dc.contributor.advisor | Mukta, Jannatun Noor | |
dc.contributor.author | Khan, Farabi Fardin | |
dc.contributor.author | Hossain, Nafis Mohaimin | |
dc.contributor.author | Mahmud, Toushif | |
dc.contributor.author | Anwar, Sad Bin | |
dc.contributor.author | Islam, Sirajul | |
dc.date.accessioned | 2022-08-29T04:21:06Z | |
dc.date.available | 2022-08-29T04:21:06Z | |
dc.date.copyright | 2021 | |
dc.date.issued | 2021-10 | |
dc.identifier.other | ID 17101136 | |
dc.identifier.other | ID 17101133 | |
dc.identifier.other | ID 17101128 | |
dc.identifier.other | ID 21341041 | |
dc.identifier.other | ID 17101467 | |
dc.identifier.uri | http://hdl.handle.net/10361/17129 | |
dc.description | This thesis is submitted in partial fulfillment of the requirements for the degree of Bachelor of Science in Computer Science, 2021. | en_US |
dc.description | Cataloged from PDF version of thesis. | |
dc.description | Includes bibliographical references (pages 42-44). | |
dc.description.abstract | Cloud computing is crucial to the internet just as air is crucial to breathing. Most
users do not even come to think how the cloud architecture is one of the giant pillars
on which the entire internet and all its related services depend. In recent times, cloud
computing has gained noticeable popularity due to its ability to radically improve
computing power through the application of virtual machines. In this era of the
internet, however, security threats are increasing and it costs many businesses. The
seemingly legitimate traffic of these application-level attacks renders the previous
detection and mitigation methods ineffective. These cyber-attacks have grown ever
so sophisticated and the detection and mitigation of these attacks have become
one of the major concerns of security researchers and cloud service providers all
around the globe. In our paper, we are trying to analyze existing research and
implementation of the cloud architecture. This analysis will give us insight into
the core mechanisms of the cloud architecture and DDoS attacks. Furthermore, we
will apply this understanding of ours to design and build an universal mitigation
technique for DDoS attacks. An universal solution that works for all scenarios, may
take at least a few dozen developers working years on end to develop. Therefore,
the goal of this paper will be to lay the foundation on which one day the universal
solution may be created. | en_US |
dc.description.statementofresponsibility | Farabi Fardin Khan | |
dc.description.statementofresponsibility | Nafis Mohaimin Hossain | |
dc.description.statementofresponsibility | Toushif Mahmud | |
dc.description.statementofresponsibility | Sad Bin Anwar | |
dc.description.statementofresponsibility | Sirajul Islam | |
dc.format.extent | 44 pages | |
dc.language.iso | en | en_US |
dc.publisher | Brac University | en_US |
dc.rights | Brac University theses are protected by copyright. They may be viewed from this source for any purpose, but reproduction or distribution in any format is prohibited without written permission. | |
dc.subject | DDoS | en_US |
dc.subject | Attack | en_US |
dc.subject | Detection | en_US |
dc.subject | Network | en_US |
dc.subject | Server | en_US |
dc.subject | Mitigation | en_US |
dc.subject.lcsh | Cloud computing | |
dc.subject.lcsh | Denial of service attacks | |
dc.subject.lcsh | Computer security | |
dc.title | Mitigating DDoS attacks using a resource sharing network | en_US |
dc.type | Thesis | en_US |
dc.contributor.department | Department of Computer Science and Engineering, Brac University | |
dc.description.degree | B. Computer Science | |