Please use this identifier to cite or link to this item:
http://localhost:8081/xmlui/handle/123456789/12171
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Gupta, Neha | - |
dc.date.accessioned | 2014-11-30T05:40:55Z | - |
dc.date.available | 2014-11-30T05:40:55Z | - |
dc.date.issued | 2010 | - |
dc.identifier | M.Tech | en_US |
dc.identifier.uri | http://hdl.handle.net/123456789/12171 | - |
dc.guide | Mishra, Manoj | - |
dc.description.abstract | Today, Internet is the prime medium for communication which is used by the number of users across the globe. At the same time, its commercial nature is causing increasing vulnerability to cyber crimes and there has been an enormous increase in the number of DDoS attacks on the Internet over the past decade. Network resources such as network bandwidth, web servers and network switches are mostly the victims of DDoS attacks. Current Internet architecture allows the attacker to spoof the source address of the IP packet by rewriting the packet header. This gives provision to conceal the identity of the source of attack. IP spoofing is the most popular form of Distributed Denial of Service attack. A large number of schemes have been proposed and implemented for the defense against DDoS attacks. Some defend the attack by filtering and dropping packets and some defend the attack by tracing back to the source of attack after experiencing it. Both mechanisms have their own drawbacks. However these schemes require a large amount of space and do not use cooperation. In this dissertation "A. Space-Efficient Cooperative Method for Detecting DDoS Attacks ", we proposed a space-efficient cooperative scheme which produces warning of the DDoS attack at an early stage. It uses a Bloom filter-based detection scheme to generate accurate detection results and- at the same time consumes less space and computational resources. The proposed scheme has been simulated using NS-2 (Network Simulator) on a Linux platform. Various test cases have been designed, for which simulations were performed by varying different parameters. The comparison of results with the existing schemes has overcome with some of the limitations like space, hash collisions etc. iii | en_US |
dc.language.iso | en | en_US |
dc.subject | ELECTRONICS AND COMPUTER ENGINEERING | en_US |
dc.subject | SPACE-EFFICIENT | en_US |
dc.subject | COOPERATIVE METHOD | en_US |
dc.subject | DDoS ATTACKS | en_US |
dc.title | SPACE-EFFICIENT COOPERATIVE METHOD FOR DETECTING DDoS ATTACKS | en_US |
dc.type | M.Tech Dessertation | en_US |
dc.accession.number | G20080 | en_US |
Appears in Collections: | MASTERS' THESES (E & C) |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
ECDG20080.pdf | 4.9 MB | Adobe PDF | View/Open |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.