Dissertation > Excellent graduate degree dissertation topics show

The Research of Attack Source Traceback in Distributed Denial-of-Service Attacks Based on VoIP

Author: ZhangBing
Tutor: LiShiPing
School: Northeastern University
Course: Computer technology
Keywords: VoIP DDoS Attack Attack Source Traceback Distribution Tracking Network Security
CLC: TP393.08
Type: Master's thesis
Year: 2010
Downloads: 6
Quote: 0
Read: Download Dissertation


VoIP (Voice over IP) is a voice communication technology that based on IP network transmission, the biggest advantage is Internet and the global environment for IP interconnect can be widely used to send the voice, fax, video and data. The maturity of VoIP technology allows many users started to use the IP telephone on the Internet. VoIP can be widely used because of the better voice quality and low prices or even free. At the same time, the network security issues caused by VoIP are increasing, and the harm gradually attracted people’s attention. The security of voice communication has become a critical requirement of VoIP solution. The DDoS attacks that based on open ports will has a direct impact on the foundation of the entire VoIP network. DDoS is a common network attack, It often impact the computer with a large number of connection requests which making the computer can not handle user’s legitimate requests by exhausting all the available operating system resources. Basing on the current network security, this subject hammers at resolving the security problem that VoIP faced to achieve the goal that tracks the source of attacks on VoIP networks with practical and effective means.Firstly, This paper studied the principle of DDoS attacks and the current domestic and foreign methods of source tracking, Pointing out the attack source tracing is still facing the challenges and problems, and Built a VoIP-based DDoS attack source tracking system which Based on the detailed analysis of VoIP users. This system improved the system reliability and availability by improving the data packet analysis and inhibiting the proliferation of alarms, and did a detailed design for key parts including the alarm module which affects system performance and the data packet analysis module. Through researching and improving the algorithm of VoIP tracing attack source of the DDoS, the number of packets that reconstructed the path can be reduced, the efficiency of the path reconstruction can be improved, and fast real-time tracking attack source can be achieved. In order to verify and evaluate the correctness and performance of the program, this paper achieved the relevant algorithms on the network simulator (Network Simulator version 2, NS2), and compared with the other methods. Experimental results shows that:the tracking method this paper studied has the feasibility.

Related Dissertations

  1. The Research of Malware Detection Technology Based on Active Mode,TP393.08
  2. Topology Measurement and Security Analysis on Gnutella and eMule Network,TP393.08
  3. Region-based wireless sensor network key management scheme for research,TP212.9
  4. SX Provincial Public Security Bureau Network Security Corps Performance Evaluation Index System Design,D631.1
  5. The Research of Insurance Network Marketing of China Insurance Company,F724.6
  6. The Studt of ILBC Speech Coding’s Key Technology and Its DSP Design and Optimization,TN912.3
  7. Design of VoIP Gateway Based on DSP,TN916.2
  8. Research and Implemention of Information Security Encryption System Based on the RSA,TP309.7
  9. Henan Public Security System Network Design and Implementation,TP393.09
  10. Research on Streaming Media Detection Methods Against DoS\DDoS Attack Based on Analysis of Self-similarity,TP393.08
  11. Firewall and three switch - based campus network security policy research,TP393.08
  12. Research and Implementation of Softphone Based on SIP,TN916.2
  13. VoIP Security Mechamism Research and Implementation Based on the Mobile Network,TN916.2
  14. Research and Design of Secure Comunication of NVD on Demand System,TP309
  15. Research and Implementation of SIP Server Based on the Multimedia Trunking and Dispatching Plateform,TP368.5
  16. New SIP-based voice gateway system design and implementation,TN916.2
  17. QH Software Services Marketing Strategy,F426.672
  18. Fast protocol identification based firewall system design and implementation,TP393.08
  19. IPsec-based remote access to corporate network systems design and implementation,TP393.08
  20. Behavior -based botnet detection method,TP393.08

CLC: > Industrial Technology > Automation technology,computer technology > Computing technology,computer technology > Computer applications > Computer network > General issues > Computer Network Security
© 2012 www.DissertationTopic.Net  Mobile