dc.contributor.author | Iqbal, Shaheen | |
dc.contributor.author | Naeem, Sulman | |
dc.contributor.author | Iqbal, Sami | |
dc.contributor.author | Nawaz, Ahmed | |
dc.contributor.author | Supervised by Mian Muhammad Waseem Iqbal. | |
dc.date.accessioned | 2020-11-11T08:22:15Z | |
dc.date.available | 2020-11-11T08:22:15Z | |
dc.date.issued | 2018-07 | |
dc.identifier.other | PCS-365 | |
dc.identifier.other | BESE-20 | |
dc.identifier.uri | http://10.250.8.41:8080/xmlui/handle/123456789/11429 | |
dc.description.abstract | With the advent of the modern information age, cyber warfare or cyber war is characterized as 5th generation warfare where adversaries fight for the secret sensitive information and want to make the services provided unreachable. Many techniques have been used since the ancient times to keep data available and is top priority in government organizations therefore secure media is very important. Modern day security concepts stand on three primary pillars known as Confidentiality, Integrity and Availability a.k.a. The CIA Triad. The product in development (Attacker Tracing Using Packet Marking) will focus mainly on the availability of data. Packet marking will be used to achieve availability. An Algorithm "Flexible Deterministic Packet Marking" is used to mark the packets. Attacker Tracing Using Packet Marking will be responsible to mark packets deterministically and ensure that data is available all the time. Interactive interface will be provided to ensure ease of usage to system users. Software will be compatible with the already hardware installed at the government organization. | en_US |
dc.language.iso | en | en_US |
dc.publisher | MCS | en_US |
dc.title | Attacker Tracing using Packet Marking | en_US |
dc.type | Technical Report | en_US |