Please use this identifier to cite or link to this item: http://hdl.handle.net/10603/340921
Full metadata record
DC FieldValueLanguage
dc.coverage.spatialEfficient denial of service attack resistance and prevention using adaptive caching system in hybrid network
dc.date.accessioned2021-09-17T09:02:26Z-
dc.date.available2021-09-17T09:02:26Z-
dc.identifier.urihttp://hdl.handle.net/10603/340921-
dc.description.abstractDistributed Denial of Service (DDoS) attacks are the most commonly occurred attacks in a network which affects the services provided by large application servers. Such DDoS attacks are formed by making legitimate requests to frequently visited websites. Hence, these DDoS attacks are considered as an important security issue which is to be monitored in a network for preventing flooding attack. By preventing these attacks, confidence level of a network is improved efficiently with the improvement ofresponse rate, true positive rate, and throughput and attack resistance rate. Communication is established to the users with the help of internet by performing information exchange using social media. At the time of communication, providing security level and authentication of users is a challenging task to prevent from attackers who make malicious traffic with fake identity. Denial of service (DoS) attack is a type of explicit attack made by attacker to acquire resources of authenticated users. Some of DoS attacks include flash crowd, flooding, teardrop, etc. Flash crowd in internet is a type of DDoS attack that affects services provided by server for users. This flash crowd attacks are resulted by legitimate form of requests from the side of users of often visited websites. Traditional process of identifying Distributed Denial of Service (DDoS) attack in internet employed entropy variations that presented a trace back method between usual and DDoS traffic. But trace back method wrongly treated a flash crowd as a DDoS attack and hence produces false positive alarms. Also, discrimination between DDoS attack and flash crowd is not addressed effectively. An embedded Markov Chain is presented to examine the rule-based network firewalls. Extraction of key features is carried out to distinguish normal traffic and DDoS attacks that targeting different rule positions. But the mitigation solution for affected firewalls in real time is not considered. Vulnerability of Network Mechanisms is analyzed for monitoring the performance degradation of a system which is caused by malicious users whose aim is consuming abundance resources. However, Hash tablebased Vulnerability of Network Mechanisms does not solve the problem of longer waiting time based on attack size. On the other hand, a Queuing model based on Embedded Markov Chain is employed for analyzing rule-based firewalls which have standard network traffic flows as well as DoS attack flows. This queuing model targets several rule positions but mitigation of DoS attacks targeting bottom rules are achieved only with minimal confidence in the network. newline
dc.format.extentxv,111 p.
dc.languageEnglish
dc.relationp.104-110
dc.rightsuniversity
dc.titleEfficient denial of service attack resistance and prevention using adaptive caching system in hybrid network
dc.title.alternative
dc.creator.researcherChandra prabha, K
dc.subject.keywordEngineering and Technology
dc.subject.keywordComputer Science
dc.subject.keywordTelecommunications
dc.subject.keywordAdaptive caching
dc.subject.keywordHybrid network
dc.description.note
dc.contributor.guideGeetha, B G
dc.publisher.placeChennai
dc.publisher.universityAnna University
dc.publisher.institutionFaculty of Information and Communication Engineering
dc.date.registered
dc.date.completed2020
dc.date.awarded2020
dc.format.dimensions21cm
dc.format.accompanyingmaterialNone
dc.source.universityUniversity
dc.type.degreePh.D.
Appears in Departments:Faculty of Information and Communication Engineering

Files in This Item:
File Description SizeFormat 
01_title.pdfAttached File21.43 kBAdobe PDFView/Open
02_certificates.pdf162.08 kBAdobe PDFView/Open
03_vivaproceedings.pdf315.46 kBAdobe PDFView/Open
04_bonafidecertificate.pdf237.69 kBAdobe PDFView/Open
05_abstracts.pdf113.08 kBAdobe PDFView/Open
06_acknowledgements.pdf5.21 kBAdobe PDFView/Open
07_contents.pdf447.39 kBAdobe PDFView/Open
08_listoftables.pdf186.13 kBAdobe PDFView/Open
09_listoffigures.pdf187.36 kBAdobe PDFView/Open
10_listofabbreviations.pdf322.25 kBAdobe PDFView/Open
11_chapter1.pdf202.36 kBAdobe PDFView/Open
12_chapter2.pdf429.55 kBAdobe PDFView/Open
13_chapter3.pdf323.98 kBAdobe PDFView/Open
14_chapter4.pdf516.91 kBAdobe PDFView/Open
15_chapter5.pdf580.57 kBAdobe PDFView/Open
16_chapter6.pdf576.61 kBAdobe PDFView/Open
17_conclusion.pdf201.16 kBAdobe PDFView/Open
18_appendices.pdf553.77 kBAdobe PDFView/Open
19_references.pdf330.22 kBAdobe PDFView/Open
20_listofpublications.pdf104.64 kBAdobe PDFView/Open
80_recommendation.pdf104.24 kBAdobe PDFView/Open


Items in Shodhganga are licensed under Creative Commons Licence Attribution-NonCommercial-ShareAlike 4.0 International (CC BY-NC-SA 4.0).

Altmetric Badge: