To see the other types of publications on this topic, follow the link: Ddos.

Dissertations / Theses on the topic 'Ddos'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 dissertations / theses for your research on the topic 'Ddos.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.

1

Sönnerfors, Peter, Elliot Nilsson, and Michael Gustafsson. "DDoS-skydd för hemanvändare : En studie kring DDoS." Thesis, Linnéuniversitetet, Institutionen för datavetenskap (DV), 2014. http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-34952.

Full text
Abstract:
Att försörja sig som streamingpersonlighet på Internet är något som vuxit explosionsartatpå senare tid. Detta leder också till att man blir ett tydligt mål för attacker. Detta arbetehar belyst den problematik som DDoS-attacker skapar när de riktas mot hemanvändare.Olika lösningar på detta problem gås igenom och analyseras. Tester har utförts för attbelysa enkelheten i attacken samt hur den påverkar hemanvändares hårdvara. Testernahar resulterat i att VPN är en kompetent lösning men innehåller även nackdelar.<br>To make a living as streaming personality on the Internet is something that has gro
APA, Harvard, Vancouver, ISO, and other styles
2

Andersson, Emil. "DDoS: Ett evolverande fenomen / DDoS: An evolving phenomenon." Thesis, Malmö högskola, Fakulteten för teknik och samhälle (TS), 2012. http://urn.kb.se/resolve?urn=urn:nbn:se:mau:diva-20596.

Full text
Abstract:
Internetfenomenet ”Distributed Denial of Service”, förkortat DDoS, beskrivs ofta som ett av destörsta hoten mot Internet idag. Genom att utnyttja den grundläggande strukturen i kommunikationmellan nätverk och datorer kan kriminella blockera och stänga ute webbplatser och -tjänster frånanvändare, samtidigt som det är mycket svårt för offret och myndigheter att någonsin identifieraden eller de skyldiga. Enorma globala nätverk av ovetande människors infekterade datorer fjärrstyrstill att utföra angrepp mot alla sorters organisationer på Internet med olika motiv, som finansiella,politiska eller fö
APA, Harvard, Vancouver, ISO, and other styles
3

Nagy, Peter. "Automatická mitigace DDoS útoku." Master's thesis, Vysoké učení technické v Brně. Fakulta informačních technologií, 2018. http://www.nusl.cz/ntk/nusl-386011.

Full text
Abstract:
The aim of this thesis is automation of DDoS attack mitigation. This thesis provides an overview of GNU/Linux network platforms and different approaches for their configuration. The aim is to select a platform that could be extended to automate DDoS mitigation. DDoS attack types are explained as well. Selected methods for DDoS mitigation are described in more detail such as Remote Triggered Black Hole and BGP Flowspec. Existing tools like DDoS Defender and FastNetMon are used to detect a DDoS attack. NETX was chosen as target implementation platform. To communicate with devices, API or BGP pro
APA, Harvard, Vancouver, ISO, and other styles
4

Arikan, Erinc. "Attack profiling for DDoS benchmarks." Access to citation, abstract and download form provided by ProQuest Information and Learning Company; downloadable PDF file Mb., 96 p, 2006. http://gateway.proquest.com/openurl?url_ver=Z39.88-2004&res_dat=xri:pqdiss&rft_val_fmt=info:ofi/fmt:kev:mtx:dissertation&rft_dat=xri:pqdiss:1435821.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Hurta, Marek. "Odvozování pravidel pro mitigaci DDoS." Master's thesis, Vysoké učení technické v Brně. Fakulta informačních technologií, 2017. http://www.nusl.cz/ntk/nusl-363809.

Full text
Abstract:
This thesis is aimed at monitoring of computer networks using NetFlow data. It describes main aspects of detection network anomalies using IDS systems. Next part describes Nemea framework, which is used for creating modules. These modules are able to detect network incidents and attacks. Following chapters contain a brief overview of common network attacks with their specific remarks which can help in process of their detection. Based on this analysis, the concept of mitigation rules was created. These rules can be used for mitigation of DDoS attack. This method was tested on several data sets
APA, Harvard, Vancouver, ISO, and other styles
6

Flandrin, Flavien. "Rate based IPS for DDoS." Thesis, Edinburgh Napier University, 2010. http://researchrepository.napier.ac.uk/Output/4007.

Full text
Abstract:
Nowadays every organisation is connected to the Internet and more and more of the world population have access to the Internet. The development of Internet permits to simplify the communication between the people. Now it is easy to have a conversation with people from everywhere in the world. This popularity of Internet brings also new threats like viruses, worm, Trojan, or denial of services. Because of this, companies start to develop new security systems, which help in the protection of networks. The most common security tools used by companies or even by personal users at home are firewall
APA, Harvard, Vancouver, ISO, and other styles
7

Sikora, Marek. "Detekce slow-rate DDoS útoků." Master's thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2017. http://www.nusl.cz/ntk/nusl-317019.

Full text
Abstract:
This diploma thesis is focused on the detection and protection against Slow DoS and DDoS attacks using computer network traffic analysis. The reader is introduced to the basic issues of this specific category of sophisticated attacks, and the characteristics of several specific attacks are clarified. There is also a set of methods for detecting and protecting against these attacks. The proposed methods are used to implement custom intrusion prevention system that is deployed on the border filtering server of computer network in order to protect Web servers against attacks from the Internet. Th
APA, Harvard, Vancouver, ISO, and other styles
8

Kommareddy, Christopher. "Detecting DDoS attacks in stub domains." College Park, Md. : University of Maryland, 2006. http://hdl.handle.net/1903/3324.

Full text
Abstract:
Thesis (Ph. D.) -- University of Maryland, College Park, 2006.<br>Thesis research directed by: Electrical Engineering. Title from t.p. of PDF. Includes bibliographical references. Published by UMI Dissertation Services, Ann Arbor, Mich. Also available in paper.
APA, Harvard, Vancouver, ISO, and other styles
9

Nilsson, Sebastian. "The Current State of DDoS Defense." Thesis, Blekinge Tekniska Högskola, Institutionen för programvaruteknik, 2014. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-3933.

Full text
Abstract:
A DDoS attack is an attempt to bring down a machine connected to the Internet. This is done by having multiple computers repeatedly sending requests to tie up a server making it unable to answer legitimate requests. DDoS attacks are currently one of the biggest security threats on the internet according to security experts. We used a qualitative interview with experts in IT security to gather data to our research. We found that most companies are lacking both in knowledge and in their protection against DDoS attacks. The best way to minimize this threat would be to build a system with redundan
APA, Harvard, Vancouver, ISO, and other styles
10

Hansen, Richard E. M. Eng Massachusetts Institute of Technology. "Stateful anycast for distributed DDoS mitigation." Thesis, Massachusetts Institute of Technology, 2007. http://hdl.handle.net/1721.1/41539.

Full text
Abstract:
Thesis (M. Eng.)--Massachusetts Institute of Technology, Dept. of Electrical Engineering and Computer Science, 2007.<br>This electronic version was submitted by the student author. The certified thesis is available in the Institute Archives and Special Collections.<br>Includes bibliographical references (p. 97-103).<br>Distributed denial-of-service (DDoS) attacks can easily cripple victim hosts or networks, yet effective defenses remain elusive. Normal anycast can be used to force the diffusion of attack traffic over a group of several hosts to increase the difficulty of saturating resources
APA, Harvard, Vancouver, ISO, and other styles
11

Goldschmidt, Patrik. "Potlačení DoS útoků s využitím strojového učení." Master's thesis, Vysoké učení technické v Brně. Fakulta informačních technologií, 2021. http://www.nusl.cz/ntk/nusl-449294.

Full text
Abstract:
Útoky typu odoprenia služby (DDoS) sú v dnešných počítačových sieťach stále frekventovanejším bezpečnostným incidentom. Táto práca sa zameriava na detekciu týchto útokov a poskytnutie relevantných informácii za účelom ich mitigácie v reálnom čase. Spomínaná funkcionalita je dosiahnutá s využitím techník prúdového dolovania z dát a strojového učenia. Výsledkom práce je sada nástrojov zastrešujúca celý proces strojového učenia - od vlastnej extrakcie príznakov cez predspracovanie dát až po export natrénovaného modelu pripraveného na nasadenie v produkcii. Experimentálne výsledky vyhodnotené na v
APA, Harvard, Vancouver, ISO, and other styles
12

Brignoli, Delio. "DDoS detection based on traffic self-similarity." Thesis, University of Canterbury. Computer Science and Software Engineering, 2008. http://hdl.handle.net/10092/2105.

Full text
Abstract:
Distributed denial of service attacks (or DDoS) are a common occurrence on the internet and are becoming more intense as the bot-nets, used to launch them, grow bigger. Preventing or stopping DDoS is not possible without radically changing the internet infrastructure; various DDoS mitigation techniques have been devised with different degrees of success. All mitigation techniques share the need for a DDoS detection mechanism. DDoS detection based on traffic self-similarity estimation is a relatively new approach which is built on the notion that undis- turbed network traffic displays fractal lik
APA, Harvard, Vancouver, ISO, and other styles
13

Ellis, David Mark. "Overlay networks for the defence of DDOS." Thesis, University of Sussex, 2007. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.441027.

Full text
APA, Harvard, Vancouver, ISO, and other styles
14

Fabre, Pierre-Edouard. "Using network resources to mitigate volumetric DDoS." Thesis, Evry, Institut national des télécommunications, 2018. http://www.theses.fr/2018TELE0020/document.

Full text
Abstract:
Les attaques massives par déni de service représentent une menace pour les services Internet. Ils impactent aussi les fournisseurs de service réseau et menace même la stabilité de l’Internet. Il y a donc un besoin pressant de contrôler les dommages causés par ces attaques. De nombreuses recherches ont été menées, mais aucune n’a été capable de combiner le besoin d’atténuation de l’attaque, avec l’obligation de continuité de service et les contraintes réseau. Les contre mesures proposées portent sur l’authentification des clients légitimes, le filtrage du trafic malicieux, une utilisation effic
APA, Harvard, Vancouver, ISO, and other styles
15

Fabre, Pierre-Edouard. "Using network resources to mitigate volumetric DDoS." Electronic Thesis or Diss., Evry, Institut national des télécommunications, 2018. http://www.theses.fr/2018TELE0020.

Full text
Abstract:
Les attaques massives par déni de service représentent une menace pour les services Internet. Ils impactent aussi les fournisseurs de service réseau et menace même la stabilité de l’Internet. Il y a donc un besoin pressant de contrôler les dommages causés par ces attaques. De nombreuses recherches ont été menées, mais aucune n’a été capable de combiner le besoin d’atténuation de l’attaque, avec l’obligation de continuité de service et les contraintes réseau. Les contre mesures proposées portent sur l’authentification des clients légitimes, le filtrage du trafic malicieux, une utilisation effic
APA, Harvard, Vancouver, ISO, and other styles
16

Ramanauskaitė, Simona. "Modelling and Research of Distributed Denial of Service Attacks." Doctoral thesis, Lithuanian Academic Libraries Network (LABT), 2012. http://vddb.laba.lt/obj/LT-eLABa-0001:E.02~2012~D_20120723_105031-70003.

Full text
Abstract:
In the dissertation the Denial of Service (DoS) attacks and their models are investigated. DoS attack is a type of cyber attacks when an attacker tries to deny a service in the network machine. There are many types of DoS attacks, and therefore the main object of the dissertation is specified as distributed denial of service (DDoS) attacks. DDoS uses multiple agents at the same time to exhaust certain resources of network machine and make it unavailable. The importance of DDoS attacks can be explained on the basis of the following facts: nowadays there are no countermeasures which can ensure f
APA, Harvard, Vancouver, ISO, and other styles
17

Ramanauskaitė, Simona. "Srautinių atakų įtakos internetinės paslaugos sutrikdymui modeliavimas ir tyrimas." Doctoral thesis, Lithuanian Academic Libraries Network (LABT), 2012. http://vddb.laba.lt/obj/LT-eLABa-0001:E.02~2012~D_20120723_105039-28214.

Full text
Abstract:
Disertacijoje nagrinėjamos internetinės paslaugos sutrikdymo (angl. DoS – Denial of Service) atakos ir jų modeliavimo priemonės. Tai kibernetinių atakų tipas, kurių metu siekiama tam tikro tinkle veikiančio mazgo teikiamas paslaugas padaryti neprieinamas jų teisėtiems klientams. DoS atakos gali turėti daug skirtingų tipų, todėl šio darbo pagrindinis tyrimų objektas yra srautinė internetinės paslaugos sutrikdymo (angl. DDoS – Distributed Denial of Service) ataka, kuri paslaugos sutrikdymo siekia naudodama bent kelis atakuojančiuosius kompiuterius vienu metu ir kuri siekia išnaudoti visus pasiri
APA, Harvard, Vancouver, ISO, and other styles
18

Margotta, Fabrizio. "DoS and DDoS attacks in Named Data Networking." Bachelor's thesis, Alma Mater Studiorum - Università di Bologna, 2020. http://amslaurea.unibo.it/21855/.

Full text
Abstract:
La nascita di Internet ha portato benefici senza precedenti in termini sociali ed economici. Le tecnologie e i protocolli inizialmente adottati andavano a risolvere i problemi causati dall’inaffidabilità della preesistente linea telefonica e nel corso dei vari decenni hanno garantito il funzionamento delle comunicazioni globali. Tuttavia ci si pone delle domande sulla necessità di un nuovo cambio di paradigma che risponda alle nuove esigenze riscontrate nell’evoluzione di Internet stesso e dei servizi offerti. Named Data Networking, come progetto della famiglia delle Future Internet Architec
APA, Harvard, Vancouver, ISO, and other styles
19

Genestig, Peter, and Joel Gustafsson. "Analys av DDoS-attacker för identifiering och prevention." Thesis, Högskolan i Halmstad, Sektionen för Informationsvetenskap, Data– och Elektroteknik (IDE), 2014. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-26507.

Full text
Abstract:
Beroendet av internet har ökat markant över de senaste tjugo åren, detta har medförtatt tjänster som tidigare tillhandahölls lokalt i fysisk form har sakta fasats ut. Samhälletsförtroende för internet och dess struktur medför vissa svagheter, som öppnar upp förattacker vilka kan överbelasta plattformar och göra företagets tjänster otillgängliga.Syftet med arbetet är att identifiera DDoS-attacker från pcap-filer och undersöka hurDRDoS-attacker skalar. Arbetet tar även upp frågeställningar om likheter och skillnadermellan attackerna som används samt huruvida de skiljer sig från legitim trafik oc
APA, Harvard, Vancouver, ISO, and other styles
20

Sohail, Imran, and Sikandar Hayat. "Cooperative Defense Against DDoS Attack using GOSSIP Protocol." Thesis, Blekinge Tekniska Högskola, Avdelningen för telekommunikationssystem, 2009. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-1224.

Full text
Abstract:
The ability to detect and prevent a network from DDoS attack and to ensure the high quality infrastructure is a back bone of today’s network security issues. In this thesis, we have successfully validated an algorithm using OmNet++ Ver. 4.0 simulation to show how a DDoS attack can be detected and how the nodes can be protected from such an attack using GOSSIP protocol.
APA, Harvard, Vancouver, ISO, and other styles
21

Osanaiye, Opeyemi Ayokunle. "DDoS defence for service availability in cloud computing." Doctoral thesis, University of Cape Town, 2016. http://hdl.handle.net/11427/23391.

Full text
Abstract:
Cloud computing presents a convenient way of accessing services, resources and applications over the Internet by shifting the focus of industries and organizations from the deployment and day-to-day running of their IT facilities, to provide an on-demand, self-service, and pay-as-you-go business model. Despite its increased popularity, ensuring security and availability of data, resources and services remains an ongoing research challenge. Distributed Denial of Service (DDoS) attacks are not a new threat but they remain a major security challenge in achieving a secure and guaranteed service an
APA, Harvard, Vancouver, ISO, and other styles
22

Faizan, Shah Ali. "SDN based security using cognitive algorithm against DDOS." Master's thesis, University of Cape Town, 2018. http://hdl.handle.net/11427/29880.

Full text
Abstract:
The internet and communication industry continue to develop new technologies rapidly, which has caused a boom in smart and networking device manufacturing. With new trends, operators are constantly battling towards deploying multiple systems to cater for the need of all users. The higher bandwidth utilization and flexibility demanded new networking solutions which paved way for Software Defined Network (SDN). SDN is centralized platform which works with other technologies such as Network Function Virtualization (NFV) to offer reliable, flexible and centrally controllable network solutions. It
APA, Harvard, Vancouver, ISO, and other styles
23

Jensen, David. "Ddos Defense Against Botnets in the Mobile Cloud." Thesis, University of North Texas, 2014. https://digital.library.unt.edu/ark:/67531/metadc500027/.

Full text
Abstract:
Mobile phone advancements and ubiquitous internet connectivity are resulting in ever expanding possibilities in the application of smart phones. Users of mobile phones are now capable of hosting server applications from their personal devices. Whether providing services individually or in an ad hoc network setting the devices are currently not configured for defending against distributed denial of service (DDoS) attacks. These attacks, often launched from a botnet, have existed in the space of personal computing for decades but recently have begun showing up on mobile devices. Research is done
APA, Harvard, Vancouver, ISO, and other styles
24

You, Yonghua. "A defense framework for flooding-based DDoS attacks." Thesis, Kingston, Ont. : [s.n.], 2007. http://hdl.handle.net/1974/653.

Full text
APA, Harvard, Vancouver, ISO, and other styles
25

Hodes, Vojtěch. "Obrana před volumetrickými DDoS útoky v prostředí SDN." Master's thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2017. http://www.nusl.cz/ntk/nusl-316878.

Full text
Abstract:
The aim of this Master's thesis is to explore different attitudes and to design various monitoring and detection concepts of volumetric DDoS attacks in core networks. The thesis deals with data flow control protocols with an emphasis on a modern technology of Software Defined Networks. The last part of the thesis describes verification of the theory by setting up a laboratory environment for volumetric DDoS UDP Flood simulation, detection and automated mitigation.
APA, Harvard, Vancouver, ISO, and other styles
26

Gerlich, Tomáš. "Detekce útoků cílených na odepření služeb." Master's thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2017. http://www.nusl.cz/ntk/nusl-317010.

