Beruflich Dokumente
Kultur Dokumente
INTRODUCTION
• We live in a digital era in which the way we communicate has dramatically
changed. We can communicate digital files at any time, on any device, and with
anyone on the planet.
• Images and other multimedia files are frequently transmitted via computer
networks. The transmission of information across untrusted networks endangers the
security of the information. For example, due to continuous attempts of hackers,
images end up in the hands of illegal third parties during communication that might
profit or amend them without the awareness.
Cont..
• For this reason we need to product the information, a secure way to
communicate in the presence of adversaries, is important. This
demand, to prevent the contents of messages from intruders, gave
birth to cryptography, the science and art of sending messages in
secret.
2. Jamming
3. Miss positioning/Control
Access Control
Authentication
Availability
Confidentiality
Data Integrity
Accountability
CASE STUDY
• Author Mitko Bogdanoski in the year 2015 demonstrates about
DoS SYN flood attack.
• Here, they used the SYN flood attack is well-known DoS
method which affects hosts that run TCP server processes (the
three-way handshake mechanism of TCP connection).
• The main advantage is Less amount of tracing packets, less
computational overhead, high rates of tracing success.
• The Disadvantage is Huge consumption of critical resource
like memory for tracing.
Hence, DDoS (Distributed Denial of Service) attacks are one
of the alarming issues of security over the collaborative
networks, and in turn a major concern for the security over the
commercial satellite based communication infrastructure that
often poorly equipped with the measures to encounter the
serious and advance security threats over the links.
Based on these analysis , I focused DDOS (Distributed Denial
of Service) Attack with hybrid mechanism.