Please use this identifier to cite or link to this item:
http://hdl.handle.net/10603/253142
Title: | Region based multi attribute traffic impact based efficient low rate DDoS attack detection |
Researcher: | Baskar M |
Guide(s): | Gnanasekaran T |
Keywords: | Distributed Denial of Service Engineering and Technology,Computer Science,Computer Science Theory and Methods Internet Technology Low Rate DDoS Multi Attribute Traffic |
University: | Anna University |
Completed Date: | 2018 |
Abstract: | Modern users access internet technology for many day to day activities. Information technology has seen a big growth in this decade providing various location independent services. Such services have no newlineconstraint in accessing through the internet. The user can access those newlineservices from his location and perform his activity. However, the service newlineprovided and the providers have certain limitations. However, there is a limit newlineon the strength and the volume of data that can be handled by the server. The newlineusers are restricted and informed to access the services in a proper manner newlinewith limited data in a protocol. But humans are not trustworthy and even a newlinegenuine registered user can perform malicious activity. When the number of newlineservice request or the volume of data grows to more than a limit allowed, it newlinebecomes a denial of service attack. The generic denial of service attack is newlineperformed by a single node or group of nodes which are distributed newlinethroughout the network. It is not all the time that the malicious nodes are involved in denial of service attack in a distributed manner. Even a single genuine user would newlineperform denial of service attack in limited manner to be named as low rate newlineDistributed Denial of Service (DDoS) attack. Unlike a generic DDOS attack, newlinelow rate attacks are appear in a very limited manner but produce a huge newlineimpact in the network performance. In the case of connection based flooding, newlinethe denial of service detection is performed on the basis of on a connection newlinethreshold. It is denied for the service access only when the malicious user newlinecrosses specified limits but if he knows the limit, he can produce such newlineflooding up to the limit of threshold. The same can be performed in the case newlineof data flooding. Identifying such low rate attacks is a challenging issue in newlinemodern days. newline newline |
Pagination: | xix, 147p. |
URI: | http://hdl.handle.net/10603/253142 |
Appears in Departments: | Faculty of Information and Communication Engineering |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
01_title.pdf | Attached File | 24.55 kB | Adobe PDF | View/Open |
02_certificate.pdf | 148.73 kB | Adobe PDF | View/Open | |
03_abstract.pdf | 69.22 kB | Adobe PDF | View/Open | |
04_acknowledgment.pdf | 4.73 kB | Adobe PDF | View/Open | |
05_contents.pdf | 30.7 kB | Adobe PDF | View/Open | |
06_chapter1.pdf | 326.11 kB | Adobe PDF | View/Open | |
07_chapter2.pdf | 243.99 kB | Adobe PDF | View/Open | |
08_chapter3.pdf | 325.44 kB | Adobe PDF | View/Open | |
09_chapter4.pdf | 380.09 kB | Adobe PDF | View/Open | |
10_chapter5.pdf | 437.55 kB | Adobe PDF | View/Open | |
11_chapter6.pdf | 192.28 kB | Adobe PDF | View/Open | |
12_conclusion.pdf | 14.92 kB | Adobe PDF | View/Open | |
13_references.pdf | 119.74 kB | Adobe PDF | View/Open | |
14_publications.pdf | 77.29 kB | Adobe PDF | View/Open |
Items in Shodhganga are licensed under Creative Commons Licence Attribution-NonCommercial-ShareAlike 4.0 International (CC BY-NC-SA 4.0).
Altmetric Badge: