Please use this identifier to cite or link to this item:
http://hdl.handle.net/10603/252987
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.coverage.spatial | Analysis of DDoS Attacks in Wireless Networks Based on Evolutionary Computing Techniques | |
dc.date.accessioned | 2019-08-19T12:19:22Z | - |
dc.date.available | 2019-08-19T12:19:22Z | - |
dc.identifier.uri | http://hdl.handle.net/10603/252987 | - |
dc.description.abstract | The increased use of internet services attributed mainly to the rapid development in communication technologies has made possible of delivery of services and access of data on a global scale to users at any point of time at newlinethe best quality. At the same time, this has also attracted a large number of newlineattacks being launched on a day to day basis to hack and tamper with the data, newlinegain unauthorized access into the network data stream and interrupt services newlinethroughout the network. These attacks are generally not self contained but newlinealways have the intentions of spreading down the layer at a very rapid rate newlineaimed at inflicting maximum damage to the clients and the system and its newlineresources. A wide range of attacks are prevalent in recent times with a newlineclassical example of the recent ransom ware attack which was targeted at newlinefinancial transactions on webs on a global scale. Another form of prominent newlineand destructive attack is the denial of service attack and comes to be known as newlineDistributed Denial of Service (DDoS) if a large number of agents are newlinecoordinated in a perfectly planned attack on the victim. DDoS attacks are newlinesimilar to flash crowds but are different in termsof their intentions. Flash newlinecrowds are unexpected rise in network traffic which may be anticipated or newlineunexpected but they don t have any evil intentions. On the other hand, DDoS newlineattacks have evil intentions and they cause a serious menace especially with newlineonline services as they cause congestion on the network depleting the newlinebandwidth and causing a massive reduction in internet speed. The newlinecomputational resources of the system under attack are completely depleted newlinewhile servicing to multiple and large volumes of scrap packets sent by the newlineattacker. newline newline | |
dc.format.extent | xviii, 137p. | |
dc.language | English | |
dc.relation | p.126-136 | |
dc.rights | university | |
dc.title | Analysis of DDoS attacks in wireless networks based on evolutionary computing techniques | |
dc.title.alternative | ||
dc.creator.researcher | Basheer Mohamed R | |
dc.subject.keyword | DDoS | |
dc.subject.keyword | Engineering and Technology,Computer Science,Computer Science Information Systems | |
dc.subject.keyword | Evolutionary Computing Techniques | |
dc.subject.keyword | Wireless Networks | |
dc.description.note | ||
dc.contributor.guide | Arumugam S | |
dc.publisher.place | Chennai | |
dc.publisher.university | Anna University | |
dc.publisher.institution | Faculty of Information and Communication Engineering | |
dc.date.registered | n.d. | |
dc.date.completed | 2018 | |
dc.date.awarded | 31/10/2018 | |
dc.format.dimensions | 21 cm | |
dc.format.accompanyingmaterial | None | |
dc.source.university | University | |
dc.type.degree | Ph.D. | |
Appears in Departments: | Faculty of Information and Communication Engineering |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
01_title.pdf | Attached File | 23.56 kB | Adobe PDF | View/Open |
02_certificate.pdf | 875.88 kB | Adobe PDF | View/Open | |
03_abstract.pdf | 287.67 kB | Adobe PDF | View/Open | |
04_acknowledgment.pdf | 173.39 kB | Adobe PDF | View/Open | |
05_content.pdf | 304.23 kB | Adobe PDF | View/Open | |
06_chapter1.pdf | 438.01 kB | Adobe PDF | View/Open | |
07_chapter2.pdf | 427.32 kB | Adobe PDF | View/Open | |
08_chapter3.pdf | 490.86 kB | Adobe PDF | View/Open | |
09_chapter4.pdf | 870.99 kB | Adobe PDF | View/Open | |
10_chapter5.pdf | 1.22 MB | Adobe PDF | View/Open | |
11_chapter6.pdf | 971.27 kB | Adobe PDF | View/Open | |
12_chapter7.pdf | 31.68 kB | Adobe PDF | View/Open | |
13_references.pdf | 185.46 kB | Adobe PDF | View/Open | |
14_publications.pdf | 123.33 kB | Adobe PDF | View/Open |
Items in Shodhganga are licensed under Creative Commons Licence Attribution-NonCommercial-ShareAlike 4.0 International (CC BY-NC-SA 4.0).
Altmetric Badge: