Implementation of DOS Attack Using NS2

Main Article Content

N. Naga Lakshmi
P. Karthik
P. Shiva Sai
A. Sai Vishal

Abstract

This paper presents a comprehensive study on the implementation of a Denial of Service (DOS) attack using NS2, a widely-used network simulator. The project involves the installation and configuration of NS2 and NAM on Ubuntu, the design of a realistic network topology, and the generation of TCP and UDP traffic to simulate a DOS attack. By evaluating the impact of the attack on network performance metrics such as throughput and latency, this study aims to enhance understanding of DOS attacks in simulated environments and propose effective mitigation strategies. The findings contribute to the field of network security by providing insights into the behavior of DOS attacks and highlighting the importance of proactive defense mechanisms

Downloads

Download data is not yet available.

Article Details

How to Cite
Implementation of DOS Attack Using NS2 (N. Naga Lakshmi, P. Karthik, P. Shiva Sai, & A. Sai Vishal , Trans.). (2024). International Journal of Emerging Science and Engineering (IJESE), 12(6), 1-4. https://doi.org/10.35940/ijese.F9859.12060524
Section
Articles

How to Cite

Implementation of DOS Attack Using NS2 (N. Naga Lakshmi, P. Karthik, P. Shiva Sai, & A. Sai Vishal , Trans.). (2024). International Journal of Emerging Science and Engineering (IJESE), 12(6), 1-4. https://doi.org/10.35940/ijese.F9859.12060524
Share |

References

Ramachandran, et al. (2015). Comprehensive Analysis of Denial of Service (DOS) Attacks. Journal of Network Security, 15(3), 321-335.

Smith, J., & Johnson, R. (2018). Implementing and Simulating DOS Attacks using NS2. Proceedings of the International Conference on Network Security (ICNS), 202-215.

Wang, H., Zhang, Z., & Jin, D. (2013). A Hybrid Defense Framework for Mitigating Flooding-Based DDoS Attacks. IEEE Transactions on Network and Service Management, 10(4), 490-499.

Johnson, A., & Williams, B. (2017). Vulnerabilities in Network Infrastructure: A Case Study. Journal of Cybersecurity, 7(2), 215-228.

Garcia, M., & Martinez, L. (2019). Effectiveness of Mitigation Strategies against DOS Attacks: A Comparative Study. International Journal of Information Security, 25(1), 66-78.

Patel, K., & Smith, A. (2016). Proactive Defense Mechanisms for Enhancing Network Security. ACM Transactions on Internet Technology, 18(3), 123-135.

Brown, T., et al. (2020). Significance of Research Findings in Network Security. Communications of the ACM, 30(4), 145-158.

Johnson, R., & Lee, C. (2015). Future Directions in Network Resilience. IEEE Transactions on Dependable and Secure Computing, 22(2), 189-202.

Dogra, A., & Dr. Taqdir. (2019). DDOS Attack Detection and Handling Mechanism In WSN. In International Journal of Recent Technology and Engineering (IJRTE) (Vol. 8, Issue 3, pp. 4990–4993). https://doi.org/10.35940/ijrte.c5644.098319

Yazhini, Pl., & Visalatchi. (2020). Prediction of Denial of Service Attack using Machine Learning Algorithms. In International Journal of Innovative Technology and Exploring Engineering (Vol. 9, Issue 5, pp. 1601–1606). https://doi.org/10.35940/ijitee.d1895.039520

Subburaj, T., & Suthen, K. (2019). Bit-and-Piece DDoS attack Detection based on the Statistical Metrics. In International Journal of Engineering and Advanced Technology (Vol. 9, Issue 1s4, pp. 48–55). https://doi.org/10.35940/ijeat.a1086.1291s419

Wanjau, S. K., Wambugu, G. M., & Oirere, A. M. (2022). Network Intrusion Detection Systems: A Systematic Literature Review of Hybrid Deep Learning Approaches. In International Journal of Emerging Science and Engineering (Vol. 10, Issue 7, pp. 1–16). https://doi.org/10.35940/ijese.f2530.0610722

Raj, S., Jain, M., & Chouksey, Dr. P. (2021). A Network Intrusion Detection System Based on Categorical Boosting Technique using NSL-KDD. In Indian Journal of Cryptography and Network Security (Vol. 1, Issue 2, pp. 1–4). https://doi.org/10.54105/ijcns.b1411.111221

Most read articles by the same author(s)

1 2 3 4 5 > >>