Please use this identifier to cite or link to this item:
http://hdl.handle.net/10603/23600
Title: | Novel mechanisms to detect and prevent flooding and worm attacks |
Researcher: | Jeevaa katiravan |
Guide(s): | Chellappan C |
Keywords: | Centralized Worm Detector Controlled Packet Transmission Information and communication engineering |
Upload Date: | 21-Aug-2014 |
University: | Anna University |
Completed Date: | 01/11/2013 |
Abstract: | While the Internet has transformed and greatly improved the way we do business this vast network and its associated technologies have opened the doors to an increasing number of security threats from which corporations must protect them Hackers viruses worms trojans and various other network attacks like Denial of Service attacks present dangers to networks A new dimension of denial of service attacks called TCP SYN Flood attack has been witnessed which has amplified the severity of damage Instead of aiming at a single organization these attacks are now targeted towards the Internet newlinebackbone Another major threat to the internet is worms A new class of active worms called camouflaging worms has the capability to rapidly infect as many vulnerable hosts as possible It is therefore necessary to detect these kinds of threats in order to prevent the loss of security in the networking environment Currently available detection mechanisms do not efficiently handle these threats This thesis addresses the issues in the existing techniques and proposes new detection mechanisms and also provides some recovery newlinemodels The first detection scheme is Anomaly based detection of TCP SYN Flood attack to detect attack variants which look for abnormal behavior Efficient packet marking technique with anomaly detection is used to trace back the real source of the attack which in turn can trace both flooding and software exploit attacks The second detection scheme is based on Pre shared key authentication mechanism This mechanism is used to trace newlineback the source of attack in case of IP Spoofing and trace back failure The presence of camouflaging worms is sensed by means of a technique called Controlled Packet Transmission technique Finally the network which is affected by these types of worms are detected and recovered by means of Centralized Worm Detector mechanism newline newline newline |
Pagination: | xvii, 167p. |
URI: | http://hdl.handle.net/10603/23600 |
Appears in Departments: | Faculty of Information and Communication Engineering |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
01_title.pdf | Attached File | 26.03 kB | Adobe PDF | View/Open |
02_certificate.pdf | 531.99 kB | Adobe PDF | View/Open | |
03_abstract.pdf | 8.14 kB | Adobe PDF | View/Open | |
04_acknowledgement.pdf | 6.47 kB | Adobe PDF | View/Open | |
05_contents.pdf | 23.52 kB | Adobe PDF | View/Open | |
06_chapter1.pdf | 502.22 kB | Adobe PDF | View/Open | |
07_chapter2.pdf | 127.75 kB | Adobe PDF | View/Open | |
08_chapter3.pdf | 618.63 kB | Adobe PDF | View/Open | |
09_chapter4.pdf | 1.08 MB | Adobe PDF | View/Open | |
10_chapter5.pdf | 2.57 MB | Adobe PDF | View/Open | |
11_chapter6.pdf | 1.87 MB | Adobe PDF | View/Open | |
12_chapter7.pdf | 12.29 kB | Adobe PDF | View/Open | |
13_references.pdf | 34.85 kB | Adobe PDF | View/Open | |
14_publications.pdf | 5.49 kB | Adobe PDF | View/Open | |
15_vitae.pdf | 5.26 kB | Adobe PDF | View/Open |
Items in Shodhganga are licensed under Creative Commons Licence Attribution-NonCommercial-ShareAlike 4.0 International (CC BY-NC-SA 4.0).
Altmetric Badge: