Theses and Dissertations

Date of Award

12-2020

Document Type

Thesis

Degree Name

Master of Science (MS)

Department

Electrical Engineering

First Advisor

Dr. Sanjeev Kumar

Second Advisor

Dr. Wenjie Dong

Third Advisor

Dr. Yul Chu

Abstract

Cyberattacks are quite common occurrences today as such can compromise entire networks producing collective vulnerabilities. As shown herein, manifold experimental findings exhibit ramifications for a cyberattack victim during multiple simulations. All experiments were conducted with Apple’s iMac, the victim system, and different editions of Microsoft Windows 10 and Windows 8.1.

Cyberattacks herein categorize as Distributed Denial of Service (DDoS) attacks including Smurf, Ping Flood, Transmission Control Protocol-Synchronize (TCP-SYN) Flood, and User Datagram Protocol (UDP) Flood attacks. Experimental results from each cyberattack are recordings of computer activities such as memory consumption, disk utilization, and overall processor utilization.

DDoS attack simulations include networks with over 65 thousand systems per network which generate attack traffic for the victim system. Likewise, simulated legitimate traffic attempts to connect with a victim system for further evaluation purposes. Experimental data analysis involves comparing impactful differences between cyberattacks, Microsoft Windows versions, and editions of both versions.

Comments

Copyright 2020 Christina Navarro. All Rights Reserved.

https://go.openathens.net/redirector/utrgv.edu?url=https://www.proquest.com/dissertations-theses/security-evaluation-microsoft-s-windows-under/docview/2595650523/se-2?accountid=7119

Share

COinS