Enhancement of IP trace back packet marking algorithm to detect denial of service attack /

The Internet attack has been made possible by lack of source authentication in the IP protocol. The nature of identifying the internet attacker has been made difficult because of the open, trusting nature of the protocol which makes it possible for an attacker to spoof the source address. By using I...

Full description

Saved in:
Bibliographic Details
Main Author: Saleem, Habibullah
Format: Thesis
Language:English
Published: Kuala Lumpur : {Kulliyyah of Engineering}, International Islamic University Malaysia, 2015
Subjects:
Online Access:http://studentrepo.iium.edu.my/handle/123456789/4767
Tags: Add Tag
No Tags, Be the first to tag this record!
LEADER 028530000a22002770004500
008 160112t2015 my a g m 000 0 eng d
040 |a UIAM  |b eng 
041 |a eng 
043 |a a-my-- 
050 0 0 |a TK5105.59 
100 1 |a Saleem, Habibullah 
245 1 |a Enhancement of IP trace back packet marking algorithm to detect denial of service attack /  |c byHabibullah Saleem 
260 |a Kuala Lumpur :  |b {Kulliyyah of Engineering}, International Islamic University Malaysia,   |c 2015 
300 |a xv, 119 leaves :  |b ill. ;  |c 30cm. 
502 |a Thesis (MSCE)--International Islamic University Malaysia, 2015. 
504 |a Includes bibliographical references (leaves 90-95) 
520 |a The Internet attack has been made possible by lack of source authentication in the IP protocol. The nature of identifying the internet attacker has been made difficult because of the open, trusting nature of the protocol which makes it possible for an attacker to spoof the source address. By using IP spoofing the attackers are able to hide their identity, thus making it extremely difficult to identify the source of the attack. Therefore, the main aim of using IP trace back scheme is to detect the source of the attack. This work focuses on enhancing IP trace back algorithm and applies egress filtering to detect denial of service attack. Qualnet 5.2 simulation software is used to simulate denial of service attack and IP trace back is used for trace back. The enhancement algorithm compromises of egress filtering and packet marking, the use of egress filtering is to discard the packets with illegitimate IP address. The performance metrics are throughput, jitter and delay, the simulation results shown that IP trace back enhancement improves detection of denial of service attack by observing performance metrics. The performance metrics is verified and the effectiveness is observed through simulation. The average percentage reduction of throughput was 44%, average delay was 63% and average jitter was 61% when comes to detection of DoS attack by using egress filtering. It is expected that further research would help improve the performance of this algorithm to expected level. 
596 |a 1 
655 7 |a Theses, IIUM local 
690 |a Dissertations, Academic  |x Department of Communication Engineering  |z IIUM 
710 2 |a International Islamic University Malaysia.  |b Department of Communication Engineering 
856 4 |u http://studentrepo.iium.edu.my/handle/123456789/4767 
900 |a snas-ls-rmb 
999 |c 438162  |d 468435 
952 |0 0  |6 T TK 005105.59 S163E 2015  |7 0  |8 THESES  |9 760860  |a IIUM  |b IIUM  |c MULTIMEDIA  |g 0.00  |o t TK 5105.59 S163E 2015  |p 11100343939  |r 2017-10-20  |t 1  |v 0.00  |y THESIS 
952 |0 0  |6 TS CDF TK 5105.59 S163E 2015  |7 0  |8 THESES  |9 854142  |a IIUM  |b IIUM  |c MULTIMEDIA  |g 0.00  |o ts cdf TK 5105.59 S163E 2015  |p 11100343940  |r 2017-10-26  |t 1  |v 0.00  |y THESISDIG