Please use this identifier to cite or link to this item: http://hdl.handle.net/10603/252987
Full metadata record
DC FieldValueLanguage
dc.coverage.spatialAnalysis of DDoS Attacks in Wireless Networks Based on Evolutionary Computing Techniques
dc.date.accessioned2019-08-19T12:19:22Z-
dc.date.available2019-08-19T12:19:22Z-
dc.identifier.urihttp://hdl.handle.net/10603/252987-
dc.description.abstractThe increased use of internet services attributed mainly to the rapid development in communication technologies has made possible of delivery of services and access of data on a global scale to users at any point of time at newlinethe best quality. At the same time, this has also attracted a large number of newlineattacks being launched on a day to day basis to hack and tamper with the data, newlinegain unauthorized access into the network data stream and interrupt services newlinethroughout the network. These attacks are generally not self contained but newlinealways have the intentions of spreading down the layer at a very rapid rate newlineaimed at inflicting maximum damage to the clients and the system and its newlineresources. A wide range of attacks are prevalent in recent times with a newlineclassical example of the recent ransom ware attack which was targeted at newlinefinancial transactions on webs on a global scale. Another form of prominent newlineand destructive attack is the denial of service attack and comes to be known as newlineDistributed Denial of Service (DDoS) if a large number of agents are newlinecoordinated in a perfectly planned attack on the victim. DDoS attacks are newlinesimilar to flash crowds but are different in termsof their intentions. Flash newlinecrowds are unexpected rise in network traffic which may be anticipated or newlineunexpected but they don t have any evil intentions. On the other hand, DDoS newlineattacks have evil intentions and they cause a serious menace especially with newlineonline services as they cause congestion on the network depleting the newlinebandwidth and causing a massive reduction in internet speed. The newlinecomputational resources of the system under attack are completely depleted newlinewhile servicing to multiple and large volumes of scrap packets sent by the newlineattacker. newline newline
dc.format.extentxviii, 137p.
dc.languageEnglish
dc.relationp.126-136
dc.rightsuniversity
dc.titleAnalysis of DDoS attacks in wireless networks based on evolutionary computing techniques
dc.title.alternative
dc.creator.researcherBasheer Mohamed R
dc.subject.keywordDDoS
dc.subject.keywordEngineering and Technology,Computer Science,Computer Science Information Systems
dc.subject.keywordEvolutionary Computing Techniques
dc.subject.keywordWireless Networks
dc.description.note
dc.contributor.guideArumugam S
dc.publisher.placeChennai
dc.publisher.universityAnna University
dc.publisher.institutionFaculty of Information and Communication Engineering
dc.date.registeredn.d.
dc.date.completed2018
dc.date.awarded31/10/2018
dc.format.dimensions21 cm
dc.format.accompanyingmaterialNone
dc.source.universityUniversity
dc.type.degreePh.D.
Appears in Departments:Faculty of Information and Communication Engineering

Files in This Item:
File Description SizeFormat 
01_title.pdfAttached File23.56 kBAdobe PDFView/Open
02_certificate.pdf875.88 kBAdobe PDFView/Open
03_abstract.pdf287.67 kBAdobe PDFView/Open
04_acknowledgment.pdf173.39 kBAdobe PDFView/Open
05_content.pdf304.23 kBAdobe PDFView/Open
06_chapter1.pdf438.01 kBAdobe PDFView/Open
07_chapter2.pdf427.32 kBAdobe PDFView/Open
08_chapter3.pdf490.86 kBAdobe PDFView/Open
09_chapter4.pdf870.99 kBAdobe PDFView/Open
10_chapter5.pdf1.22 MBAdobe PDFView/Open
11_chapter6.pdf971.27 kBAdobe PDFView/Open
12_chapter7.pdf31.68 kBAdobe PDFView/Open
13_references.pdf185.46 kBAdobe PDFView/Open
14_publications.pdf123.33 kBAdobe PDFView/Open


Items in Shodhganga are licensed under Creative Commons Licence Attribution-NonCommercial-ShareAlike 4.0 International (CC BY-NC-SA 4.0).

Altmetric Badge: