QUEST Central Library Banner

Processor Exhaustion Due to DDOS Attack on Virtualized Server and Detection (Me Thesis) (Record no. 62688)

MARC details
000 -LEADER
fixed length control field 02366nam a2200145Ia 4500
100 ## - MAIN ENTRY--AUTHOR NAME
Personal name Nisar Ahmed Memon
-- 15MCCN02
-- Supervisor - Dr. Intesab Hussain Sadhayo
245 #0 - TITLE STATEMENT
Title Processor Exhaustion Due to DDOS Attack on Virtualized Server and Detection (Me Thesis)
260 ## - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT)
Name of publisher QUEST
260 ## - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT)
Year of publication 2018
300 ## - PHYSICAL DESCRIPTION
Number of Pages 46
500 ## - GENERAL NOTE
General note ABSTRACT<br/><br/>In recent years, virtualization is a fast-growing technology in big data, cloud computing and grid computing due to its lower cost, flexible system, efficient use of resources, ease of management and efficient power consumption. Therefore, many platforms have become i n demand such as V M ware ESXi , Microsoft Hyper-V server and Xen Hypervisors etc. The virtualization is facing many security concerns among which Distributed Denial of Service (DDoS) i s one of the biggest threat. The DDoS attack i s basically, an attempt of attacking in distribution fashion to make server's resource unavailable to its legitimate users. The DDoS attack i s one of the dangerous attacks which is getting stronger day by day and has a severe threat to extensively used Internet based services like e-commerce, e-banking, transportation, medicine. education etc.<br/>The aim of this thesis is to stud y the impact s of processor exhaustion due to a dangerous DDoS attack on virtual server and implemented the Snortintrusion detect ion systems (I DS). The proposed strategy effectively detects DDoS attacks such as TCP SYN and U DP Flood attack based on the threshold limiting the specified time mechanism which gave better results than the other sol u t ions. DDoS attack i s genera ted wi t h the hel p of LOI C tool to check the processor exhaust ion of vi rt ua l server at different packet rate and time duration. The experimental results have demonstrated that maxi m u m pea k packet rate of TCP SYN i s 2771 43 and U DP DDoS is 1 68000 at which server totally halted. The generated attacks are detected i n the form of logs in which source and destination addresses are represented a long with port addresses. Furthermore, the Snort IOS tool detects the attacks at the early stage and helps minimize the effect of DDoS attack by alerting the network administrator which facilitates easy to diagnose the problem<br/>
700 ## - ADDED ENTRY--PERSONAL NAME
Personal name Department of Computer Systems Engineering
856 ## - ELECTRONIC LOCATION AND ACCESS
Uniform Resource Identifier http://tinyurl.com/yc7hjrdb
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Koha item type Thesis and Dissertation
Holdings
Withdrawn status Lost status Home library Current library Date acquired Accession Number Koha item type
    Research Section Research Section 22/10/2018 MP/37-400 Thesis and Dissertation
    Research Section Research Section 26/02/2019 MP/38-402 Thesis and Dissertation

Copyright © 2018,The QUEST, Nawabshah, Shaheed Benazirabad. All rights reserved
Mr. G. Farooq Channar (Librarian) QUEST, Nawabshah, Sindh, Pakistan 67480.
 Ph#: |   0244-9370381-4 Ext. 2308   Email| lib@quest.edu.pk   Web|  http://www.quest.edu.pk