A comprehensive study of distributed denial of service attack with the detection techniques

Today, net related net services are indivisible in our life. Therefore, for the success of certain types of organizations, some sustained simplification of services is essential. However, these service area units were usually hindered by the constant threat from numerous kinds of attacks. One such a...

Full description

Saved in:
Bibliographic Details
Main Author: Ibrahim, Husam Hamid
Format: Thesis
Language:English
English
English
Published: 2018
Subjects:
Online Access:http://eprints.uthm.edu.my/7537/2/24p%20HUSAM%20HAMID%20IBRAHIM.pdf
http://eprints.uthm.edu.my/7537/1/HUSAM%20HAMID%20IBRAHIM%20COPYRIGHT%20DELARATION.pdf
http://eprints.uthm.edu.my/7537/3/HUSAM%20HAMID%20IBRAHIM%20WATERMARK.pdf
Tags: Add Tag
No Tags, Be the first to tag this record!
id my-uthm-ep.7537
record_format uketd_dc
spelling my-uthm-ep.75372022-08-21T01:42:36Z A comprehensive study of distributed denial of service attack with the detection techniques 2018-07 Ibrahim, Husam Hamid TK Electrical engineering. Electronics Nuclear engineering TK5101-6720 Telecommunication. Including telegraphy, telephone, radio, radar, television Today, net related net services are indivisible in our life. Therefore, for the success of certain types of organizations, some sustained simplification of services is essential. However, these service area units were usually hindered by the constant threat from numerous kinds of attacks. One such attack is called a distributed denial of service attack and leads to a problem starting with a temporary delay of the server in order to terminate the service's non-availability. A honeypot may be a kind of lure, but in order to prevent potential attackers from diverting, observing, preventing, and ensuring the ongoing convenience of the service. This study gives insight into the problem with distributed denial-of-service attacks. This researcher provides insight into problems caused by distributed denial of service attacks, simulates several types of attacks, analyzes the results, performs each single simulation, and shows how to prevent distributed denial of service attacks. This project explains recently introduced distributed denial of service (DDoS) and its techniques. DDoS attack method using NS - 2 simulator software. This research provides the results of four experiments related to DDoS attacks in a simulation environment with NS 2. The result of this project shows that the three main factors of DDoS attack are attack time, attack strength and pocket size. Attack time is mainly related to attack strength. Finally, it is shown that the buffer size plays a role in processing attack traffic. 2018-07 Thesis http://eprints.uthm.edu.my/7537/ http://eprints.uthm.edu.my/7537/2/24p%20HUSAM%20HAMID%20IBRAHIM.pdf text en public http://eprints.uthm.edu.my/7537/1/HUSAM%20HAMID%20IBRAHIM%20COPYRIGHT%20DELARATION.pdf text en staffonly http://eprints.uthm.edu.my/7537/3/HUSAM%20HAMID%20IBRAHIM%20WATERMARK.pdf text en validuser mphil masters Universiti Tun Hussein Onn Malaysia Fakulti Kejuruteraan Elektrik dan Elektronik
institution Universiti Tun Hussein Onn Malaysia
collection UTHM Institutional Repository
language English
English
English
topic TK Electrical engineering
Electronics Nuclear engineering
TK Electrical engineering
Electronics Nuclear engineering
spellingShingle TK Electrical engineering
Electronics Nuclear engineering
TK Electrical engineering
Electronics Nuclear engineering
Ibrahim, Husam Hamid
A comprehensive study of distributed denial of service attack with the detection techniques
description Today, net related net services are indivisible in our life. Therefore, for the success of certain types of organizations, some sustained simplification of services is essential. However, these service area units were usually hindered by the constant threat from numerous kinds of attacks. One such attack is called a distributed denial of service attack and leads to a problem starting with a temporary delay of the server in order to terminate the service's non-availability. A honeypot may be a kind of lure, but in order to prevent potential attackers from diverting, observing, preventing, and ensuring the ongoing convenience of the service. This study gives insight into the problem with distributed denial-of-service attacks. This researcher provides insight into problems caused by distributed denial of service attacks, simulates several types of attacks, analyzes the results, performs each single simulation, and shows how to prevent distributed denial of service attacks. This project explains recently introduced distributed denial of service (DDoS) and its techniques. DDoS attack method using NS - 2 simulator software. This research provides the results of four experiments related to DDoS attacks in a simulation environment with NS 2. The result of this project shows that the three main factors of DDoS attack are attack time, attack strength and pocket size. Attack time is mainly related to attack strength. Finally, it is shown that the buffer size plays a role in processing attack traffic.
format Thesis
qualification_name Master of Philosophy (M.Phil.)
qualification_level Master's degree
author Ibrahim, Husam Hamid
author_facet Ibrahim, Husam Hamid
author_sort Ibrahim, Husam Hamid
title A comprehensive study of distributed denial of service attack with the detection techniques
title_short A comprehensive study of distributed denial of service attack with the detection techniques
title_full A comprehensive study of distributed denial of service attack with the detection techniques
title_fullStr A comprehensive study of distributed denial of service attack with the detection techniques
title_full_unstemmed A comprehensive study of distributed denial of service attack with the detection techniques
title_sort comprehensive study of distributed denial of service attack with the detection techniques
granting_institution Universiti Tun Hussein Onn Malaysia
granting_department Fakulti Kejuruteraan Elektrik dan Elektronik
publishDate 2018
url http://eprints.uthm.edu.my/7537/2/24p%20HUSAM%20HAMID%20IBRAHIM.pdf
http://eprints.uthm.edu.my/7537/1/HUSAM%20HAMID%20IBRAHIM%20COPYRIGHT%20DELARATION.pdf
http://eprints.uthm.edu.my/7537/3/HUSAM%20HAMID%20IBRAHIM%20WATERMARK.pdf
_version_ 1747831164887891968