Please use this identifier to cite or link to this item: http://hdl.handle.net/10603/252987
Title: Analysis of DDoS attacks in wireless networks based on evolutionary computing techniques
Researcher: Basheer Mohamed R
Guide(s): Arumugam S
Keywords: DDoS
Engineering and Technology,Computer Science,Computer Science Information Systems
Evolutionary Computing Techniques
Wireless Networks
University: Anna University
Completed Date: 2018
Abstract: The increased use of internet services attributed mainly to the rapid development in communication technologies has made possible of delivery of services and access of data on a global scale to users at any point of time at newlinethe best quality. At the same time, this has also attracted a large number of newlineattacks being launched on a day to day basis to hack and tamper with the data, newlinegain unauthorized access into the network data stream and interrupt services newlinethroughout the network. These attacks are generally not self contained but newlinealways have the intentions of spreading down the layer at a very rapid rate newlineaimed at inflicting maximum damage to the clients and the system and its newlineresources. A wide range of attacks are prevalent in recent times with a newlineclassical example of the recent ransom ware attack which was targeted at newlinefinancial transactions on webs on a global scale. Another form of prominent newlineand destructive attack is the denial of service attack and comes to be known as newlineDistributed Denial of Service (DDoS) if a large number of agents are newlinecoordinated in a perfectly planned attack on the victim. DDoS attacks are newlinesimilar to flash crowds but are different in termsof their intentions. Flash newlinecrowds are unexpected rise in network traffic which may be anticipated or newlineunexpected but they don t have any evil intentions. On the other hand, DDoS newlineattacks have evil intentions and they cause a serious menace especially with newlineonline services as they cause congestion on the network depleting the newlinebandwidth and causing a massive reduction in internet speed. The newlinecomputational resources of the system under attack are completely depleted newlinewhile servicing to multiple and large volumes of scrap packets sent by the newlineattacker. newline newline
Pagination: xviii, 137p.
URI: http://hdl.handle.net/10603/252987
Appears in Departments:Faculty of Information and Communication Engineering

Files in This Item:
File Description SizeFormat 
01_title.pdfAttached File23.56 kBAdobe PDFView/Open
02_certificate.pdf875.88 kBAdobe PDFView/Open
03_abstract.pdf287.67 kBAdobe PDFView/Open
04_acknowledgment.pdf173.39 kBAdobe PDFView/Open
05_content.pdf304.23 kBAdobe PDFView/Open
06_chapter1.pdf438.01 kBAdobe PDFView/Open
07_chapter2.pdf427.32 kBAdobe PDFView/Open
08_chapter3.pdf490.86 kBAdobe PDFView/Open
09_chapter4.pdf870.99 kBAdobe PDFView/Open
10_chapter5.pdf1.22 MBAdobe PDFView/Open
11_chapter6.pdf971.27 kBAdobe PDFView/Open
12_chapter7.pdf31.68 kBAdobe PDFView/Open
13_references.pdf185.46 kBAdobe PDFView/Open
14_publications.pdf123.33 kBAdobe PDFView/Open
Show full item record


Items in Shodhganga are licensed under Creative Commons Licence Attribution-NonCommercial-ShareAlike 4.0 International (CC BY-NC-SA 4.0).

Altmetric Badge: