Date of Award

12-2019

Culminating Project Type

Starred Paper

Degree Name

Information Assurance: M.S.

Department

Information Assurance and Information Systems

College

Herberger School of Business

First Advisor

Mark Schmidt

Second Advisor

Dennis Guster

Third Advisor

Lynn Collen

Fourth Advisor

Tirthankar Ghosh

Creative Commons License

Creative Commons License
This work is licensed under a Creative Commons Attribution-Noncommercial-No Derivative Works 4.0 License.

Keywords and Subject Headings

DDOS, DOS, Detection, Machine Learning, Quantitative, OSI

Abstract

Distributed Denial of Service (DDOS) is one of the most prevalent attacks and can be executed in diverse ways using various tools and codes. This makes it very difficult for the security researchers and engineers to come up with a rigorous and efficient security methodology. Even with thorough research, analysis, real time implementation, and application of the best mechanisms in test environments, there are various ways to exploit the smallest vulnerability within the system that gets overlooked while designing the defense mechanism. This paper presents a comprehensive survey of various methodologies implemented by researchers and engineers to detect DDOS attacks at network, transport, and application layers using comparative analysis. DDOS attacks are most prevalent on network, transport, and application layers justifying the need to focus on these three layers in the OSI model.

Comments/Acknowledgements

This research was initially supported by first advisor Dr. Tirthankar Ghosh. It was a pleasure working with him, who helped me understand, encouraged me to explore this topic further. He is no longer working at St. Cloud State University as he found a new opportunity in a different university. I would like to further thank Dr. Mark Schmidt who was my second advisor that has helped me be part of the Las Vegas security conference and SCSU Research Colloquium in 2017, that immensely helped me in getting more interested in this research and security in general.

I would also like to thank Dr. Dennis Guster and Dr. Lynn Collen of their continuous support in my endeavor of writing this starred research paper. It was with their help in critically analyzing every process of this paper that helped me improve overall in both my writing and delivering of information.

Lastly, I would like to thank my parents, siblings, and family, who have been a great support in my academic and professional journey.

Share

COinS