Please use this identifier to cite or link to this item:
Title: An adaptive multi tier cross layer security framework to defend against DDoS attacks in active networks
Researcher: Jayashree, P.
Guide(s): Easwarakumar, K S
Keywords: Adaptive Multi-tier, distributed denial of service, active networks
Upload Date: 28-Nov-2013
University: Anna University
Completed Date: 2009
Abstract: The use of e-technologies enables integration of information from various sources and users of Internet increases multifold that leads to severe security concern. The objective of this research work is to provide a comprehensive defense framework against distributed denial of service (DDoS) attacks in active networks, by proposing a realistic integration of three different strategies that makes the network less susceptible to attacks. The thesis work defines a defense framework for active networks. A way of avoiding attacks is to ensure that attacks may not exploit the vulnerabilities. This is achieved in this work through enhanced anti-spoofing techniques that resolve insider attacks, and a differentiated routing based on traffic classification. In this work, application layer and network layer are combined to deal with the attacks that do not have many distinguishable characteristics. The cross layer approach is adopted by the defense sub systems to make more complete decisions on the anomalous traffic. In the proposed method, a novel semi supervised k-means weighted group clustering technique is adopted to improve the clustering purity. In this research work, an attack resilient multi-tier architecture encompassing the activities of preventing and detecting DDoS attacks with minimum deployment overhead is presented for active networks. The defense system is designed to support legitimacy analysis on the traffic with simple packet structure enhancements to attend to fast changing DoS attacks. The system supports scalability by way of deploying the various strategies in each AS so that the local defense leads to global defense with less collaborative operations. Success of the defense system lies in allowing the client traffic to pass through the network during attacks as well as possessing high attack detection accuracy and the proposed defense strategy shows less false positive and false negative alarms. As attack and legitimate traffic vary widely across networks, both proactive and reactive defense strategie
Pagination: xvii, 164
Appears in Departments:Faculty of Information and Communication Engineering

Files in This Item:
File Description SizeFormat 
01_title.pdfAttached File49.72 kBAdobe PDFView/Open
02_certificates.pdf1.14 MBAdobe PDFView/Open
03_abstract.pdf18.81 kBAdobe PDFView/Open
04_acknowledgement.pdf14.73 kBAdobe PDFView/Open
05_contents.pdf30.48 kBAdobe PDFView/Open
06_chapter 1.pdf86.97 kBAdobe PDFView/Open
07_chapter 2.pdf60.57 kBAdobe PDFView/Open
08_chapter 3.pdf80.36 kBAdobe PDFView/Open
09_chapter 4.pdf127.87 kBAdobe PDFView/Open
10_chapter 5.pdf162.62 kBAdobe PDFView/Open
11_chapter 6.pdf336.08 kBAdobe PDFView/Open
12_chapter 7.pdf32.36 kBAdobe PDFView/Open
13_appendices 1 and 2.pdf587.15 kBAdobe PDFView/Open
14_references.pdf40.59 kBAdobe PDFView/Open
15_publications.pdf17.83 kBAdobe PDFView/Open
16_vitae.pdf11.84 kBAdobe PDFView/Open

Items in Shodhganga are protected by copyright, with all rights reserved, unless otherwise indicated.

Altmetric Badge: