Dissertation > Excellent graduate degree dissertation topics show

Research on Probabilistic Packet Marking Algorithms in IP Traceback

Author: HuangChunZuo
Tutor: XuDeQi
School: Lanzhou University
Course: Computer Software and Theory
Keywords: network security denial of service attack IP traceback probabilistic packet marking NS2
CLC: TP393.07
Type: Master's thesis
Year: 2006
Downloads: 136
Quote: 5
Read: Download Dissertation

Abstract


If it is said that the invention of car in the 19th century is as like as giving wings to human’s feet;If it is said that the invention of television in the 20th century is as like as giving wings to human’s eyes;Then, the Internet in 21st century is as like as giving wings to human’s brain. People soar freely in this digital world.But this world isn’t at peace. Viruses, leaks, and spy wares emerge in endlessly;worms, Trojans, and net thefts increase year by year. Maintaining Internet security becomes more and more important. Denial of service attack is among the hardest security problems to address because it is easy to launch, difficult to defend and trace.In this paper, the mechanism, methods and development to denial of service attacks are discussed firstly. Then, the defense techniques and their respective trends are studied. A novel technique, that is traceback technique, then becomes our research emphasis. This paper studies systemically several traceback techniques till now, classifies them and analyzes their respective advantages and disadvantages. Through above research, the paper draws a conclusion that probabilistic packet marking techniques are a kind of promising techniques.For comparing the probabilistic packet marking algorithms expediently, this paper induces several evaluation indexes. On the base of systemic analysis six kinds of probabilistic packet marking algorithms, this paper brings a node-edge probabilistic packet marking algorithm, short for NEMS. Because utilizing adequately the IP packet header space, the NEMS algorithm reduces false positive numbers and false negative numbers greatly. The NEMS algorithm’s computing complexity is similar to other algorithms, and the biggest advantage is that it needn’t know Internet topology in advance when reconstructing attack paths.On the basis of NEMS algorithm, this paper studies further improving approaches from one hash function to several hash functions, and from unalterable probability to alterable probability.As a kind of network security technique, probabilistic packet marking algorithms’ self security is also important. This paper analyzes probabilistic packet marking techniques’ security, and gives several their limitations.Finally, this paper simulates all given probabilistic packet marking algorithms with famous simulation software, NS2. The simulations’ results validate this paper’s primary conclusions.

Related Dissertations

  1. The Design and Realization of NS2-based PeerCast Simulation Platform,TP311.52
  2. The Research of Malware Detection Technology Based on Active Mode,TP393.08
  3. Topology Measurement and Security Analysis on Gnutella and eMule Network,TP393.08
  4. Research of Secure Distributed Cluster Wireless Sensor Network Routing Based on LEACH,TP212.9
  5. Region-based wireless sensor network key management scheme for research,TP212.9
  6. HCV NS2TP Gene Regulation Mechanism,R512.63
  7. Research and Design of Secure Comunication of NVD on Demand System,TP309
  8. Design and implementation of network security technology application and reporting system in the e-government system,TP393.08
  9. Based on cognitive Distributed multichannel wireless network simulation model,TN925
  10. Chinese online banking Innovative Ways,F832.2
  11. Simulation and Research of Energy Efficient Routing Technology Ad Hoc Networks,TN929.5
  12. Research on Simulation Technology of Underwater Acoustic Sensor Networks Based on NS2,TN929.3
  13. Research of the SSL/TLS Protocol in the Application of the Electronic Commerce,TP393.08
  14. Research on Probabilistic Packet Marking Based Intrusion Traceback Technology,TP393.08
  15. Ad Hoc Networks ZRP routing protocols Research and the simulation,TN929.5
  16. Research on Multi-hop Clustering Routing Protocol for Ad Hoc Network,TN929.5
  17. Research on Routing Protocols for Wireless Mesh Network,TN929.5
  18. Dynamic - static combination of probabilistic packet marking technology,TP393.08
  19. Coordination-based Virtual Honeynet’s Implementation and Analysis,TP393.08
  20. QoS-Oriented Multicast Group Management Mechanism,TP393.02
  21. Research and Implementation of FPGA- GCM encryption and authentication algorithms,TN918.4

CLC: > Industrial Technology > Automation technology,computer technology > Computing technology,computer technology > Computer applications > Computer network > General issues > Computer Network Management
© 2012 www.DissertationTopic.Net  Mobile