University of Sindh Journal of Information and Communication Technology (Mar 2020)

Prevention Mechanism For RUDY Attack And Its Comparison

  • Sheena Qadir Memon,
  • Liaquat Ali Thebo,
  • Syed Naveed Jafri,
  • Hyder Zaman Brohi

Journal volume & issue
Vol. 4, no. 1
pp. 45 – 51

Abstract

Read online

Rapid growth in the area of information technology causes IT professionals to make greater efforts to secure their network from Hackers. IT world called that attack RUDY (R U Dead Yet) attack Basically, RUDY attack is used by hackers to block or disrupt web-server services. Hacker is also trying to attack a web server using open ports. Each web server in the world has its exposed client ports (80, 8080,443 and 4433), and hackers use these ports to target web servers. You may want to use a web server on Microsoft Based Server (IIS) or Linux Based Server (Apache). RUDY attack on the 7th layer of HTTP traffic (DoS) attack, which basically injects POST body traffic to the server at a low rate to create so many sessions on the server. In this proposed work, a RUDY attack would be undertaken and tested for its impact on the Microsoft Based Web-server as well as the Linux Based Web-server at the end of which the key would be bounced to lock the Web-server.

Keywords