NUST Institutional Repository

Attacker Tracing using Packet Marking

Show simple item record

dc.contributor.author Iqbal, Shaheen
dc.contributor.author Naeem, Sulman
dc.contributor.author Iqbal, Sami
dc.contributor.author Nawaz, Ahmed
dc.contributor.author Supervised by Mian Muhammad Waseem Iqbal.
dc.date.accessioned 2020-11-11T08:22:15Z
dc.date.available 2020-11-11T08:22:15Z
dc.date.issued 2018-07
dc.identifier.other PCS-365
dc.identifier.other BESE-20
dc.identifier.uri http://10.250.8.41:8080/xmlui/handle/123456789/11429
dc.description.abstract With the advent of the modern information age, cyber warfare or cyber war is characterized as 5th generation warfare where adversaries fight for the secret sensitive information and want to make the services provided unreachable. Many techniques have been used since the ancient times to keep data available and is top priority in government organizations therefore secure media is very important. Modern day security concepts stand on three primary pillars known as Confidentiality, Integrity and Availability a.k.a. The CIA Triad. The product in development (Attacker Tracing Using Packet Marking) will focus mainly on the availability of data. Packet marking will be used to achieve availability. An Algorithm "Flexible Deterministic Packet Marking" is used to mark the packets. Attacker Tracing Using Packet Marking will be responsible to mark packets deterministically and ensure that data is available all the time. Interactive interface will be provided to ensure ease of usage to system users. Software will be compatible with the already hardware installed at the government organization. en_US
dc.language.iso en en_US
dc.publisher MCS en_US
dc.title Attacker Tracing using Packet Marking en_US
dc.type Technical Report en_US


Files in this item

This item appears in the following Collection(s)

Show simple item record

Search DSpace


Advanced Search

Browse

My Account