Full text
Abstract:
Master's thesis is focused on intrusion detection for denied of service attacks. These distributed DoS attacks are threat for all users on the Internet, so there is deployment of intrusion detection and intrusion prevention systems against these attacks. The theoretical part describes the DoS attacks and its variants used most frequently. It also mentioned variants for detecting DoS attacks. There is also described, which tools are used to detect DDoS attacks most frequently. The practical part deals with the deployment of software tools for detecting DDoS attacks, and create traffic to test d
APA, Harvard, Vancouver, ISO, and other styles
27

Namuduri, Sarita. "Distributed Denial of Service Attacks (DDoS)- Consequences and Future." Thesis, Linköping University, Department of Electrical Engineering, 2006. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-8055.

Full text
Abstract:
<p>Denial of Service and the Distributed Denial of Service Attacks have recently emerged as one of the most newsworthy, if not the greatest, weaknesses of the Internet. This paper attempt to explain how they work, why they are hard to combat today, and what will need to happen if they are to be brought under control. It is divided into eight sections. The first is an overview of the current situation and also brief explanatory of the rest of the chapters being covered. The second is a detailed description of exactly how this attack works, and why it is hard to cope with today; of necessity it
APA, Harvard, Vancouver, ISO, and other styles
28

Osei, Solomon. "Multi-agent-based DDoS detection on big data systems." Thesis, Loughborough University, 2018. https://dspace.lboro.ac.uk/2134/36312.

Full text
Abstract:
The Hadoop framework has become the most deployed platform for processing Big Data. Despite its advantages, Hadoop s infrastructure is still deployed within the secured network perimeter because the framework lacks adequate inherent security mechanisms against various security threats. However, this approach is not sufficient for providing adequate security layer against attacks such as Distributed Denial of Service. Furthermore, current work to secure Hadoop s infrastructure against DDoS attacks is unable to provide a distributed node-level detection mechanism. This thesis presents a software
APA, Harvard, Vancouver, ISO, and other styles
29

Saied, Alan. "Distributed Denial of Service (DDoS) attack detection and mitigation." Thesis, King's College London (University of London), 2015. http://kclpure.kcl.ac.uk/portal/en/theses/distributed-denial-of-service-ddos-attack-detection-and-mitigation(eaa45e51-f602-46da-a37a-75c3ae71d2db).html.

Full text
Abstract:
A Distributed Denial of Service (DDoS) attack is an organised distributed packet-storming technique that aims to overload network devices and the communication channels between them. Its major objective is to prevent legitimate users from accessing networks, servers, services, or other computer resources. In this thesis, we propose, implement and evaluate a DDoS Detector approach consisting of detection, defence and knowledge sharing components. The detection component is designed to detect known and unknown DDoS attacks using an Artificial Neural Network (ANN) while the defence component prev
APA, Harvard, Vancouver, ISO, and other styles
30

Fabri, Luca. "Rilevamento e mitigazione di attacchi DDoS in reti SDN." Bachelor's thesis, Alma Mater Studiorum - Università di Bologna, 2021. http://amslaurea.unibo.it/24691/.

Full text
Abstract:
La tesi espone le problematiche relative alle vulnerabilità nell’architettura delle SDN e descrive le soluzioni presenti in letteratura per il rilevamento degli attacchi DDoS. Successivamente, viene proposta un’implementazione di una di queste soluzioni, in particolare la soluzione di rilevamento che utilizza le Support Vector Machines (SVM), creando uno scenario di una SDN attraverso il quale è possibile applicare la mitigazione dell'attacco una volta che il traffico viene classificato come malevolo.
APA, Harvard, Vancouver, ISO, and other styles
31

Коваленко, О. В. "Дослідження методів захисту телекомунікаційних мереж від розподілених DDoS атак". Thesis, КНТУ, 2014. http://dspace.kntu.kr.ua/jspui/handle/123456789/2968.

Full text
APA, Harvard, Vancouver, ISO, and other styles
32

Кульчицький, Б. В., та Л. М. Куперштейн. "До проблеми формування набору даних для дослідження DDoS-атак". Thesis, ВНТУ, 2019. http://ir.lib.vntu.edu.ua//handle/123456789/24232.

Full text
Abstract:
В роботі розглянуто підходи щодо перевірки запропонованих методів виявлення атак. Проаналізовано наявні набори даних, які використовуються для створення систем виявлення DDoS-атак. Також, проаналізовано декілька інструментів, що використовуються для реалізації чи моделювання DDoS-атак для збору даних.<br>The paper considers approaches to checking the proposed method of detecting attacks. The existing datasets that scientists use to create DDoS-attack detection systems are analyzed. Also, there are several tools used to implement or simulate DDoS-attacks for data collection
APA, Harvard, Vancouver, ISO, and other styles
33

Abbasi, Saeed. "Investigation of open resolvers in DNS reflection DDoS attacks." Master's thesis, Université Laval, 2014. http://hdl.handle.net/20.500.11794/25802.

