Please use this identifier to cite or link to this item: http://hdl.handle.net/10603/253142
Title: Region based multi attribute traffic impact based efficient low rate DDoS attack detection
Researcher: Baskar M
Guide(s): Gnanasekaran T
Keywords: Distributed Denial of Service
Engineering and Technology,Computer Science,Computer Science Theory and Methods
Internet Technology
Low Rate DDoS
Multi Attribute Traffic
University: Anna University
Completed Date: 2018
Abstract: Modern users access internet technology for many day to day activities. Information technology has seen a big growth in this decade providing various location independent services. Such services have no newlineconstraint in accessing through the internet. The user can access those newlineservices from his location and perform his activity. However, the service newlineprovided and the providers have certain limitations. However, there is a limit newlineon the strength and the volume of data that can be handled by the server. The newlineusers are restricted and informed to access the services in a proper manner newlinewith limited data in a protocol. But humans are not trustworthy and even a newlinegenuine registered user can perform malicious activity. When the number of newlineservice request or the volume of data grows to more than a limit allowed, it newlinebecomes a denial of service attack. The generic denial of service attack is newlineperformed by a single node or group of nodes which are distributed newlinethroughout the network. It is not all the time that the malicious nodes are involved in denial of service attack in a distributed manner. Even a single genuine user would newlineperform denial of service attack in limited manner to be named as low rate newlineDistributed Denial of Service (DDoS) attack. Unlike a generic DDOS attack, newlinelow rate attacks are appear in a very limited manner but produce a huge newlineimpact in the network performance. In the case of connection based flooding, newlinethe denial of service detection is performed on the basis of on a connection newlinethreshold. It is denied for the service access only when the malicious user newlinecrosses specified limits but if he knows the limit, he can produce such newlineflooding up to the limit of threshold. The same can be performed in the case newlineof data flooding. Identifying such low rate attacks is a challenging issue in newlinemodern days. newline newline
Pagination: xix, 147p.
URI: http://hdl.handle.net/10603/253142
Appears in Departments:Faculty of Information and Communication Engineering

Files in This Item:
File Description SizeFormat 
01_title.pdfAttached File24.55 kBAdobe PDFView/Open
02_certificate.pdf148.73 kBAdobe PDFView/Open
03_abstract.pdf69.22 kBAdobe PDFView/Open
04_acknowledgment.pdf4.73 kBAdobe PDFView/Open
05_contents.pdf30.7 kBAdobe PDFView/Open
06_chapter1.pdf326.11 kBAdobe PDFView/Open
07_chapter2.pdf243.99 kBAdobe PDFView/Open
08_chapter3.pdf325.44 kBAdobe PDFView/Open
09_chapter4.pdf380.09 kBAdobe PDFView/Open
10_chapter5.pdf437.55 kBAdobe PDFView/Open
11_chapter6.pdf192.28 kBAdobe PDFView/Open
12_conclusion.pdf14.92 kBAdobe PDFView/Open
13_references.pdf119.74 kBAdobe PDFView/Open
14_publications.pdf77.29 kBAdobe PDFView/Open
Show full item record


Items in Shodhganga are licensed under Creative Commons Licence Attribution-NonCommercial-ShareAlike 4.0 International (CC BY-NC-SA 4.0).

Altmetric Badge: