Some studies on distributed denial of service attacks and solutions by honeymesh

dc.contributor.guideGanesan L
dc.coverage.spatialSome Studies on Distributed Denial of Service Attacks and Solutions by Honeymesh
dc.creator.researcherRajarajan G
dc.date.accessioned2019-08-26T05:57:39Z
dc.date.available2019-08-26T05:57:39Z
dc.date.awarded31/07/2018
dc.date.completed2018
dc.date.registeredn.d.
dc.description.abstractIn this digital world, anyone can access as well as process information in internetwork. This openness feature of Internet is the primary reason for its dominance. Meanwhile, this same feature creates multiple loopholes and security issues in these networks. Out of many threats and attacks to which the Internet is vulnerable to, Distributed Denial of Service (DDoS) attacks remain predominant. DDoS attacks are evolving in the networked world with improvised state-of-the art techniques and imprints acute onset over legitimate network resources, components, etc. Since the DDoS attackers made the possibility of conducting DDoS by anyone in a simplest way, this menace is still unstoppable. Many researchers and security practitioners proposed solutions for these DDoS attacks right from the beginning, but attackers coming out with cutting edge technology of attacks with multiple variations. This research work focuses on mitigating the DDoS attacks through the network of honeypots. The impact of DDoS attack is tested with and without honeypot mechanisms. Initially, this research work concentrates on mitigating DDoS through combining rate-limit and Access Control Lists (ACL) mechanisms. newline newline newline
dc.description.note
dc.format.accompanyingmaterialNone
dc.format.dimensions21cm.
dc.format.extentxvi,, 124p.
dc.identifier.urihttp://hdl.handle.net/10603/254814
dc.languageEnglish
dc.publisher.institutionFaculty of Information and Communication Engineering
dc.publisher.placeChennai
dc.publisher.universityAnna University
dc.relationp.114-123
dc.rightsuniversity
dc.source.universityUniversity
dc.subject.keywordAccess Control Lists
dc.subject.keywordDistributed Denial of Service
dc.subject.keywordEngineering and Technology,Computer Science,Computer Science Information Systems
dc.subject.keywordHoneymesh
dc.subject.keywordService Attacks
dc.titleSome studies on distributed denial of service attacks and solutions by honeymesh
dc.title.alternative
dc.type.degreePh.D.

Files

Original bundle

Now showing 1 - 5 of 15
Loading...
Thumbnail Image
Name:
01_title.pdf
Size:
11.59 KB
Format:
Adobe Portable Document Format
Description:
Attached File
Loading...
Thumbnail Image
Name:
02_certificates.pdf
Size:
434.89 KB
Format:
Adobe Portable Document Format
Loading...
Thumbnail Image
Name:
03_abstract.pdf
Size:
6.98 KB
Format:
Adobe Portable Document Format
Loading...
Thumbnail Image
Name:
04_acknowledgement.pdf
Size:
5.79 KB
Format:
Adobe Portable Document Format
Loading...
Thumbnail Image
Name:
05_contents.pdf
Size:
324.84 KB
Format:
Adobe Portable Document Format

License bundle

Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
license.txt
Size:
1.79 KB
Format:
Plain Text
Description: