
100
Open
Admin User
Subodh Upreti, Sudil Shrestha, Sujan Byanjankar, Diwash Adhikari, Rajan Karmacharya (Supervisor)
Kathmandu: St. Xavier's College
October 2014
Thesis or project
Computer science
BscCSIT, CSC-404: Project work
Bachelor
2010
There are many threats which have been evolved lately, among those threats Denial of
Services (DoS) are the most dangerous and cause destructive effects. This attack is
causing many damages to the companies including government and non-government
institution. As illustrated by CNET News, major companies like Yahoo, CNN, eBay,
E-Trade, Buy.com and Amazon.com were attacked or affected by Distributed Denial
o f Service (DDoS) attack. Many users are also affected by this attack, the website was
unreachable to the intended users, resulting huge financial losses to those company.
This project shows the effective steps or solutions for DoS attack that can control the
results. As there are many proofs that, there are no permanent solutions for DoS it can
only minimize the threats or damage. Therefore, this project shows the effective
solution by analyzing and monitoring of different network traffic. The different
detection technique and the mitigating technique of DoS attack will be carried out
throughout this project. Along with the testing of these detection and mitigation
techniques are also carried out. And these techniques also can be used for controlling
threats from DoS to the other IT aspects.
Distributed denial-of-service (DoS) attacks have recently emerged as one of the most
potent and prominent threats against information and service availability. Current
research on DDoS attacks lacks realistic tools that can generate customized high-and
low- rate DDoS attacks. Firewalls and routers can filter, block, and slow down attack
traffic. For this reason, a thorough performance evaluation of existing DoS attacks
and countermeasures is still an open research problem. Under this project, we develop
novel DDoS attack generation, detection and mitigation tools. The attack generation
tool can be used to launch controlled attacks against certain hosts. . A defense against
DDoS attacks is most difficult due to the complexity and more number of computers
involved. For attack detection, we first evaluate existing techniques. Based on this
nerformance evaluation, we choose the best available technique or devise a new
technique for DDoS attack detection. The selected DDoS detection technique is
implemented and tested on a real network.