Please use this identifier to cite or link to this item: http://repository.futminna.edu.ng:8080/jspui/handle/123456789/15557
Full metadata record
DC FieldValueLanguage
dc.contributor.authorJuliana, Ndunagu-
dc.contributor.authorBayonle, Fadayomi-
dc.contributor.authorGaniyu, Shefiu Olusegun-
dc.contributor.authorJimoh, Rasheed Gbenga-
dc.date.accessioned2022-12-19T15:27:32Z-
dc.date.available2022-12-19T15:27:32Z-
dc.date.issued2020-12-
dc.identifier.issn2141-3959-
dc.identifier.urihttp://repository.futminna.edu.ng:8080/jspui/handle/123456789/15557-
dc.description.abstractFrequent and large-scale network attacks on computer networks are obviously leading to an increased need for developing techniques and tools for analysing traffics of a network. Hence, with the availability of efficient analysis tools, it could be possible to detect a network related attacks, anomalies and appropriately take action to contain the attacks before they have time to propagate across the network. Therefore, this research developed a network monitoring system, named F-NTAS that was based on Random Early Detection algorithm. The system can automatically sniff a network, capture live packets, dumps packets traffic to file, visualize network traffic and monitor packet traffic characteristics. Practically, F-NTAS was used in real-time to capture and analyse internet traffic for probable Denial of Service (DoS) attack. Interestingly, results obtained from the system demonstration, revealed that network traffic is a randomised sinusoid sequence and the characteristics of the traffic could distinguish normal traffic from a malicious one to detect imminent DoS attack.en_US
dc.language.isoenen_US
dc.publisherInternational Journal of Information Processing and Communication (IJIPC)en_US
dc.relation.ispartofseries10;1 & 2-
dc.subjectNetwork analysisen_US
dc.subjectNetwork testingen_US
dc.subjectNetwork trafficen_US
dc.subjectDenial of serviceen_US
dc.subjectInternet trafficen_US
dc.titleDevelopment of F-NTAS: A Network Traffic Analysis System for Detecting Denial of Service Attacken_US
dc.typeArticleen_US
Appears in Collections:Information and Media Technology



Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.