A comprehensive study of distributed denial of service attack with the detection techniques

Ibrahim, Husam Hamid (2018) A comprehensive study of distributed denial of service attack with the detection techniques. Masters thesis, Universiti Tun Hussein Onn Malaysia.

[img]
Preview
Text
24p HUSAM HAMID IBRAHIM.pdf

Download (892kB) | Preview
[img] Text (Copyright Declaration)
HUSAM HAMID IBRAHIM COPYRIGHT DECLARATION.pdf
Restricted to Repository staff only

Download (504kB) | Request a copy
[img] Text (Full text)
HUSAM HAMID IBRAHIM WATERMARK.pdf
Restricted to Registered users only

Download (1MB) | Request a copy

Abstract

Today, net related net services are indivisible in our life. Therefore, for the success of certain types of organizations, some sustained simplification of services is essential. However, these service area units were usually hindered by the constant threat from numerous kinds of attacks. One such attack is called a distributed denial of service attack and leads to a problem starting with a temporary delay of the server in order to terminate the service's non-availability. A honeypot may be a kind of lure, but in order to prevent potential attackers from diverting, observing, preventing, and ensuring the ongoing convenience of the service. This study gives insight into the problem with distributed denial-of-service attacks. This researcher provides insight into problems caused by distributed denial of service attacks, simulates several types of attacks, analyzes the results, performs each single simulation, and shows how to prevent distributed denial of service attacks. This project explains recently introduced distributed denial of service (DDoS) and its techniques. DDoS attack method using NS - 2 simulator software. This research provides the results of four experiments related to DDoS attacks in a simulation environment with NS 2. The result of this project shows that the three main factors of DDoS attack are attack time, attack strength and pocket size. Attack time is mainly related to attack strength. Finally, it is shown that the buffer size plays a role in processing attack traffic.

Item Type: Thesis (Masters)
Subjects: T Technology > TK Electrical engineering. Electronics Nuclear engineering > TK5101-6720 Telecommunication. Including telegraphy, telephone, radio, radar, television
Divisions: Faculty of Electrical and Electronic Engineering > Department of Electrical Engineering
Depositing User: Miss Afiqah Faiqah Mohd Hafiz
Date Deposited: 25 Jul 2021 02:43
Last Modified: 25 Jul 2021 02:43
URI: http://eprints.uthm.edu.my/id/eprint/414

Actions (login required)

View Item View Item