Please use this identifier to cite or link to this item: http://hdl.handle.net/10603/221833
Full metadata record
DC FieldValueLanguage
dc.coverage.spatial
dc.date.accessioned2018-11-27T09:15:13Z-
dc.date.available2018-11-27T09:15:13Z-
dc.identifier.urihttp://hdl.handle.net/10603/221833-
dc.description.abstractFrom the past two decades Denial-of-Service attack continues to be the most challenging newlineproblem in the Internet. Very little efforts are required for the execution of a DoS attack,since a large number of vulnerable machines on the internet provide a fertile ground for attackers for launching such attacks. Also the availability of vast number of exploitation newlinetools, automated scripts add to the misery as these tools and scripts can easily be used for vulnerability exploitation and the launching of DoS attacks. At the receiving end of DoS attack is the victim machine, who in case of a successful attack is deprived of its rightful state of working. The victim machine can be any machine from a standalone host to an information system catering to the needs of thousands of legitimate clients. The primary newlinetarget of DoS attack is dismantling the security structure that exists in and around of an information system or any host machine. In the process a majority of security parameters get affected, one of them is AVAILABILITY. AVAILABILITY, together with CONFIDENTAILITY and INTEGRITY, has been the most critical component of information security for over three decades now and has suffered more at the hands of DoS attacks than the other security attributes, but ironically has received very low attention as compared to the other security attributes. newlineThe primary goal of the research is to investigate the impact of DoS attacks on newlineAVAILABILITY. A through study on AVAILABILITY is needed so that the factors that determine AVAILABILITY can be identified. The importance of AVAILABILITY as a security attribute in the information security paradigm and its critical relation with the other security attributes remains the driving point throughout the study, given the current state of AVAILABILITY in theory and practice as a security attribute. After the identification newlineof AVAILABILITY determinants, they need to be tested against DoS attacks, for the study and analysis of the question how DoS attacks affect AVAILABILITY? to validate ... newline
dc.format.extent
dc.languageEnglish
dc.relation
dc.rightsuniversity
dc.titleEnsuring availability of information by Preventing denial of service attacks
dc.title.alternative
dc.creator.researcherMir, Suhail Qadir
dc.subject.keywordDenial of Service Attacks (DoS)
dc.subject.keywordSecurity Attributes
dc.subject.keywordTCP-SYN Flooding
dc.description.note
dc.contributor.guideQuadri, S.M.K.
dc.publisher.placeJammu and Kashmir
dc.publisher.universityUniversity of Kashmir
dc.publisher.institutionDepartment of Computer Science
dc.date.registeredNA
dc.date.completedNA
dc.date.awarded04/10/2018
dc.format.dimensions
dc.format.accompanyingmaterialNone
dc.source.universityUniversity
dc.type.degreePh.D.
Appears in Departments:Department of Computer Science

Files in This Item:
File Description SizeFormat 
01_title.pdfAttached File140.41 kBAdobe PDFView/Open
02_certificate.pdf305.16 kBAdobe PDFView/Open
03_abstract.pdf67.5 kBAdobe PDFView/Open
04_dedication.pdf20.93 kBAdobe PDFView/Open
05_acknowledgement.pdf77.93 kBAdobe PDFView/Open
06_contents.pdf64.43 kBAdobe PDFView/Open
07_list_of_tables.pdf35.68 kBAdobe PDFView/Open
08_list_of_figures.pdf53.04 kBAdobe PDFView/Open
09_list_of_algorithms.pdf37.05 kBAdobe PDFView/Open
10_acronyms.pdf35.74 kBAdobe PDFView/Open
11_glossary.pdf48.02 kBAdobe PDFView/Open
12_chapter 1.pdf313.92 kBAdobe PDFView/Open
13_chapter 2.pdf229.91 kBAdobe PDFView/Open
14_chapter 3.pdf797.58 kBAdobe PDFView/Open
15_chapter 4.pdf514.43 kBAdobe PDFView/Open
16_chapter 5.pdf611.27 kBAdobe PDFView/Open
17_chapter 6.pdf479.57 kBAdobe PDFView/Open
18_conclusion.pdf116.17 kBAdobe PDFView/Open
19_publications.pdf76.93 kBAdobe PDFView/Open
20_references.pdf196.62 kBAdobe PDFView/Open


Items in Shodhganga are protected by copyright, with all rights reserved, unless otherwise indicated.