Implementation of DOS Attack Using NS2
N. Naga Lakshmi1, P. Karthik2, P. Shiva Sai3, A. Sai Vishal4

1NN. Naga Lakshmi, Department of Information Technology, Anurag University, Hyderabad (Telangana), India.

2P. Karthik, Department of Information Technology, Anurag University, Hyderabad (Telangana), India.

3P. Shiva Sai, Department of Information Technology, Anurag University, Hyderabad (Telangana), India.

4A. Sai Vishal, Department of Information Technology, Anurag University, Hyderabad (Telangana), India.  

Manuscript received on 03 April 2024 | Revised Manuscript received on 13 May 2024 | Manuscript Accepted on 15 May 2024 | Manuscript published on 30 May 2024 | PP: 1-4 | Volume-12 Issue-6, May 2024 | Retrieval Number: 100.1/ijese.F985913060524 | DOI: 10.35940/ijese.F9859.12060524

Open Access | Editorial and Publishing Policies | Cite | Zenodo | OJS | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC-BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: This paper presents a comprehensive study on the implementation of a Denial of Service (DOS) attack using NS2, a widely-used network simulator. The project involves the installation and configuration of NS2 and NAM on Ubuntu, the design of a realistic network topology, and the generation of TCP and UDP traffic to simulate a DOS attack. By evaluating the impact of the attack on network performance metrics such as throughput and latency, this study aims to enhance understanding of DOS attacks in simulated environments and propose effective mitigation strategies. The findings contribute to the field of network security by providing insights into the behavior of DOS attacks and highlighting the importance of proactive defense mechanisms.

Keywords: Denial of Service (DOS) Attack, NS2, Network Simulation, Ubuntu, Network Performance, Mitigation Strategies.
Scope of the Article: Network Performance; Protocols; Sensors