Security

Host-Based Intrusion Detection Against Distributed Denial of Service Attacks

Download Now Free registration required

Executive Summary

One of the greatest threats that network security faces nowadays is Distributed Denial of Service attacks. A newer version of the Denial of Service attack, also called Distributed Denial of Service attack or DDoS. In a Distributed Denial-of-Service (DDoS) attack, an attacker may use one computer to attack another computer. An attacker may attempt to: "Flood" a network and thus reduce a legitimate user's bandwidth, prevent access to a service, or disrupt service to a specific system or a user. In this paper describe methods and techniques used in denial of service attacks. In this paper, simulate a distributed denial of service attack using ns-2 network simulator.

  • Format: PDF
  • Size: 199.4 KB