Show simple item record

dc.contributor.authorBbosa, Tonny
dc.date.accessioned2018-12-14T08:06:01Z
dc.date.available2018-12-14T08:06:01Z
dc.date.issued2018-08
dc.identifier.urihttp://hdl.handle.net/10570/6936
dc.descriptionA project report submitted to the College of Computing and Information Sciences in partial fulfillment of the requirements for the award of the Degree of Master of Science in Computer Science of Makerere University.en_US
dc.description.abstractTCP SYN Flood attacks are among the commonest distributed denial-of-service attacks (DDoS) affecting online system. The attack exploits the TCP three-way handshake by making the server or network inaccessible. An attacker sends a beam of SYN requests continuously to the target with false return address. In turn, the victim responds to all requests using the false IP addresses provided by the attacker. Notably the victim fails to reach the attacker keeping an open incomplete handshake. Each of the connections in resource intense and Cumulatively these connections Maintaining all connections the victim’s resources and maximum concurrent connections runs out thus a TCP SYN flood attack. Many approaches to detect and mitigate TCP SYN flood attacks are in place but the attacks are still prevalent. This is due to the efficiency and effectiveness levels the approaches present and considerations of the new attack models that are more sophisticated. The research report presents an extended study relating to TCP SYN flood attacks, an approach based on Iptables to detect and mitigate TCP SYN Flood attacks on the fly and experimental results showing the effectiveness of the tool. For this study, data was simulated to create an attack instance, analyzed using Wireshark (Packet analyzer tool) to study the effect of the attack. A designed approach based on firewall scripts was deployed and traffic analyzed again to measure the effectiveness of the approach. Analysis of the results showed effective of the tool, and once the approach is adopted by system/network administrators the likelihood of TCP SYN flood attacks will be minimal.en_US
dc.language.isoenen_US
dc.subjectIptablesen_US
dc.subjectDDoS Attacksen_US
dc.subjectDoS Attacksen_US
dc.subjectFirewallsen_US
dc.subjectSYN flood attacksen_US
dc.subjectSecurityen_US
dc.titleAn approach based on IPtables to control TCP SYN flood distributed denial of service attacken_US
dc.typeThesisen_US


Files in this item

Thumbnail

This item appears in the following Collection(s)

Show simple item record