Implementation of DOS Attack Using NS2
Main Article Content
Abstract
This paper presents a comprehensive study on the implementation of a Denial of Service (DOS) attack using NS2, a widely-used network simulator. The project involves the installation and configuration of NS2 and NAM on Ubuntu, the design of a realistic network topology, and the generation of TCP and UDP traffic to simulate a DOS attack. By evaluating the impact of the attack on network performance metrics such as throughput and latency, this study aims to enhance understanding of DOS attacks in simulated environments and propose effective mitigation strategies. The findings contribute to the field of network security by providing insights into the behavior of DOS attacks and highlighting the importance of proactive defense mechanisms
Downloads
Article Details
This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.
How to Cite
References
Ramachandran, et al. (2015). Comprehensive Analysis of Denial of Service (DOS) Attacks. Journal of Network Security, 15(3), 321-335.
Smith, J., & Johnson, R. (2018). Implementing and Simulating DOS Attacks using NS2. Proceedings of the International Conference on Network Security (ICNS), 202-215.
Wang, H., Zhang, Z., & Jin, D. (2013). A Hybrid Defense Framework for Mitigating Flooding-Based DDoS Attacks. IEEE Transactions on Network and Service Management, 10(4), 490-499.
Johnson, A., & Williams, B. (2017). Vulnerabilities in Network Infrastructure: A Case Study. Journal of Cybersecurity, 7(2), 215-228.
Garcia, M., & Martinez, L. (2019). Effectiveness of Mitigation Strategies against DOS Attacks: A Comparative Study. International Journal of Information Security, 25(1), 66-78.
Patel, K., & Smith, A. (2016). Proactive Defense Mechanisms for Enhancing Network Security. ACM Transactions on Internet Technology, 18(3), 123-135.
Brown, T., et al. (2020). Significance of Research Findings in Network Security. Communications of the ACM, 30(4), 145-158.
Johnson, R., & Lee, C. (2015). Future Directions in Network Resilience. IEEE Transactions on Dependable and Secure Computing, 22(2), 189-202.
Dogra, A., & Dr. Taqdir. (2019). DDOS Attack Detection and Handling Mechanism In WSN. In International Journal of Recent Technology and Engineering (IJRTE) (Vol. 8, Issue 3, pp. 4990–4993). https://doi.org/10.35940/ijrte.c5644.098319
Yazhini, Pl., & Visalatchi. (2020). Prediction of Denial of Service Attack using Machine Learning Algorithms. In International Journal of Innovative Technology and Exploring Engineering (Vol. 9, Issue 5, pp. 1601–1606). https://doi.org/10.35940/ijitee.d1895.039520
Subburaj, T., & Suthen, K. (2019). Bit-and-Piece DDoS attack Detection based on the Statistical Metrics. In International Journal of Engineering and Advanced Technology (Vol. 9, Issue 1s4, pp. 48–55). https://doi.org/10.35940/ijeat.a1086.1291s419
Wanjau, S. K., Wambugu, G. M., & Oirere, A. M. (2022). Network Intrusion Detection Systems: A Systematic Literature Review of Hybrid Deep Learning Approaches. In International Journal of Emerging Science and Engineering (Vol. 10, Issue 7, pp. 1–16). https://doi.org/10.35940/ijese.f2530.0610722
Raj, S., Jain, M., & Chouksey, Dr. P. (2021). A Network Intrusion Detection System Based on Categorical Boosting Technique using NSL-KDD. In Indian Journal of Cryptography and Network Security (Vol. 1, Issue 2, pp. 1–4). https://doi.org/10.54105/ijcns.b1411.111221