Full text
Abstract:
Les serveurs du système de noms de domaine (DNS) représentent des éléments clés des réseaux Internet. Récemment, les attaquants ont profité de ce service pour lancer des attaques massives de déni de service distribué (DDoS) contre de nombreuses organisations [1, 2, 3]. Ceci est rendu possible grâce aux différentes vulnérabilités liées à la conception, implantation ou une mauvaise configuration du protocole DNS. Les attaques DDoS amplifiées par DNS sont des menaces dangereuses pour les utilisateurs d’Internet. L’objectif de cette étude est d’acquérir une meilleure compréhension des attaques DDo
APA, Harvard, Vancouver, ISO, and other styles
34

Eklund, Martin, and Patrik Ståhlberg. "Distributed denial of service attacks : Protection, Mitigation, and Economic Consequences." Thesis, KTH, Radio Systems Laboratory (RS Lab), 2015. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-170924.

Full text
Abstract:
Distributed Denial of Service attacks is a problem that constantly threatens companies that rely on the internet for major parts of their business. A successful DDoS attack that manages to penetrate a company’s network can lead to devastating damages in the form of lost income, reduced productivity, increase in costs, and damage to the company’s image and reputation. The different DDoS attacks are many and of different character and often Offer different parts of the network, which makes it very difficult to defend against. It is also very clear that DDoS attacks are increasing in both numbers
APA, Harvard, Vancouver, ISO, and other styles
35

Matej, Michal. "Výkonnostní a bezpečnostní testy síťových aplikací." Master's thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2013. http://www.nusl.cz/ntk/nusl-220203.

Full text
Abstract:
The aim of this Master's thesis is to design and to implement the security test in considering a resistance of the device under test to the effects of the distributed denial of service attack DDoS SYN Flood. After processing the test results is developed a protocol about security test of the device under test. In this thesis are tested two devices, namely CISCO ASA5510 firewall and a server with the specified name Server. The theoretical part of the thesis discusses the primary types of network attacks such as reconnaissance, gain access and denial of service attacks. Explained the concept of
APA, Harvard, Vancouver, ISO, and other styles
36

DiMarco, Peter Lewis. "Evaluation of Moving Target IPv6 Defense and Distributed Denial of Service Defenses." Thesis, Virginia Tech, 2013. http://hdl.handle.net/10919/24697.

Full text
Abstract:
A Denial-of-Service (DoS) attack is a network attack from a single machine that attempts to prevent the victim, the targeted machine, from communicating to other devices on the network or perform its normal tasks. The extension of these attacks to include many malicious machines became known as Distributed Denial-of-Service (DDoS) attacks. DDoS attacks cause an immense amount of strain on both the victim and the devices used to reach the victim. In reaction to these attacks, preexisting technologies were used as DDoS defenses to mitigate the effects. The two most notable defenses used are the
APA, Harvard, Vancouver, ISO, and other styles
37

Eriksson, Tomas, and Hans Joelsson. "DDoS : -Vad är det och går det att skydda sig?" Thesis, Växjö University, School of Mathematics and Systems Engineering, 2006. http://urn.kb.se/resolve?urn=urn:nbn:se:vxu:diva-886.

Full text
Abstract:
<p>This paper will expose the serious phenonomen Distributed Denial of Service (DDoS). Businesses without a good security policy are easy targets for attackers. We will cover why its hard to protect yourself, present previous attacks and ways for individuals and businesses to secure themselves. We have based our paper on previous cases and done intervjues with companies who specialize in dealing with these kind of threats. Then come up with guidelines wich will be helpful for businesses when they want to strengthen there security against Distributed Denial of Service-attacks.</p><br><p>Detta a
APA, Harvard, Vancouver, ISO, and other styles
38

Almeida, Thiago Rodrigues Meira de. "A collaborative architecture agianst DDOS attacks for cloud computing systems." Universidade de São Paulo, 2018. http://www.teses.usp.br/teses/disponiveis/3/3141/tde-25032019-114624/.

Full text
Abstract:
Distributed attacks, such as Distributed Denial of Service (DDoS) ones, require not only the deployment of standalone security mechanisms responsible for monitoring a limited portion of the network, but also distributed mechanisms which are able to jointly detect and mitigate the attack before the complete exhaustion of network resources. This need led to the proposal of several collaborative security mechanisms, covering different phases of the attack mitigation: from its detection to the relief of the system after the attack subsides. It is expected that such mechanisms enable the collaborat
APA, Harvard, Vancouver, ISO, and other styles
39

Marušiak, Martin. "Analýza zpětně rozptýleného DDoS provozu v datech o síťových tocích." Master's thesis, Vysoké učení technické v Brně. Fakulta informačních technologií, 2021. http://www.nusl.cz/ntk/nusl-445542.

