Please wait...

Mitigating techniques of DoS attack Final Year Project Report (CSC-404) 

Resource tools

File information File size Options

Original PDF File

901 KB Request

Screen

528 × 800 pixels (0.42 MP)

4.5 cm × 6.8 cm @ 300 PPI

147 KB Request
Resource details

Resource ID

100

Access

Open

Contributed by

Admin User

Author/Contributor

Subodh Upreti, Sudil Shrestha, Sujan Byanjankar, Diwash Adhikari, Rajan Karmacharya (Supervisor)

Publisher/Credit

Kathmandu: St. Xavier's College

Date

October 2014

Document type

Thesis or project

Department

Computer science

Course

BscCSIT, CSC-404: Project work

Level

Bachelor

Batch

2010

Abstract

There are many threats which have been evolved lately, among those threats Denial of
Services (DoS) are the most dangerous and cause destructive effects. This attack is
causing many damages to the companies including government and non-government
institution. As illustrated by CNET News, major companies like Yahoo, CNN, eBay,
E-Trade, Buy.com and Amazon.com were attacked or affected by Distributed Denial
o f Service (DDoS) attack. Many users are also affected by this attack, the website was
unreachable to the intended users, resulting huge financial losses to those company.
This project shows the effective steps or solutions for DoS attack that can control the
results. As there are many proofs that, there are no permanent solutions for DoS it can
only minimize the threats or damage. Therefore, this project shows the effective
solution by analyzing and monitoring of different network traffic. The different
detection technique and the mitigating technique of DoS attack will be carried out
throughout this project. Along with the testing of these detection and mitigation
techniques are also carried out. And these techniques also can be used for controlling
threats from DoS to the other IT aspects.
Distributed denial-of-service (DoS) attacks have recently emerged as one of the most
potent and prominent threats against information and service availability. Current
research on DDoS attacks lacks realistic tools that can generate customized high-and
low- rate DDoS attacks. Firewalls and routers can filter, block, and slow down attack
traffic. For this reason, a thorough performance evaluation of existing DoS attacks
and countermeasures is still an open research problem. Under this project, we develop
novel DDoS attack generation, detection and mitigation tools. The attack generation
tool can be used to launch controlled attacks against certain hosts. . A defense against
DDoS attacks is most difficult due to the complexity and more number of computers
involved. For attack detection, we first evaluate existing techniques. Based on this
nerformance evaluation, we choose the best available technique or devise a new
technique for DDoS attack detection. The selected DDoS detection technique is
implemented and tested on a real network.

Search for similar resources

Remove