Please use this identifier to cite or link to this item:
https://ptsldigital.ukm.my/jspui/handle/123456789/476445
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.advisor | Rosilah Hassan, Assoc. Prof. Dr. | |
dc.contributor.author | Ahmed Marwan Idrees Aleesa (P74167) | |
dc.date.accessioned | 2023-10-06T09:18:36Z | - |
dc.date.available | 2023-10-06T09:18:36Z | - |
dc.date.issued | 2016-06-01 | |
dc.identifier.other | ukmvital:86190 | |
dc.identifier.uri | https://ptsldigital.ukm.my/jspui/handle/123456789/476445 | - |
dc.description | Distributed Denial of Service (DDoS) attacks is rapidly becoming a popular attack vector used by hackers and hack activist. With the spread of botnets, there has been a massive increase of DDoS attacks on more and more organizationa. The Router Advertisement (RA) flooding attack is considered as a manjor threat to Internet Protocol version 6 (IPv^) networks due to the deliberate intent of attackers to make the vital resources powerless for legitimate users. Different attacks have been performed against IPv6 networks. RA flooding is one of these attacks that aim to exhaust all nodes resources for instance the CPU and memory that attached to routers on the same link. The majority of existing approaches for detecting DDoS flooding attacks are designed to detect IPv4 flooding attack for this the IPv6 DDos can easily bypass these approaches. Moreover, the existing approaches for detecting IPv6 DDos suffer from low accuracy detection and high false positive due to firstly based on signature of attack rather than the attack behaviour which lead to inability of detecting zero day's attacks. Secondly the behaviour based approaches are using a simple heuristic rules to detect IPv6 DDos attacks. The main aim of this research is to develop technique the capable of detecting DDos RA flooding attack against web application. The proposed technique based on Principal Component Analysis (PCA) and rule based mechanism. PCA is employed to select the most important features that can be contributed in detecting DDos RA flooding while the rule based mechanism is used to RA flooding attacks based on the selected feature by PCA. The proposed approach is evaluated using simulated result obtained from Graphical Network simulation 3 (GNS3). the evaluation result shows that the proposed approach has the ability to detect RA flooding attack against web application with a better accuracy compared to the existing technique.,Certification of Master's/Doctoral Thesis" is not available | |
dc.language.iso | eng | |
dc.publisher | UKM, Bangi | |
dc.relation | Faculty of Information Science and Technology / Fakulti Teknologi dan Sains Maklumat | |
dc.rights | UKM | |
dc.subject | Flooding attack | |
dc.subject | Web applications | |
dc.subject | Distributed Denial of Service | |
dc.subject | Router advertisement | |
dc.subject | Universiti Kebangsaan Malaysia -- Dissertations | |
dc.title | A rule-based technique to detect router advertisement flooding attack against web applications | |
dc.type | theses | |
dc.format.pages | 124 | |
dc.identifier.barcode | 002686(2017) | |
Appears in Collections: | Faculty of Information Science and Technology / Fakulti Teknologi dan Sains Maklumat |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
ukmvital_86190+SOURCE1+SOURCE1.0.PDF Restricted Access | 455.89 kB | Adobe PDF | View/Open |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.