Please use this identifier to cite or link to this item: http://localhost:8081/xmlui/handle/123456789/11720
Full metadata record
DC FieldValueLanguage
dc.contributor.authorSeelam, Sunil Kumar-
dc.date.accessioned2014-11-28T05:10:46Z-
dc.date.available2014-11-28T05:10:46Z-
dc.date.issued2007-
dc.identifierM.Techen_US
dc.identifier.urihttp://hdl.handle.net/123456789/11720-
dc.guideSingh, Kuldip-
dc.description.abstractA major threat to . the internet information economy is Distributed denial-of-service (DDoS) attacks. These attacks are highly prevalent despite the widespread deployment of perimeter-based countermeasures. Therefore, more effective approaches are required to counter the threat. This requires distributed and scalable mechanism for effective early detection and prevention of DDoS attacks at the router level within a network infrastructure. Recent events show that distributed denial-of-service (DDoS) attack imposes great threat to availability of Internet services. In this work "Detection and mitigation of DDoS attacks using buffer" are studied, evaluated, and proposed an integrated approach to DDoS attack detection and tolerance. It is very difficult to distinguish the difference between the attack traffic and legitimate traffic. In fact, this difference can only be observed from analyzing the data in the packet header. The DDoS attacks show anomalies in the characteristics of the selected packet attributes. Based on the simulation results, a more complete and effective DDoS countermeasure solution has been built to achieve DDoS attack detection and tolerance. When an attack has impact on a system parameter, then the parameter can be used as attack detection metric. In this work, the impact of DOS attacks on three simple system parameters - request arrival rate, Goodput and response time are qualitatively and quantitatively analyzed. Here arrival rate of packets is used as a parameter for detection and Goodput and response time are used to evaluate the effectiveness of characterization and tolerance. The aim of this solution is to maximize the throughput of the server by stopping the attack traffic at the edge routers of the ISP. The Simulations are carried on Network Simulator-2. iiien_US
dc.language.isoenen_US
dc.subjectELECTRONICS AND COMPUTER ENGINEERINGen_US
dc.subjectDDoS ATTACKSen_US
dc.subjectLEGITIMATE TRAFFICen_US
dc.subjectINTERNET SERVICESen_US
dc.titleDETECTION AND MITIGATION OF DDoS ATTACKS USING BUFFERen_US
dc.typeM.Tech Dessertationen_US
dc.accession.numberG13407en_US
Appears in Collections:MASTERS' THESES (E & C)

Files in This Item:
File Description SizeFormat 
ECDG13407.pdf3.23 MBAdobe PDFView/Open


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.