Show simple item record

dc.contributor.authorMbabazi, Ruth
dc.date.accessioned2012-04-18T10:55:19Z
dc.date.available2012-04-18T10:55:19Z
dc.date.issued2009-09
dc.identifier.urihttp://hdl.handle.net/10570/550
dc.descriptionA Dissertation submitted to the School of Graduate Studies in partial fulfillment for the award of Master of Science in Data Communications and Software Engineering Degree of Makerere University.en_US
dc.description.abstractDenial of Service (DoS) attack detection is one of the most pressing issues in data networks’ security. To detect the attacks either signature based algorithms or anomaly detection algorithms or a combination of both are used. A number of detection techniques have been proposed to detect attacks at the source, core, and victim. In this work, we design a detection technique from a combination of a number of some of existing detection techniques to detect attacks at the victim machine. First we study the performance of a number of anomaly detection algorithms from which we select three algorithms that are most suitable for detection of attacks at the victim’s machine. The selected algorithms are cumulative sum algorithm (CUSUM), source IP address monitoring algorithm (SIM) and adaptive threshold algorithm. We used ns- 2 simulator to simulate background traffic and we superimposed on it traffic of the various attack types. We detected the attacks using the three algorithms. Using three performance indicators; probability of detection, detection delay and false detection rate, we analyzed the algorithms. We found out that on the whole, SIM and CUSUM algorithms performed equally well for all attacks while the adaptive threshold algorithm was only suitable for high intensity attacks. The SIM algorithm had the shortest average detection delay, followed by the CUSUM algorithm and lastly the adaptive threshold algorithm. Based on that performance, we designed a combined algorithm detection technique to be used for detecting flooding attacks while being used in the victim machine. The technique is a combination of parallel and sequential steps. The CUSUM and SIM algorithms are designed to work in parallel, while the adaptive threshold algorithm is run in case the results from the two are conflicting. An evaluation of the performance of the proposed technique was done.en_US
dc.language.isoenen_US
dc.subjectData network securityen_US
dc.subjectDenial of serviceen_US
dc.subjectAttack detectionen_US
dc.titleVictim-based defense against IP packet flooding denial of service attacksen_US
dc.typeThesis, mastersen_US


Files in this item

Thumbnail

This item appears in the following Collection(s)

Show simple item record