Please use this identifier to cite or link to this item:
http://hdl.handle.net/10603/356189
Title: | Effective Attack Handling Methods for Layer Wise Spoofing Based Man in the Middle Attacks in Machine to Machine Networks |
Researcher: | Sabitha Banu A |
Guide(s): | Padmavathi G |
Keywords: | Engineering and Technology Computer Science Computer Science Interdisciplinary Applications |
University: | Avinashilingam Institute for Home Science and Higher Education for Women |
Completed Date: | 2021 |
Abstract: | Machine to Machine networks (M2M) is a technology where all the devices worldwide are newlineinterconnected. Because a growing number of people and companies rely on M2M networks, they are newlinevulnerable to Configuration attack, DoS attack, Man in the Middle attack (MITM) and User data, and newlineidentity privacy attacks. MITM attack is one of the most common types of security attacks and a newlinesignificant threat against security. The main motive of MITM attacks is to intercept the newlinecommunication to steal the credentials or modify the data without the victims knowledge. One of newlinemany MITM attacks Spoofing-based MITM attacks launched on the communication channel category newlinehave been taken for the research because Spoofing-based MITM attacks are predominant in M2M newlinenetworks. newlineThe four different types of Spoofing-based MITM attacks in each layer such as ARP Spoofingbased newlineMITM attack in Data Link layer, IP Spoofing-based MITM attack in Network layer, BGP newlineSpoofing-based MITM attack in Application layer, and DNS Spoofing-based MITM attack in newlineApplication layer. The main aim of this research is to provide security against Spoofing based MITM newlineattacks effectively. newlineExamining each of the Spoofing-based MITM attacks includes a detailed description of these newlinestages leading up to its discovery, building a hybrid deep learning detecting model, and evaluating newlineperformance. newlineHybrid deep learning methods namely ConvLSTM-ECC, BATELM-ECC, OBA-ECC-RSA, newlineFFOBLA-ECC are proposed to handle layer-wise Spoofing-based MITM attacks. newlineThe first phase of the thesis discusses the Proposed Hybrid ConvLSTM-ECC method that newlinedetects the Data Link layer s ARP Spoofing-based MITM attack nodes in a wired and wireless newlinescenario using convolutional layers for feature extraction from the raw data. The result is fed into the newlineLSTM model to predict the detection accuracy and it mitigates the ARP Spoofing-based MITM newlineattacks by generating signatures with the data for the node authentication. newlineThe second phase of the thesis presents the Proposed Hybrid BATELM-ECC method that newlinedetects the Network |
Pagination: | 183 |
URI: | http://hdl.handle.net/10603/356189 |
Appears in Departments: | Department of Computer Science |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
01_title.pdf | Attached File | 3.48 kB | Adobe PDF | View/Open |
02_certificate.pdf | 400.82 kB | Adobe PDF | View/Open | |
03_acknowledgement.pdf | 9.93 kB | Adobe PDF | View/Open | |
04_contents.pdf | 18.16 kB | Adobe PDF | View/Open | |
05_list of tables, figures and acronyms.pdf | 27.43 kB | Adobe PDF | View/Open | |
06_chapter 1.pdf | 511.72 kB | Adobe PDF | View/Open | |
07_chapter 2.pdf | 473.5 kB | Adobe PDF | View/Open | |
08_chapter 3.pdf | 286.64 kB | Adobe PDF | View/Open | |
09_chapter 4.pdf | 523.69 kB | Adobe PDF | View/Open | |
10_chapter 5.pdf | 678.43 kB | Adobe PDF | View/Open | |
11_chapter 6.pdf | 482.69 kB | Adobe PDF | View/Open | |
12_chapter 7.pdf | 595.64 kB | Adobe PDF | View/Open | |
13_chapter 8.pdf | 129.74 kB | Adobe PDF | View/Open | |
14_references.pdf | 323.65 kB | Adobe PDF | View/Open | |
15_annexures.pdf | 731.78 kB | Adobe PDF | View/Open | |
80_recommendation.pdf | 6.37 kB | Adobe PDF | View/Open |
Items in Shodhganga are licensed under Creative Commons Licence Attribution-NonCommercial-ShareAlike 4.0 International (CC BY-NC-SA 4.0).
Altmetric Badge: