Comparative study based on DOS ATTACK at network layer in wired and wireless network / Norfarina Nordin
The Denial of Service (DoS) attack, especially the Distributed Denial of Service (DDoS) attack, has become one of the major threats to the Internet. Generally, attackers launch DDoS attacks by directing a massive number of attack sources to send useless traffic to the victim. The victim’s services a...
Saved in:
Main Author: | |
---|---|
Format: | Thesis |
Language: | English |
Published: |
2020
|
Subjects: | |
Online Access: | https://ir.uitm.edu.my/id/eprint/27172/1/TD_NORFARINA%20NORDIN%20CS%20R%2020_5.pdf |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
id |
my-uitm-ir.27172 |
---|---|
record_format |
uketd_dc |
spelling |
my-uitm-ir.271722020-01-10T04:31:38Z Comparative study based on DOS ATTACK at network layer in wired and wireless network / Norfarina Nordin 2020-01-10 Nordin, Norfarina Instruments and machines Electronic Computers. Computer Science The Denial of Service (DoS) attack, especially the Distributed Denial of Service (DDoS) attack, has become one of the major threats to the Internet. Generally, attackers launch DDoS attacks by directing a massive number of attack sources to send useless traffic to the victim. The victim’s services are disrupted when its host or network resources are occupied by the attack traffic. The threat of DDoS attacks has become even more severe as attackers can compromise a huge number of computers by spreading a computer worm using vulnerabilities in popular operating systems. A survey conducted by the Malaysian Computer Emergency Response Team (MYCERT) Malaysia 2018, the past ten years shown a significant increase of DoS attack up to 20% since 2007. These attacks are done either from wired environment or from the wireless environment. Riverbed Modeler Academic Edition 17.5 and Wireshark Analyser 2.6.4 is used to design and analyse the performance of the network. A comparison of two scenarios is conducted. The first scenario is DoS attack in wired network and the second is DoS Attack in wireless network. Furthermore, the performance of for each scenario are conducted based on the performance metrics of BER, SNR and throughput. Furthermore, these three performances metrics were analysed and the result concluded BER and SNR unable to detect the attack compared to throughput metric. 2020-01 Thesis https://ir.uitm.edu.my/id/eprint/27172/ https://ir.uitm.edu.my/id/eprint/27172/1/TD_NORFARINA%20NORDIN%20CS%20R%2020_5.pdf text en public degree Universiti Teknologi Mara Perlis Faculty of Computer and Mathematical Sciences |
institution |
Universiti Teknologi MARA |
collection |
UiTM Institutional Repository |
language |
English |
topic |
Instruments and machines Instruments and machines |
spellingShingle |
Instruments and machines Instruments and machines Nordin, Norfarina Comparative study based on DOS ATTACK at network layer in wired and wireless network / Norfarina Nordin |
description |
The Denial of Service (DoS) attack, especially the Distributed Denial of Service (DDoS) attack, has become one of the major threats to the Internet. Generally, attackers launch DDoS attacks by directing a massive number of attack sources to send useless traffic to the victim. The victim’s services are disrupted when its host or network resources are occupied by the attack traffic. The threat of DDoS attacks has become even more severe as attackers can compromise a huge number of computers by spreading a computer worm using vulnerabilities in popular operating systems. A survey conducted by the Malaysian Computer Emergency Response Team (MYCERT) Malaysia 2018, the past ten years shown a significant increase of DoS attack up to 20% since 2007. These attacks are done either from wired environment or from the wireless environment. Riverbed Modeler Academic Edition 17.5 and Wireshark Analyser 2.6.4 is used to design and analyse the performance of the network. A comparison of two scenarios is conducted. The first scenario is DoS attack in wired network and the second is DoS Attack in wireless network. Furthermore, the performance of for each scenario are conducted based on the performance metrics of BER, SNR and throughput. Furthermore, these three performances metrics were analysed and the result concluded BER and SNR unable to detect the attack compared to throughput metric. |
format |
Thesis |
qualification_level |
Bachelor degree |
author |
Nordin, Norfarina |
author_facet |
Nordin, Norfarina |
author_sort |
Nordin, Norfarina |
title |
Comparative study based on DOS ATTACK at network layer in wired and wireless network / Norfarina Nordin |
title_short |
Comparative study based on DOS ATTACK at network layer in wired and wireless network / Norfarina Nordin |
title_full |
Comparative study based on DOS ATTACK at network layer in wired and wireless network / Norfarina Nordin |
title_fullStr |
Comparative study based on DOS ATTACK at network layer in wired and wireless network / Norfarina Nordin |
title_full_unstemmed |
Comparative study based on DOS ATTACK at network layer in wired and wireless network / Norfarina Nordin |
title_sort |
comparative study based on dos attack at network layer in wired and wireless network / norfarina nordin |
granting_institution |
Universiti Teknologi Mara Perlis |
granting_department |
Faculty of Computer and Mathematical Sciences |
publishDate |
2020 |
url |
https://ir.uitm.edu.my/id/eprint/27172/1/TD_NORFARINA%20NORDIN%20CS%20R%2020_5.pdf |
_version_ |
1783733929471115264 |