Search or add a thesis

Advanced Search (Beta)
Home > Distributed Denial of Service Ddos Attack Detection and Prevention Mechanisms for Cloud- Assisted Wireless Body Area Networks Wban

Distributed Denial of Service Ddos Attack Detection and Prevention Mechanisms for Cloud- Assisted Wireless Body Area Networks Wban

Thesis Info

Access Option

External Link

Author

Latif, Rabia.

Program

PhD

Institute

National University of Sciences & Technology

City

Islamabad

Province

Islamabad

Country

Pakistan

Thesis Completing Year

2016

Thesis Completion Status

Completed

Subject

Technological Sciences

Language

English

Link

http://prr.hec.gov.pk/jspui/bitstream/123456789/9404/1/Rabia_Latif_Infrom_Security_NUST_HSR_2016_03.04.2017.pdf

Added

2021-02-17 19:49:13

Modified

2024-03-24 20:25:49

ARI ID

1676727739477

Asian Research Index Whatsapp Chanel
Asian Research Index Whatsapp Chanel

Join our Whatsapp Channel to get regular updates.

Similar


Distributed Denial of Service (DDoS) attack does not aims to disrupts or interfere with the real sensor data, rather they take advantage of disparity that exists between the network bandwidth and the limited resource availability of the victim. Detecting and preventing such attacks in cloud- assisted Wireless Body Area Networks (WBANs) is an important concern. Such attacks can be avoided by first detecting followed by prevention and mitigation. Attack detection is an initial step of any defense approach that needs to be taken prior to attack mitigation techniques. Similarly, attack prevention also plays an important role in protecting a network from malicious attacks. This research is mainly focused on the DDoS attack detection and prevention algorithms and propose a novel solution that not only consumes less resources but also produce efficient results. The limited resources of WBAN are not enough to mitigate the huge amount of traffic generated by DDoS attack. Therefore, there is a need for lightweight approaches and capable of handling real-time high speed sensor data for detection of such attacks in cloudassisted WBAN environment. The concern of detecting and preventing the DDoS attack in cloud- assisted WBAN remains unresolved, existing solutions proposed for such attacks in conventional networks are not directly applicable in cloud-assisted WBAN environment due to the resource scarceness of these networks. Moreover, multiple entry points into these networks leave them more vulnerable to such attacks which makes the attack detection and prevention process a challenging task. The aim of this research is to design a lightweight, in-network, distributed and scalable approach for detecting DDoS attack that is capable of handling high speed streaming data generated by WBAN sensors in cloud- assisted WBAN environment. The goal is to propose the attack detection technique with improved performance when compared with existing techniques in terms of: i) improved attack detection accuracy; ii) minimizing overall resource usage and iii) reducing overall computational cost. Analyzing and comparing the existing techniques for detecting attacks in both conventional and wireless sensor networks concludes that Very Fast Decision Tree (VFDT) has proved to be the most promising solution for identifying the malicious behavior of nodes in these networks through pattern discovery. Therefore, in this research , we have selected and explored VFDT technique that is lightweight and have further optimized it for handling high-speed streaming data originating from WBAN sensors. The performance evaluation is done through simulation experiments and real-time WBAN testbed deployment to test the effectiveness of proposed attack detection approach. In addition, the quantitative results obtained from the simulation experiments are benchmarked with corresponding results acquired from the existing techniques. The results comparison shows the advantages and significance of deploying stream mining approach in such networks, for detecting DDoS attacks in an efficient and timely manner. Another objective of this research is to propose an efficient traceback technique specifically for cloud- assisted WBAN environment that incur minimal overhead on the WBAN network. The goal is to propose a technique that is efficient in packet marking and path reconstruction procedures in order to traceback and identify the source of DDoS attack with less convergence time. Different traceback techniques have been analyzed and their comparison drawn to the conclusion that Probability Packet Marking (PPM) is most appropriate and widely used approach in both conventional and wireless sensor networks. The key issue of PPM lies in assigning the marking probability for path reconstruction. Therefore, we model the traceback of DDoS attack as a marking probability assignment problem and further optimized it for efficient traceback of DDoS attack in cloud- assisted WBAN environment. The evaluation is performed through simulation experiments to test the effectiveness of the proposed traceback technique. In addition, the quantitative results acquired from the simulations are benchmarked with equivalent results acquired from a fish bone traceback technique. The result comparisons prove the effectiveness of proposed traceback technique in WBAN networks, for identifying the source of DDoS attacks with less convergence time and minimum overhead.
Loading...
Loading...

Similar Books

Loading...

Similar Chapters

Loading...

Similar News

Loading...

Similar Articles

Loading...

Similar Article Headings

Loading...

بھٹو مرتا کیوں نہیں

بھٹو مرتا کیوں نہیں ؟

بے نظیر اپنی کتاب میں لکھتی ہیں کہ جب لاہور ہائی کورٹ نے انہیں سزائے موت سنائی تو وہ کوٹ لکھپت جیل گئیں بھٹو صاحب کو لوہے کی تاروں سے بنی چارپائی پر لٹا کر ان کے بازو اور پائوں کو زنجیروں سے باندھا ہو ا تھا ۔چارپائی پر چٹائی بھی نہیں تھی ۔مچھروں کے کاٹنے کی وجہ سے ان کے ہاتھ پائوں اور چہرہ سرخ ہو رہا تھا ۔بے نظیر بھٹو پر نظر پڑتے ہی کڑکدار ا آواز میں بولے "Hi pinci how are you"اور پھر کہنے لگے آپ کو اندر سے توڑنے کے لیے مجھے اس طرح باندھا گیا ہے لیکن آپ نے ٹوٹنا نہیںہے ۔

پھر جب سپریم کورٹ کے چاروں ججوں نے سزائے موت سنائی (تین ججوں نے انیں بری کیا کل سات جج تھے )تو انہیں جیل کی کال کوٹھری میں رکھا گیا ۔انہوں نے بھوک ہڑتال کی جو گیارہ روز جاری رہی اس عرصہ میں کال کوٹھری کی چھت پر لوگ بڑے بوٹ پہن کر ناچتے رہتے تھے تا کہ بھٹو سو نہ سکے اس کے باوجود بھٹو بیمار نہیں ہوئے اور بارہویں رات کو پھانسی چڑھ گئے ۔

جو دوست اب سوال پوچھتے ہیں کہ بھٹو مرتا کیوں نہیں ہے تو گزارش ہے کہ ایسے بہادر انسان کا جسم تو مر جا تا ہے لیکن نام رہتی دنیا تک زندہ رہتا ہے ۔جیے بھٹو ۔

 

NIGERIAN CIVIL WAR: THE BIAFRAN INVASION OF MIDWEST AND INTER-GROUP RELATIONS IN THE REGION

Peaceful coexistence is a major challenge in a multi-ethnic region like the Midwest. After the creation of the region in 1963, ethnic distrust dominated the region's body politics. The Biafran invasion of Midwest remained one invent that heightened ethnic distrust in the region. Although, scholars have examined the invasion, the need to re-examine it arises from the fact that the event made ethnic antagonism among the groups in the region more intense than ever before. It is against this backdrop that this paper examines the Biafran invasion of Midwest and its implications on inter-group relations in the region. Relying on primary and secondary sources, the paper is of the opinion that the intense group antagonism and suspicion emanated from the fact that the Biafran incursion into Midwest caused division among the groups in the region. The groups that were loyal to the Nigerian Government opposed the groups that supported Biafra. The paper further argues that the ethnic tension was also as a result of the assumption by the non-Igbo groups in the region that Biafrans were in the region to promote the interest of the Igbo groups.

Numerical Simulation of Fluid Flow and Heat Transfer Analysis Through Annular Sector Duct

Present work is aimed at designing, implementing and validating computational procedure for the fluid flow and heat transfer analysis through the annular sector duct. This work will provide the complete heat transfer analysis and will be useful in developing an understanding of controlling parameter characterizing the configuration of annular sector duct. Chapter 1 is devoted to introduction and literature review, whereas, in chapter 2, we have selected a literature problem and discretised that by using two well known techniques finite difference method, (FDM) and finite volume method, (FV M). By comparing the results obtained from both procedures with the literature, we have selected one procedure for further mathematical models of the dissertation. In the chapter 3, we have carried out the study of forced convective Newtonian fluid flow, by considering the two different cases. In the 1st case, we have studied the forced convective flow of Newtonian fluid under the influence of uniform transverse magnetic field, applied perpendicular to the direction of flow. In the 2nd case, we have studied the influence of uniform transverse magnetic field on electrically conducting Newtonian fluid flow through annulus sector duct, filled with Darcy Brinkman porous media. As most of the fluids in nature are non-Newtonian, therefore, to make our model more realistic, we have replaced the Newtonian fluid with the power law fluid. In the chapter 4, we have carried out the study of forced convective power law fluid flow, by considering the four different cases. In the 1st case, we have studied the impact of flow behaviour index, n, on the forced convective flow in both pseudo-plastic and dilatant fluids. In the 2nd case, we have carried out the influence of magnetic field on electrically conducting power law fluid. We have studied the impact of n in both fluids for different value of Ha. In both cases, successive over relaxation, (SOR), method is used to solve the system of algebraic equations, obtained by using the FV M. In the 3rd and 4th cases, we have studied the impact of porosity factor, K, on forced convective flow of power law fluid through an annular sector duct, filled with Darcy Brinkman porous media in the absence and presence of uniform transverse magnetic field. In both cases, we have used the strongly implicit procedure, (SIP), to solve the system of algebraic equation, and compared with SOR method on the based of convergence. To achieve further enhancement in the heat transfer rate, addition of nano scale particles to the base fluid is an established research methodology now a days. Therefore, in chapter 5, we have studied the impact the nano scale particles on the forced convective flow of power law fluid by considering two different cases. Two types of nano scale particle (i.e Copper, Cu and Titanium oxide, TiO2) are used. Finally to make the dissertation wholesome, in chapter 6, we have studied the combined effect of viscous dissipation and Joule heating on the forced convective flow of power law fluid in absence and presence of nano scale particles. At the end of dissertation, we give brief of the future work.