Comparative study based on DOS ATTACK at network layer in wired and wireless network / Norfarina Nordin

The Denial of Service (DoS) attack, especially the Distributed Denial of Service (DDoS) attack, has become one of the major threats to the Internet. Generally, attackers launch DDoS attacks by directing a massive number of attack sources to send useless traffic to the victim. The victim’s services a...

Full description

Saved in:
Bibliographic Details
Main Author: Nordin, Norfarina
Format: Thesis
Language:English
Published: 2020
Subjects:
Online Access:https://ir.uitm.edu.my/id/eprint/27172/1/TD_NORFARINA%20NORDIN%20CS%20R%2020_5.pdf
Tags: Add Tag
No Tags, Be the first to tag this record!
Description
Summary:The Denial of Service (DoS) attack, especially the Distributed Denial of Service (DDoS) attack, has become one of the major threats to the Internet. Generally, attackers launch DDoS attacks by directing a massive number of attack sources to send useless traffic to the victim. The victim’s services are disrupted when its host or network resources are occupied by the attack traffic. The threat of DDoS attacks has become even more severe as attackers can compromise a huge number of computers by spreading a computer worm using vulnerabilities in popular operating systems. A survey conducted by the Malaysian Computer Emergency Response Team (MYCERT) Malaysia 2018, the past ten years shown a significant increase of DoS attack up to 20% since 2007. These attacks are done either from wired environment or from the wireless environment. Riverbed Modeler Academic Edition 17.5 and Wireshark Analyser 2.6.4 is used to design and analyse the performance of the network. A comparison of two scenarios is conducted. The first scenario is DoS attack in wired network and the second is DoS Attack in wireless network. Furthermore, the performance of for each scenario are conducted based on the performance metrics of BER, SNR and throughput. Furthermore, these three performances metrics were analysed and the result concluded BER and SNR unable to detect the attack compared to throughput metric.