Full text
Abstract:
This work focuses on detection of denial of service (DoS) attacks which utilize random spoofing of source IP address in attack packets. These types of attacks lead to generation of side effect in a form of backscatter that can be used to identify victims of such attacks. Backscatter analysis has so far been limited to unused address space ranges referred to as network telescopes. This work therefore proposes a new method of DoS attack detection via backscatter outside of network telescope environment where legitimate user traffic is also present. Furthermore proposed approach uses only abstrac
APA, Harvard, Vancouver, ISO, and other styles
40

Mekhitarian, Araxi, and Amir Rabiee. "A simulation study of an application layer DDoS detection mechanism." Thesis, KTH, Skolan för informations- och kommunikationsteknik (ICT), 2016. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-191145.

Full text
Abstract:
Over the last couple of years the rise of application layer Distributed Denial of Service (DDoS) attacks has significantly increased. Because of this, many issues have been raised on how organizations and companies can protect themselves from intrusions and damages against their systems and services. The consequences from these attacks are many, ranging from revenue losses for companies to stolen personal data. As the technologies are evolving, application layer DDoS attacks are becoming more effective and there is not a concrete solution that entirely protects against them. This thesis focuse
APA, Harvard, Vancouver, ISO, and other styles
41

Landfors, Kristoffer. "DETECTION AND RESOLUTION OF VSI-DDOS ATTACKS FOR CONTAINERIZED CLOUDS." Thesis, Umeå universitet, Institutionen för datavetenskap, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:umu:diva-165181.

Full text
Abstract:
Very Short Intermi‹ent Distributed Denial of Service (VSI-DDoS) a‹ttack is a new form of DDoS a‹ttacks with potential to bypass many of the security measures used today and still severely damage the quality of service of web applications in cloud systems. Th‘e att‹acks consists of short bursts of legitimate packets which exploits vulnerabilities in the targeted system. With the growing popularity of using containers instead of Virtual Machines in clouds, this project presents an approach for detecting these a‹ttacks in a container based cloud system. Th‘e approach uses signal processing in the
APA, Harvard, Vancouver, ISO, and other styles
42

Göran, Gustafsson, and Lundberg Sebastian. "Överbelastningsattacker genom öppna reläer." Thesis, Linnéuniversitetet, Institutionen för datavetenskap (DV), 2014. http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-34909.

Full text
Abstract:
Detta arbete behandlar en specifik typ av överbelastningsattack som blir allt mer populär. Dessa attacker utförs genom öppna reläer med syftet att få ut en avsevärt mycket högre effekt än den som annars är uppnåbar. Granskning av attacker utförda genom tjänsterna DNS och NTP har utförts med syftet att ge en klar bild av hur allvarligt hotet är och även klargöra hur en systemadministratör kan säkra tjänsterna för att skydda både sina egna och andras resurser. Resultaten av undersökningar visar att en attack utförd genom en DNS-tjänst ger under optimala förhållanden en amplifikationsfaktor av "1
APA, Harvard, Vancouver, ISO, and other styles
43

Ferrari, Ricardo Cesar Câmara. "Rede definida por software para a detecção de anomalias e contramedidas de segurança em smart grid." Universidade Estadual Paulista (UNESP), 2018. http://hdl.handle.net/11449/153402.

Full text
Abstract:
Submitted by RICARDO CESAR CAMARA FERRARI null (rccferrari@hotmail.com) on 2018-04-05T15:50:10Z No. of bitstreams: 1 TESEV59.pdf: 2999220 bytes, checksum: d4796fb104f36a34069600090d6741e9 (MD5)<br>Approved for entry into archive by Cristina Alexandra de Godoy null (cristina@adm.feis.unesp.br) on 2018-04-05T18:37:17Z (GMT) No. of bitstreams: 1 ferrari_rcc_dr_ilha.pdf: 2999220 bytes, checksum: d4796fb104f36a34069600090d6741e9 (MD5)<br>Made available in DSpace on 2018-04-05T18:37:17Z (GMT). No. of bitstreams: 1 ferrari_rcc_dr_ilha.pdf: 2999220 bytes, checksum: d4796fb104f36a34069600090d6741e9
APA, Harvard, Vancouver, ISO, and other styles
44

Thorstensson, Jonatan. "Genomgång av skyddsmetoder för TCP SYN flooding." Thesis, University of Skövde, School of Humanities and Informatics, 2010. http://urn.kb.se/resolve?urn=urn:nbn:se:his:diva-4103.

