
so our DDoS protector keeps the CPU utilization rate below 75% under attack. We 
can keep the CPU utilization rate below 60% after starting up the authentication 
mechanism. 
5 Conclusions 
The defense mechanism of DDoS attacks, particularly the multi-based, 
multi-approached and diversified flow method of offensive artifice, simulating the 
competition of legal users, inhabits a keystone and difficulty in the internet security 
arena, especially for the mini websites. This dissertation discusses and implements the 
Counter HTTP DDoS Attacks based on Weighted Queue Random Early Drop.   
Our mechanism is characteristically distinct from current methods:     
(1) Utilizes few resources and does not require participation from other routers. In 
general, requires nothing from the internet or the management services of ISP.   
(2) Allows for simple and convenient updating of the Turing test. A few shares of 
restriction codes as well as the amendment of protocol stacks are the only renovations 
needed for withstanding DDoS without any negative impact on the clients. 
(3) Optimize the web flow. Enhance the server’s efficiency by precluding and 
dismissing the overall current abruptness of ordinary flow,   
All in all, allocating the server’s resources to both the validation and service 
components with more efficiency, and applying the Turing test to larger websites for 
DDoS defense are voids we are seeking to fill in this sector of internet security. 
References 
1.  Jelena Mirkovic,  Sven Dietrich,  Internet  Denial of Service: Attack and Defense 
Mechanisms, Prentice Hall PTR, December 30, 2004,1-400 
2.  Siris VA, Application of anomaly detection algorithms for detecting SYN flooding attacks 
In: Regency H, ed. Global Telecommunications Conf. (GLOBECOM 2004). Dallas: IEEE, 
2004. 2050-2054. 
3.  Li W, Wu LF, Hu GY. Design and implementation of distributed intrusion detection system 
NetNumen. Journal of Software, 2002,13(8):1723-1728   
4.  Sung M, Xu J. IP traceback-based intelligent packet filtering: A novel technique for 
defending against Internet DDoS attacks. IEEE Trans. on Parallel and Distributed Systems, 
2003, 14(9):861-872. 
5.  A. Chandra and P. Shenoy. Effectiveness of dynamic resource allocation for handling 
Internet, University of Massachussets, TR03-37, 2003. 
6.  Liang F, Yau D. Using adaptive router throttles against distributed denial-of-service attacks. 
Journal of Software, 2002,13(7): 1120-1127   
7.  Morein, W.G., Stavrou, A., Cook, D.L., Keromytis, A.D., Misra, V., Rubenstein, D.: Using 
Graphic Turing Tests to Counter Automated DDoS Attacks Against Web Servers. In: 
Proceedings of the 10th ACM International Conference on Computer and Communications 
Security (CCS). (2003) 8-19. 
8.  S. Kandula, D. Katabi, M. Jacob, and A. Berger. Botz-4-sale:Surviving organized DDoS 
attacks that mimic flash crowds. In USENIX NSDI, May 2005. 
80