SUST Repository

An Efficient Framework to Prevent Distributed Denial of Service Attack

Show simple item record

dc.contributor.author Bashir, Shiren Yousif Ahmed
dc.contributor.author Supervisor, - Faisal Mohammed Abdullah Ali
dc.date.accessioned 2019-11-19T09:51:14Z
dc.date.available 2019-11-19T09:51:14Z
dc.date.issued 2019-01-01
dc.identifier.citation Bashir, Shiren Yousif Ahmed.An Efficient Framework to Prevent Distributed Denial of Service Attack\Shiren Yousif Ahmed Bashir;Faisal Mohammed Abdullah Ali.-Khartoum:Sudan University of Science & Technology,College of Computer Science and Information Technology,2019.-91p.:ill.;28cm.-M.Sc. en_US
dc.identifier.uri http://repository.sustech.edu/handle/123456789/23832
dc.description Thesis en_US
dc.description.abstract Internet and web services have become an inseparable part of our lives. Hence, ensuring continuous availability of service has become imperative to the success of any organization. But these services are often hampered by constant threats from myriad types of attacks. One such attack is called Distributed Denial of Service (DDoS) attack that results in issues ranging from temporary slowdown of servers to complete non-availability of service. The complexity of DDoS attack makes their detection and mitigation difficult. In this research, an effective protection framework based on FNM open-source tool and iptables was proposed, FNM is use to detect DDoS-based flood attack (SYN, UDP, and ICMP) by adjusting the abnormal rate of packet data sent (threshold), FNM discovered the attack and notified the administrator of the system via e-mail and produced a report containing detailed information about the attack, it was noted that there are data packets issued by the server responding to the attack in the variable outgoing pps, which means consumption of server resources resulting in the denial of service, after that was used packet filtering in Linux kernel by used iptables script to filter attack traffic and drop, then was tested re-attack and compared to the variable value of outgoing pps, which became zero which means there is no data packets issued by the server, the experimental result shows that when using the tools FNM and iptables it has more security and enhances safety in detecting and minimizing attack-blocking service. en_US
dc.description.sponsorship Sudan University of Science and Technology en_US
dc.language.iso en en_US
dc.publisher Sudan University of Science & Technology en_US
dc.subject Prevent Distributed Denial en_US
dc.subject Service Attack en_US
dc.title An Efficient Framework to Prevent Distributed Denial of Service Attack en_US
dc.title.alternative إطار فعّال للحماية من هجوم منع الخدمة الموزع en_US
dc.type Thesis en_US


Files in this item

This item appears in the following Collection(s)

Show simple item record

Share

Search SUST


Browse

My Account