Theses and Dissertations

Advisor

Gudla, Charan

Committee Member

Trawick, George

Committee Member

Young, Maxwell

Date of Degree

8-13-2024

Original embargo terms

Visible MSU Only 2 Years

Document Type

Graduate Thesis - Campus Access Only

Major

Cybersecurity & Operations

Degree Name

Master of Science (M.S.)

College

James Worth Bagley College of Engineering

Department

Department of Computer Science and Engineering

Abstract

In this study, I used a dataset that contains low-rate and SYN flood traffic which was generated by a test bed to simulate a Slow DoS attack, stressing a local server by initiating several HTTP POST connections and causing the request payloads to be transmitted slowly. The attack causes problems including interrupted access and noticeably decreased network performance by sending a large number of little packets slowly, which keeps connections open and overloads server resources. I filtered traffic using Wireshark based on factors including tiny payloads, a lot of SYN packets without ACKs, high initial RTTs, small window sizes, and noticeable intervals between packets. Then, using these data, I ran a custom script I had created on the pcap files to identify possible attack sessions

Share

COinS