Theses and Dissertations
Date of Award
12-2020
Document Type
Thesis
Degree Name
Master of Science (MS)
Department
Electrical Engineering
First Advisor
Dr. Sanjeev Kumar
Second Advisor
Dr. Wenjie Dong
Third Advisor
Dr. Yul Chu
Abstract
Cyberattacks are quite common occurrences today as such can compromise entire networks producing collective vulnerabilities. As shown herein, manifold experimental findings exhibit ramifications for a cyberattack victim during multiple simulations. All experiments were conducted with Apple’s iMac, the victim system, and different editions of Microsoft Windows 10 and Windows 8.1.
Cyberattacks herein categorize as Distributed Denial of Service (DDoS) attacks including Smurf, Ping Flood, Transmission Control Protocol-Synchronize (TCP-SYN) Flood, and User Datagram Protocol (UDP) Flood attacks. Experimental results from each cyberattack are recordings of computer activities such as memory consumption, disk utilization, and overall processor utilization.
DDoS attack simulations include networks with over 65 thousand systems per network which generate attack traffic for the victim system. Likewise, simulated legitimate traffic attempts to connect with a victim system for further evaluation purposes. Experimental data analysis involves comparing impactful differences between cyberattacks, Microsoft Windows versions, and editions of both versions.
Recommended Citation
Navarro, Christina Y., "Security Evaluation of Microsoft’s Windows Under Cyber-Flood Attacks" (2020). Theses and Dissertations. 557.
https://scholarworks.utrgv.edu/etd/557
Comments
Copyright 2020 Christina Navarro. All Rights Reserved.
https://go.openathens.net/redirector/utrgv.edu?url=https://www.proquest.com/dissertations-theses/security-evaluation-microsoft-s-windows-under/docview/2595650523/se-2?accountid=7119