Please use this identifier to cite or link to this item:
http://hdl.handle.net/10603/13375
Title: | An adaptive multi tier cross layer security framework to defend against DDoS attacks in active networks |
Researcher: | Jayashree, P. |
Guide(s): | Easwarakumar, K S |
Keywords: | Adaptive Multi-tier, distributed denial of service, active networks |
Upload Date: | 28-Nov-2013 |
University: | Anna University |
Completed Date: | 2009 |
Abstract: | The use of e-technologies enables integration of information from various sources and users of Internet increases multifold that leads to severe security concern. The objective of this research work is to provide a comprehensive defense framework against distributed denial of service (DDoS) attacks in active networks, by proposing a realistic integration of three different strategies that makes the network less susceptible to attacks. The thesis work defines a defense framework for active networks. A way of avoiding attacks is to ensure that attacks may not exploit the vulnerabilities. This is achieved in this work through enhanced anti-spoofing techniques that resolve insider attacks, and a differentiated routing based on traffic classification. In this work, application layer and network layer are combined to deal with the attacks that do not have many distinguishable characteristics. The cross layer approach is adopted by the defense sub systems to make more complete decisions on the anomalous traffic. In the proposed method, a novel semi supervised k-means weighted group clustering technique is adopted to improve the clustering purity. In this research work, an attack resilient multi-tier architecture encompassing the activities of preventing and detecting DDoS attacks with minimum deployment overhead is presented for active networks. The defense system is designed to support legitimacy analysis on the traffic with simple packet structure enhancements to attend to fast changing DoS attacks. The system supports scalability by way of deploying the various strategies in each AS so that the local defense leads to global defense with less collaborative operations. Success of the defense system lies in allowing the client traffic to pass through the network during attacks as well as possessing high attack detection accuracy and the proposed defense strategy shows less false positive and false negative alarms. As attack and legitimate traffic vary widely across networks, both proactive and reactive defense strategie |
Pagination: | xvii, 164 |
URI: | http://hdl.handle.net/10603/13375 |
Appears in Departments: | Faculty of Information and Communication Engineering |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
01_title.pdf | Attached File | 49.72 kB | Adobe PDF | View/Open |
02_certificates.pdf | 1.14 MB | Adobe PDF | View/Open | |
03_abstract.pdf | 18.81 kB | Adobe PDF | View/Open | |
04_acknowledgement.pdf | 14.73 kB | Adobe PDF | View/Open | |
05_contents.pdf | 30.48 kB | Adobe PDF | View/Open | |
06_chapter 1.pdf | 86.97 kB | Adobe PDF | View/Open | |
07_chapter 2.pdf | 60.57 kB | Adobe PDF | View/Open | |
08_chapter 3.pdf | 80.36 kB | Adobe PDF | View/Open | |
09_chapter 4.pdf | 127.87 kB | Adobe PDF | View/Open | |
10_chapter 5.pdf | 162.62 kB | Adobe PDF | View/Open | |
11_chapter 6.pdf | 336.08 kB | Adobe PDF | View/Open | |
12_chapter 7.pdf | 32.36 kB | Adobe PDF | View/Open | |
13_appendices 1 and 2.pdf | 587.15 kB | Adobe PDF | View/Open | |
14_references.pdf | 40.59 kB | Adobe PDF | View/Open | |
15_publications.pdf | 17.83 kB | Adobe PDF | View/Open | |
16_vitae.pdf | 11.84 kB | Adobe PDF | View/Open |
Items in Shodhganga are licensed under Creative Commons Licence Attribution-NonCommercial-ShareAlike 4.0 International (CC BY-NC-SA 4.0).
Altmetric Badge: