Theses and Dissertations

Date of Award


Document Type


Degree Name

Master of Science (MS)


Electrical Engineering

First Advisor

Dr. Sanjeev Kumar

Second Advisor

Dr. Wenjie Dong

Third Advisor

Dr. Yul Chu


Cyberattacks are quite common occurrences today as such can compromise entire networks producing collective vulnerabilities. As shown herein, manifold experimental findings exhibit ramifications for a cyberattack victim during multiple simulations. All experiments were conducted with Apple’s iMac, the victim system, and different editions of Microsoft Windows 10 and Windows 8.1.

Cyberattacks herein categorize as Distributed Denial of Service (DDoS) attacks including Smurf, Ping Flood, Transmission Control Protocol-Synchronize (TCP-SYN) Flood, and User Datagram Protocol (UDP) Flood attacks. Experimental results from each cyberattack are recordings of computer activities such as memory consumption, disk utilization, and overall processor utilization.

DDoS attack simulations include networks with over 65 thousand systems per network which generate attack traffic for the victim system. Likewise, simulated legitimate traffic attempts to connect with a victim system for further evaluation purposes. Experimental data analysis involves comparing impactful differences between cyberattacks, Microsoft Windows versions, and editions of both versions.


Copyright 2020 Christina Navarro. All Rights Reserved.