Full text
Abstract:
<p>Följande arbete behandlar möjliga lösningar för hantering av SYN flooding, en Denial-of-Service-attack mot tjänster som använder TCP för kommunikation över datanätverk. Ett flertal olika skyddsmetoder, med varierande ansatser, identifieras, beskrivs och undersöks. Även möjligheter att kombinera dessa analyseras. Det visas att genom att implementera existerande skydd, samt kombinera flera av dessa begränsas hotet från SYN flooding avsevärt. Rekommendationer presenteras dessutom för hur organisationer bör gå tillväga för att säkra tjänster som riskerar att utsättas för SYN flooding-attacker g
APA, Harvard, Vancouver, ISO, and other styles
45

Sadafal, Videsh. "Measurement and analysis of BitTorrent." Texas A&M University, 2008. http://hdl.handle.net/1969.1/86010.

Full text
Abstract:
BitTorrent is assumed and predicted to be the world's largest Peer to Peer (P2P) network. Previous studies of the protocol mainly focus on its file sharing algorithm, and many relevant aspects of the protocol remain untouched. In the thesis, we conduct a number of experiments to explore those untouched aspects. We implement a BitTorrent crawler to collect data from trackers and peers, and statistically analyze it to understand the characteristics and behaviors of the BitTorrent protocol better. We find that the expected lifetime of a peer in the BitTorrent is 56.6 minutes and the activity is d
APA, Harvard, Vancouver, ISO, and other styles
46

Aputis, Artūras. "DDoS (distributed denial of service) atakų atrėmimo algoritmų tyrimas ir modeliavimas." Master's thesis, Lithuanian Academic Libraries Network (LABT), 2013. http://vddb.library.lt/obj/LT-eLABa-0001:E.02~2012~D_20131105_095501-14832.

Full text
Abstract:
Šiuo metu yra sukurta nemažai priemonių aptikti įvairiausias DDoS atakas, tačiau siekiant sustabdyti arba bent sušvelninti DDoS atakų poveikį yra nuveikta labai nedaug. Yra labai sunku pasirinkti tinkamą DDoS atakos atrėmimo metodą. DDoS atakų atrėmimo metodų analizė galėtų padėti pasirinkti tinkamiausią metodą. „BGP DDoS Diversion“ atakų atrėmimo metodas yra vienas efektyviausių ir mažiausiai kaštų reikalaujantis metodas. Šis metodas įgyvendinamas panaudojant BGP protokolą. Ataka yra atremiama kuomet BGP protokolo pagalba yra paskelbiama tik dalis tinklo. DDoS atakos duomenų srautas tokiu atv
APA, Harvard, Vancouver, ISO, and other styles
47

Pettersson, Erik. "Comparison of System Performance During DDoS Attacks in Modern Operating Systems." Thesis, Högskolan i Skövde, Institutionen för informationsteknologi, 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:his:diva-13748.

Full text
Abstract:
Distributed Denial of Service attacks are an ever prevalent challenge for system administra-tors today to overcome. The attack, which is all about restricting legitimate users access to a service, such as a web-page. Can cost companies and governments millions of dollars if not properly managed. This study aims to explore if there is any difference in performance between some of the most modern iterations of popular server operating systems today. Those server operating systems are: Windows Server 2016, Ubuntu 16 and FreeBSD 11. And submitting them to one of the most popular DDoS attacks at th
APA, Harvard, Vancouver, ISO, and other styles
48

Yu, Xuan Hamilton John A. "A defense system on DDOS attacks in mobile ad hoc networks." Auburn, Ala., 2007. http://repo.lib.auburn.edu/2006%20Fall/Dissertations/YU_XUAN_49.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
49

Wang, Kai-Ping, and 王凱平. "Active Defense against DDoS Attacks." Thesis, 2004. http://ndltd.ncl.edu.tw/handle/21609155914397402290.

Full text
Abstract:
碩士<br>國立中央大學<br>資訊工程研究所<br>92<br>The events of DDoS attacks grow rapidly in recent years, and these attacks all contain some common features: if the user did not repair these securities loophole as soon as possible, those attackers will make use of the safe loophole of some systems to carry on attacks and invade the system of the user becoming the zombie of the attacker. It will cause the network to paralyze and can't provide service. If network can confirm the physical condition of each node and starts cleaning mechanisms when DDoS attacks start spreading, it will isolate and shrink attacker'
APA, Harvard, Vancouver, ISO, and other styles
50

Kao, Cheng, and 高成. "TCP-based DDoS Detection Scheme." Thesis, 2012. http://ndltd.ncl.edu.tw/handle/11409773610303466128.

Full text
Abstract:
碩士<br>樹德科技大學<br>資訊管理系碩士班<br>100<br>With the rapid development of Internet, Internet technology had increasingly reshaped people&apos;&apos;s lives. Especially in the growing e-commerce, the prominent issue is network security. In this paper, we first analyze the states during DoS or DDoS attacks and realize the inherent defects of TCP protocol. Therefore, we propose a DDoS detection scheme based on TCP to perceive and react to the occurrence of DDoS attacks. In addition, we build up an DDoS environment in our lab to test our model. In our detection model, we assume the ratio between the number
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!