Please use this identifier to cite or link to this item: http://hdl.handle.net/10603/62160
Title: Enhanced Moving Target Defense Mechanisms to Handle Cyber Attacks
Researcher: Uma M
Guide(s): Padmavathi G
Keywords: cyber attacks
game changing approach
moving target defense
game theory
University: Avinashilingam Deemed University For Women
Completed Date: 05.06.2014
Abstract: Secure communication in networking is still an open challenge due to the rapid development in technology The increased use of networking makes the communication vulnerable to active and passive attacks The decisive aim of the security is to maintain newlineConfidentiality Availability Integrity Non repudiation and Authentication According to a 2012 survey that every organization is experiencing with an average of 102 attacks every week Based on the literature review it is observed that efficient defense mechanisms are essential to defend against known and unknown cyber attacks Game changing approaches are suggested as a defense mechanism to handle such attacks The three game changing approaches namely Trusted Tailored Spaces Moving Target Defense Mechanisms and Cyber Economics are suggested as Research and Development Essentials Among the three moving target defense mechanisms are not explored much and only a few of them are used to handle attacks Moving target is a dynamic concept as it confuses the attackers by moving the real target often based on time or event In the National Cyber Leap Year Summit Participants newlineReport 2009 there are 11 moving target defense mechanisms suggested According to the cochairs report four moving target defense mechanisms are taken for study in this research newlinework The objectives of the thesis are to Improve the quality of service in terms of Endtoend delay Latency Packet delivery ratio Throughput Reduce the number of retransmissions of data packets Save time Improve the accuracy of detection Appropriate security application and Enhance storage security Few solutions are studied and enhanced The proposed traffic monitoring technique achieves increased efficiency in traffic monitoring adaptability for various network sizes reduced retransmission and time saving Cyber attack detection is done using the enhanced dimensionality reduction technique and the outcome is improved accuracy in detection of known cyber attacks The percentage of detection rate is 94 pecent For unknown cyber attack detecti
Pagination: 
URI: http://hdl.handle.net/10603/62160
Appears in Departments:Department of Computer Science

Files in This Item:
File Description SizeFormat 
muma_chapter 10.pdfAttached File165.39 kBAdobe PDFView/Open
muma_chapter 1.pdf124.26 kBAdobe PDFView/Open
muma_chapter 2.pdf289.01 kBAdobe PDFView/Open
muma_chapter 3.pdf129.24 kBAdobe PDFView/Open
muma_chapter 4.pdf2.18 MBAdobe PDFView/Open
muma_chapter 5.pdf180.67 kBAdobe PDFView/Open
muma_chapter 6.pdf157 kBAdobe PDFView/Open
muma_chapter 7.pdf200.35 kBAdobe PDFView/Open
muma_chapter 8.pdf219.38 kBAdobe PDFView/Open
muma_chapter 9.pdf87.2 kBAdobe PDFView/Open
muma_intro.pdf128.85 kBAdobe PDFView/Open


Items in Shodhganga are protected by copyright, with all rights reserved, unless otherwise indicated.