Show simple item record

dc.contributor.advisorMukta, Jannatun Noor
dc.contributor.authorKhan, Farabi Fardin
dc.contributor.authorHossain, Nafis Mohaimin
dc.contributor.authorMahmud, Toushif
dc.contributor.authorAnwar, Sad Bin
dc.contributor.authorIslam, Sirajul
dc.date.accessioned2022-08-29T04:21:06Z
dc.date.available2022-08-29T04:21:06Z
dc.date.copyright2021
dc.date.issued2021-10
dc.identifier.otherID 17101136
dc.identifier.otherID 17101133
dc.identifier.otherID 17101128
dc.identifier.otherID 21341041
dc.identifier.otherID 17101467
dc.identifier.urihttp://hdl.handle.net/10361/17129
dc.descriptionThis thesis is submitted in partial fulfillment of the requirements for the degree of Bachelor of Science in Computer Science, 2021.en_US
dc.descriptionCataloged from PDF version of thesis.
dc.descriptionIncludes bibliographical references (pages 42-44).
dc.description.abstractCloud computing is crucial to the internet just as air is crucial to breathing. Most users do not even come to think how the cloud architecture is one of the giant pillars on which the entire internet and all its related services depend. In recent times, cloud computing has gained noticeable popularity due to its ability to radically improve computing power through the application of virtual machines. In this era of the internet, however, security threats are increasing and it costs many businesses. The seemingly legitimate traffic of these application-level attacks renders the previous detection and mitigation methods ineffective. These cyber-attacks have grown ever so sophisticated and the detection and mitigation of these attacks have become one of the major concerns of security researchers and cloud service providers all around the globe. In our paper, we are trying to analyze existing research and implementation of the cloud architecture. This analysis will give us insight into the core mechanisms of the cloud architecture and DDoS attacks. Furthermore, we will apply this understanding of ours to design and build an universal mitigation technique for DDoS attacks. An universal solution that works for all scenarios, may take at least a few dozen developers working years on end to develop. Therefore, the goal of this paper will be to lay the foundation on which one day the universal solution may be created.en_US
dc.description.statementofresponsibilityFarabi Fardin Khan
dc.description.statementofresponsibilityNafis Mohaimin Hossain
dc.description.statementofresponsibilityToushif Mahmud
dc.description.statementofresponsibilitySad Bin Anwar
dc.description.statementofresponsibilitySirajul Islam
dc.format.extent44 pages
dc.language.isoenen_US
dc.publisherBrac Universityen_US
dc.rightsBrac University theses are protected by copyright. They may be viewed from this source for any purpose, but reproduction or distribution in any format is prohibited without written permission.
dc.subjectDDoSen_US
dc.subjectAttacken_US
dc.subjectDetectionen_US
dc.subjectNetworken_US
dc.subjectServeren_US
dc.subjectMitigationen_US
dc.subject.lcshCloud computing
dc.subject.lcshDenial of service attacks
dc.subject.lcshComputer security
dc.titleMitigating DDoS attacks using a resource sharing networken_US
dc.typeThesisen_US
dc.contributor.departmentDepartment of Computer Science and Engineering, Brac University
dc.description.degreeB. Computer Science


Files in this item

Thumbnail

This item appears in the following Collection(s)

Show simple item record