Masterarbeit, 2012
75 Seiten, Note: Merit
1. Introduction
1.1 Background to the problem/issue
1.2 Justification for the research
1.3 Aim and objectives
1.4 Scope of the research
1.5 Outline of the dissertation
2 Research definition
2.1 The practical problem/issue
2.2 Existing relevant knowledge
2.2.1 Well known DoS attacks
2.2.2 Communications standards and protocols
2.2.3 DoS mitigation and access control considerations
2.2.4 Summarising the existing body of knowledge
2.3 Research questions
3 Proposed methodology
3.1 Methods and techniques selected
3.2 Justification
3.3 Research procedures
3.3.1 The personal interviews
3.3.2 The online survey
3.3.3 The practical experiments
3.4 Ethical considerations
4 Analysis and interpretation
4.1 Summary of data collected
4.2 Data analysis
4.2.1 The interview phase
4.2.2 The Online survey
4.2.3 DoS experiments using the test network
4.3 Interpretation in relation to the research questions
4.4 Interpretation in relation to the research aim
5 Conclusions
5.1 Conclusions about the research questions
5.1.1 Research question 1
5.1.2 Research question 2
5.1.3 Research question 3
5.1.4 Research question 4
5.2 Conclusions about the research aim
5.3 Further work
5.4 Implications of the research
5.5 Reflection on the experience of the research process
This dissertation investigates the risks posed by Denial of Service (DoS) attacks to Small to Medium-sized Enterprises (SMEs) with an online presence, focusing on evaluating effective mitigation strategies through practical experimentation in a controlled network environment.
TCP SYN Flood
During the TCP SYN flood attack the Wireshark protocol analyser was able to intercept and display malicious TCP packets as they were passed through the router and on to the web server on the LAN. Figure 4.11 shows the packet capture session on Wireshark which shows an abnormally large amount of TCP SYN packets being received by the target host. The results from these tests indicate that the router was not preconfigured to mitigate TCP SYN flood DoS attacks, and was passing the malicious traffic onto LAN segment. The second phase of the tests was carried out after the router was configured with an ACL using the ‘established’ command. The results from the second set of tests indicated that malicious TCP packets were not being passed through the router interface and entering the LAN. Closer inspection of the router logs identified that malicious TCP packets were being filtered by the ACL to prevent ingress to the LAN.
1. Introduction: This chapter establishes the nature of DoS threats, explains the background of networked security, and outlines the justification, aim, and objectives of the research.
2 Research definition: This chapter examines existing literature on well-known DoS attacks, relevant network protocols, and sets out the core research questions.
3 Proposed methodology: This chapter details the research methods and techniques, including personal interviews, online surveys, and the design of a laboratory-based testing environment.
4 Analysis and interpretation: This chapter presents the collected data from interviews, surveys, and experimental network tests, followed by an interpretation in relation to the research questions.
5 Conclusions: This chapter summarizes the findings regarding the research questions, discusses the implications for SMEs, suggests areas for further work, and provides the author's reflection on the research process.
Denial of Service, DoS, DDoS, SME, Network Security, Mitigation Strategies, TCP SYN Flood, IP Spoofing, ICMP Flood, MAC Flood, Access Control Lists, Network Routers, Network Switches, Wireless LAN, Cyber Security
The research focuses on investigating DoS attack risks for SMEs and identifying practical mitigation strategies that network administrators can implement.
Key areas include the nature of DoS/DDoS attacks, network hardware security configurations, SME-specific security awareness, and the practical implementation of defense mechanisms like ACLs.
The aim is to investigate known DoS mechanisms and propose appropriate mitigation strategies that are useful for networking and security administrators in SMEs.
The research uses a mixed-methods approach: unstructured and semi-structured interviews with IT professionals, an online survey of SMEs, and controlled laboratory experiments using network hardware.
It covers theoretical background on DoS, the design of a testing environment, empirical analysis of data gathered from surveys, and practical testing of mitigation options like IP filtering and port security.
The work is characterized by terms such as Denial of Service (DoS), mitigation strategies, SMEs, TCP/IP, and network infrastructure security.
The study finds that while many SMEs are aware of DoS risks, they often lack deep technical knowledge of how to configure network hardware to defend against them, frequently assuming default configurations are sufficient.
The research demonstrates that most routers and switches are not fully pre-configured to mitigate the tested DoS attacks, requiring manual implementation of security settings like ACLs or port-security features.
Der GRIN Verlag hat sich seit 1998 auf die Veröffentlichung akademischer eBooks und Bücher spezialisiert. Der GRIN Verlag steht damit als erstes Unternehmen für User Generated Quality Content. Die Verlagsseiten GRIN.com, Hausarbeiten.de und Diplomarbeiten24 bieten für Hochschullehrer, Absolventen und Studenten die ideale Plattform, wissenschaftliche Texte wie Hausarbeiten, Referate, Bachelorarbeiten, Masterarbeiten, Diplomarbeiten, Dissertationen und wissenschaftliche Aufsätze einem breiten Publikum zu präsentieren.
Kostenfreie Veröffentlichung: Hausarbeit, Bachelorarbeit, Diplomarbeit, Dissertation, Masterarbeit, Interpretation oder Referat jetzt veröffentlichen!

