Date of Award
12-2019
Culminating Project Type
Starred Paper
Degree Name
Information Assurance: M.S.
Department
Information Assurance and Information Systems
College
Herberger School of Business
First Advisor
Mark Schmidt
Second Advisor
Dennis Guster
Third Advisor
Lynn Collen
Fourth Advisor
Tirthankar Ghosh
Creative Commons License
This work is licensed under a Creative Commons Attribution-Noncommercial-No Derivative Works 4.0 License.
Keywords and Subject Headings
DDOS, DOS, Detection, Machine Learning, Quantitative, OSI
Abstract
Distributed Denial of Service (DDOS) is one of the most prevalent attacks and can be executed in diverse ways using various tools and codes. This makes it very difficult for the security researchers and engineers to come up with a rigorous and efficient security methodology. Even with thorough research, analysis, real time implementation, and application of the best mechanisms in test environments, there are various ways to exploit the smallest vulnerability within the system that gets overlooked while designing the defense mechanism. This paper presents a comprehensive survey of various methodologies implemented by researchers and engineers to detect DDOS attacks at network, transport, and application layers using comparative analysis. DDOS attacks are most prevalent on network, transport, and application layers justifying the need to focus on these three layers in the OSI model.
Recommended Citation
Khambatta, Mustafa, "Comparative Analysis Based on Survey of DDOS Attacks’ Detection Techniques at Transport, Network, and Application Layers" (2019). Culminating Projects in Information Assurance. 91.
https://repository.stcloudstate.edu/msia_etds/91
Comments/Acknowledgements
This research was initially supported by first advisor Dr. Tirthankar Ghosh. It was a pleasure working with him, who helped me understand, encouraged me to explore this topic further. He is no longer working at St. Cloud State University as he found a new opportunity in a different university. I would like to further thank Dr. Mark Schmidt who was my second advisor that has helped me be part of the Las Vegas security conference and SCSU Research Colloquium in 2017, that immensely helped me in getting more interested in this research and security in general.
I would also like to thank Dr. Dennis Guster and Dr. Lynn Collen of their continuous support in my endeavor of writing this starred research paper. It was with their help in critically analyzing every process of this paper that helped me improve overall in both my writing and delivering of information.
Lastly, I would like to thank my parents, siblings, and family, who have been a great support in my academic and professional journey.