02566nam a2200169Ia 4500999001700000100007500017245009200092260001000184260000900194300000700203500191500210700004802125856003202173942001102205952009002216952009002306 c62688d62685 aNisar Ahmed Memon a15MCCN02aSupervisor - Dr. Intesab Hussain Sadhayo 0aProcessor Exhaustion Due to DDOS Attack on Virtualized Server and Detection (Me Thesis) bQUEST c2018 a46 aABSTRACT In recent years, virtualization is a fast-growing technology in big data, cloud computing and grid computing due to its lower cost, flexible system, efficient use of resources, ease of management and efficient power consumption. Therefore, many platforms have become i n demand such as V M ware ESXi , Microsoft Hyper-V server and Xen Hypervisors etc. The virtualization is facing many security concerns among which Distributed Denial of Service (DDoS) i s one of the biggest threat. The DDoS attack i s basically, an attempt of attacking in distribution fashion to make server's resource unavailable to its legitimate users. The DDoS attack i s one of the dangerous attacks which is getting stronger day by day and has a severe threat to extensively used Internet based services like e-commerce, e-banking, transportation, medicine. education etc. The aim of this thesis is to stud y the impact s of processor exhaustion due to a dangerous DDoS attack on virtual server and implemented the Snortintrusion detect ion systems (I DS). The proposed strategy effectively detects DDoS attacks such as TCP SYN and U DP Flood attack based on the threshold limiting the specified time mechanism which gave better results than the other sol u t ions. DDoS attack i s genera ted wi t h the hel p of LOI C tool to check the processor exhaust ion of vi rt ua l server at different packet rate and time duration. The experimental results have demonstrated that maxi m u m pea k packet rate of TCP SYN i s 2771 43 and U DP DDoS is 1 68000 at which server totally halted. The generated attacks are detected i n the form of logs in which source and destination addresses are represented a long with port addresses. Furthermore, the Snort IOS tool detects the attacks at the early stage and helps minimize the effect of DDoS attack by alerting the network administrator which facilitates easy to diagnose the problem  aDepartment of Computer Systems Engineering  uhttp://tinyurl.com/yc7hjrdb cTHESIS 00104070aRESEARCHbRESEARCHd2018-10-22l0pMP/37-400r2018-10-22 00:00:00yTHESIS 00104070aRESEARCHbRESEARCHd2019-02-26l0pMP/38-402r2019-02-26 00:00:00yTHESIS