Please use this identifier to cite or link to this item:
http://hdl.handle.net/10603/62160
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.coverage.spatial | Computer Science | |
dc.date.accessioned | 2015-12-18T06:00:09Z | - |
dc.date.available | 2015-12-18T06:00:09Z | - |
dc.identifier.uri | http://hdl.handle.net/10603/62160 | - |
dc.description.abstract | Secure communication in networking is still an open challenge due to the rapid development in technology The increased use of networking makes the communication vulnerable to active and passive attacks The decisive aim of the security is to maintain newlineConfidentiality Availability Integrity Non repudiation and Authentication According to a 2012 survey that every organization is experiencing with an average of 102 attacks every week Based on the literature review it is observed that efficient defense mechanisms are essential to defend against known and unknown cyber attacks Game changing approaches are suggested as a defense mechanism to handle such attacks The three game changing approaches namely Trusted Tailored Spaces Moving Target Defense Mechanisms and Cyber Economics are suggested as Research and Development Essentials Among the three moving target defense mechanisms are not explored much and only a few of them are used to handle attacks Moving target is a dynamic concept as it confuses the attackers by moving the real target often based on time or event In the National Cyber Leap Year Summit Participants newlineReport 2009 there are 11 moving target defense mechanisms suggested According to the cochairs report four moving target defense mechanisms are taken for study in this research newlinework The objectives of the thesis are to Improve the quality of service in terms of Endtoend delay Latency Packet delivery ratio Throughput Reduce the number of retransmissions of data packets Save time Improve the accuracy of detection Appropriate security application and Enhance storage security Few solutions are studied and enhanced The proposed traffic monitoring technique achieves increased efficiency in traffic monitoring adaptability for various network sizes reduced retransmission and time saving Cyber attack detection is done using the enhanced dimensionality reduction technique and the outcome is improved accuracy in detection of known cyber attacks The percentage of detection rate is 94 pecent For unknown cyber attack detecti | |
dc.format.extent | ||
dc.language | English | |
dc.relation | References (98) | |
dc.rights | university | |
dc.title | Enhanced Moving Target Defense Mechanisms to Handle Cyber Attacks | |
dc.title.alternative | ||
dc.creator.researcher | Uma M | |
dc.subject.keyword | cyber attacks | |
dc.subject.keyword | game changing approach | |
dc.subject.keyword | moving target defense | |
dc.subject.keyword | game theory | |
dc.description.note | ||
dc.contributor.guide | Padmavathi G | |
dc.publisher.place | Coimbatore | |
dc.publisher.university | Avinashilingam Deemed University For Women | |
dc.publisher.institution | Department of Computer Science | |
dc.date.registered | 08.12.2010 | |
dc.date.completed | 05.06.2014 | |
dc.date.awarded | 05.10.2015 | |
dc.format.dimensions | 210 X 290 mm | |
dc.format.accompanyingmaterial | DVD | |
dc.source.university | University | |
dc.type.degree | Ph.D. | |
Appears in Departments: | Department of Computer Science |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
muma_chapter 10.pdf | Attached File | 165.39 kB | Adobe PDF | View/Open |
muma_chapter 1.pdf | 124.26 kB | Adobe PDF | View/Open | |
muma_chapter 2.pdf | 289.01 kB | Adobe PDF | View/Open | |
muma_chapter 3.pdf | 129.24 kB | Adobe PDF | View/Open | |
muma_chapter 4.pdf | 2.18 MB | Adobe PDF | View/Open | |
muma_chapter 5.pdf | 180.67 kB | Adobe PDF | View/Open | |
muma_chapter 6.pdf | 157 kB | Adobe PDF | View/Open | |
muma_chapter 7.pdf | 200.35 kB | Adobe PDF | View/Open | |
muma_chapter 8.pdf | 219.38 kB | Adobe PDF | View/Open | |
muma_chapter 9.pdf | 87.2 kB | Adobe PDF | View/Open | |
muma_intro.pdf | 128.85 kB | Adobe PDF | View/Open |
Items in Shodhganga are licensed under Creative Commons Licence Attribution-NonCommercial-ShareAlike 4.0 International (CC BY-NC-SA 4.0).
Altmetric Badge: