Enhancement of IP trace back packet marking algorithm to detect denial of service attack /
The Internet attack has been made possible by lack of source authentication in the IP protocol. The nature of identifying the internet attacker has been made difficult because of the open, trusting nature of the protocol which makes it possible for an attacker to spoof the source address. By using I...
Saved in:
Main Author: | |
---|---|
Format: | Thesis |
Language: | English |
Published: |
Kuala Lumpur :
{Kulliyyah of Engineering}, International Islamic University Malaysia,
2015
|
Subjects: | |
Online Access: | http://studentrepo.iium.edu.my/handle/123456789/4767 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
LEADER | 028530000a22002770004500 | ||
---|---|---|---|
008 | 160112t2015 my a g m 000 0 eng d | ||
040 | |a UIAM |b eng | ||
041 | |a eng | ||
043 | |a a-my-- | ||
050 | 0 | 0 | |a TK5105.59 |
100 | 1 | |a Saleem, Habibullah | |
245 | 1 | |a Enhancement of IP trace back packet marking algorithm to detect denial of service attack / |c byHabibullah Saleem | |
260 | |a Kuala Lumpur : |b {Kulliyyah of Engineering}, International Islamic University Malaysia, |c 2015 | ||
300 | |a xv, 119 leaves : |b ill. ; |c 30cm. | ||
502 | |a Thesis (MSCE)--International Islamic University Malaysia, 2015. | ||
504 | |a Includes bibliographical references (leaves 90-95) | ||
520 | |a The Internet attack has been made possible by lack of source authentication in the IP protocol. The nature of identifying the internet attacker has been made difficult because of the open, trusting nature of the protocol which makes it possible for an attacker to spoof the source address. By using IP spoofing the attackers are able to hide their identity, thus making it extremely difficult to identify the source of the attack. Therefore, the main aim of using IP trace back scheme is to detect the source of the attack. This work focuses on enhancing IP trace back algorithm and applies egress filtering to detect denial of service attack. Qualnet 5.2 simulation software is used to simulate denial of service attack and IP trace back is used for trace back. The enhancement algorithm compromises of egress filtering and packet marking, the use of egress filtering is to discard the packets with illegitimate IP address. The performance metrics are throughput, jitter and delay, the simulation results shown that IP trace back enhancement improves detection of denial of service attack by observing performance metrics. The performance metrics is verified and the effectiveness is observed through simulation. The average percentage reduction of throughput was 44%, average delay was 63% and average jitter was 61% when comes to detection of DoS attack by using egress filtering. It is expected that further research would help improve the performance of this algorithm to expected level. | ||
596 | |a 1 | ||
655 | 7 | |a Theses, IIUM local | |
690 | |a Dissertations, Academic |x Department of Communication Engineering |z IIUM | ||
710 | 2 | |a International Islamic University Malaysia. |b Department of Communication Engineering | |
856 | 4 | |u http://studentrepo.iium.edu.my/handle/123456789/4767 | |
900 | |a snas-ls-rmb | ||
999 | |c 438162 |d 468435 | ||
952 | |0 0 |6 T TK 005105.59 S163E 2015 |7 0 |8 THESES |9 760860 |a IIUM |b IIUM |c MULTIMEDIA |g 0.00 |o t TK 5105.59 S163E 2015 |p 11100343939 |r 2017-10-20 |t 1 |v 0.00 |y THESIS | ||
952 | |0 0 |6 TS CDF TK 5105.59 S163E 2015 |7 0 |8 THESES |9 854142 |a IIUM |b IIUM |c MULTIMEDIA |g 0.00 |o ts cdf TK 5105.59 S163E 2015 |p 11100343940 |r 2017-10-26 |t 1 |v 0.00 |y THESISDIG |