Please use this identifier to cite or link to this item:
https://dl.ucsc.cmb.ac.lk/jspui/handle/123456789/2527
Title: | Router Level Security Solution For SOHO |
Authors: | Kodippili, N.H. |
Issue Date: | 26-May-2014 |
Abstract: | In this report I m going to evaluate security drawbacks on Small office home office (SOHO) environment and proposing the solution for the above problem. Communication of confidential data over the internet or public networks becoming more frequent and important in these days. Individuals and organizations send their confidential data electronically through public communication channels. It is also common that hackers and intruders target these networks. Protecting confidential data, software and hardware from attacks is now more than a need, not just a concern. How security is implemented to ensure a SOHO network in router level? In this project I will try to address the above questions and implement a solution to ensure security in the SOHO networks. Denials of Service (DoS) attacks have become a large problem for users of computer systems connected to the Internet and internal attacks. As new countermeasures are developed to prevent or mitigate DoS attacks, attackers are constantly developing new methods to circumvent these new countermeasures. In this report, we describe DoS attack models and propose countermeasures to illustrate the scope of DoS attacks. In the methodology section we address the patterns in different DoS attacks and tools, to develop more generalized solutions to encounter them. The proposed solution is based on the combination of snort, IPtables and the program we implemented. Further, it includes the performed comparison of the DoS attacks which were analyzed, without any security perimeter protection and with perimeter protection. |
URI: | http://hdl.handle.net/123456789/2527 |
Appears in Collections: | Master of Science in Information Security - 2014 |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
11770141.pdf Restricted Access | 1.24 MB | Adobe PDF | View/Open Request a copy |
Items in UCSC Digital Library are protected by copyright, with all rights reserved, unless otherwise indicated.