
|View full text |Cite
|
Sign up to set email alerts
|

Analysis of accounting models for the detection of duplicate requests in web services

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
5
0

Year Published

2013
2013
2018
2018

Publication Types

Select...
4
1
1

Relationship

0
6

Authors

Journals

citations
Cited by 7 publications
(5 citation statements)
references
References 22 publications
0
5
0
Order By: Relevance
“…This is especially important for web sites that provide remote rocedure call (RPC). Therefore, the problem of Denial of Service (DoS) attack is discussed in [19], and various solutions are analyzed. What is more, a new model is proposed to protect against this type of attack by storing the history of the client requests.…”
Section: Literature Reviewmentioning
confidence: 99%
“…This is especially important for web sites that provide remote rocedure call (RPC). Therefore, the problem of Denial of Service (DoS) attack is discussed in [19], and various solutions are analyzed. What is more, a new model is proposed to protect against this type of attack by storing the history of the client requests.…”
Section: Literature Reviewmentioning
confidence: 99%
“…Cookie based accounting model [7] records each and every client request in the cookie and the hash value of the cookie in the server database to detect the client's misbehavior. These misbehavior ranges from modifying the cookie information or retransmitting the prior request cookie along with the current request.…”
Section: Related Workmentioning
confidence: 99%
“…Venkatesan et al . designed and modified the cookie information by resending it to the requestors. Moreover, the clients' misbehaviour was identified by monitoring service requests received by sever.…”
Section: Related and Background Workmentioning
confidence: 99%
“…However, because the proposed system demands more time constraints, its efficiency rate is evaluated through the experiment results. Venkatesan et al [22] designed and modified the cookie information by resending it to the requestors. Moreover, the clients' misbehaviour was identified by monitoring service requests received by sever.…”
Section: Related and Background Workmentioning
confidence: 99%