Please use this identifier to cite or link to this item: http://hdl.handle.net/10603/23600
Title: Novel mechanisms to detect and prevent flooding and worm attacks
Researcher: Jeevaa katiravan
Guide(s): Chellappan C
Keywords: Centralized Worm Detector
Controlled Packet Transmission
Information and communication engineering
Upload Date: 21-Aug-2014
University: Anna University
Completed Date: 01/11/2013
Abstract: While the Internet has transformed and greatly improved the way we do business this vast network and its associated technologies have opened the doors to an increasing number of security threats from which corporations must protect them Hackers viruses worms trojans and various other network attacks like Denial of Service attacks present dangers to networks A new dimension of denial of service attacks called TCP SYN Flood attack has been witnessed which has amplified the severity of damage Instead of aiming at a single organization these attacks are now targeted towards the Internet newlinebackbone Another major threat to the internet is worms A new class of active worms called camouflaging worms has the capability to rapidly infect as many vulnerable hosts as possible It is therefore necessary to detect these kinds of threats in order to prevent the loss of security in the networking environment Currently available detection mechanisms do not efficiently handle these threats This thesis addresses the issues in the existing techniques and proposes new detection mechanisms and also provides some recovery newlinemodels The first detection scheme is Anomaly based detection of TCP SYN Flood attack to detect attack variants which look for abnormal behavior Efficient packet marking technique with anomaly detection is used to trace back the real source of the attack which in turn can trace both flooding and software exploit attacks The second detection scheme is based on Pre shared key authentication mechanism This mechanism is used to trace newlineback the source of attack in case of IP Spoofing and trace back failure The presence of camouflaging worms is sensed by means of a technique called Controlled Packet Transmission technique Finally the network which is affected by these types of worms are detected and recovered by means of Centralized Worm Detector mechanism newline newline newline
Pagination: xvii, 167p.
URI: http://hdl.handle.net/10603/23600
Appears in Departments:Faculty of Information and Communication Engineering

Files in This Item:
File Description SizeFormat 
01_title.pdfAttached File26.03 kBAdobe PDFView/Open
02_certificate.pdf531.99 kBAdobe PDFView/Open
03_abstract.pdf8.14 kBAdobe PDFView/Open
04_acknowledgement.pdf6.47 kBAdobe PDFView/Open
05_contents.pdf23.52 kBAdobe PDFView/Open
06_chapter1.pdf502.22 kBAdobe PDFView/Open
07_chapter2.pdf127.75 kBAdobe PDFView/Open
08_chapter3.pdf618.63 kBAdobe PDFView/Open
09_chapter4.pdf1.08 MBAdobe PDFView/Open
10_chapter5.pdf2.57 MBAdobe PDFView/Open
11_chapter6.pdf1.87 MBAdobe PDFView/Open
12_chapter7.pdf12.29 kBAdobe PDFView/Open
13_references.pdf34.85 kBAdobe PDFView/Open
14_publications.pdf5.49 kBAdobe PDFView/Open
15_vitae.pdf5.26 kBAdobe PDFView/Open
Show full item record


Items in Shodhganga are licensed under Creative Commons Licence Attribution-NonCommercial-ShareAlike 4.0 International (CC BY-NC-SA 4.0).

Altmetric Badge: