Dissertation > Excellent graduate degree dissertation topics show

Research on Probabilistic Packet Marking Based Intrusion Traceback Technology

Author: ZuoYang
Tutor: XiaHongShan
School: Nanjing University of Aeronautics and Astronautics
Course: Communication and Information System
Keywords: network security denial of service attack intrusion traceback probabilistic packet marking packet filtering
CLC: TP393.08
Type: Master's thesis
Year: 2009
Downloads: 8
Quote: 1
Read: Download Dissertation


With the development of network technology and Internet application, network security becomes increasingly more important. Denial of service attack is one of the hardest security problems to solve because it is easy to launch, difficult to trace and may produce serious consequences. One of the important counter measures is IP traceback. This paper focuses on the intrusion traceback technology and Probabilistic Packet Marking. With these foundations, there is a research on the technology and measures to defend intrusion attacks.This paper is starting with an analysis of the current state of Internet security. First, the mechanism, methods and countermeasures to denial of services attacks are discussed. Then, several probabilistic packet marking schemes for traceback are mainly discussed and some improvements to the Dynamic Probabilistic Packet Marking scheme are given. The improved scheme is called ADPPM. The distance field of this packet marking scheme is used to make a decision of marking probability, so that ADPPM can decrease the number of needed packets of reconstructing attack paths and also can be effective against the impact of TTL field and distance field forged by attackers. In order to store the path information which is divided into three fragments by node marking and edge marking, this scheme use the TOS and Identification fields of IP head for its storage space. The ADPPM utilizes the IP packet header space adequately and can reconstruct attack paths without Internet topography. The results of simulation experiment with NS2 validate the conclusion.Most existing traceback technologies only focus on tracing the location of the attackers, and little is done to mitigate the effect of an attack while being attacked. After studying deeply on capturing and filtering packets based on NDIS intermediate driver and the technology of IP traceback-based intelligent packet filtering, ADPPM-based intrusion defense system presented in this paper that can obtain information of attack traffic and filter illegal packets on the perimeter routers and victim. By testing the performance with NS2, the simulation results demonstrate that the BDR(Bad Drop Ratio) is up to more than 85% , so that it can improve the throughput of the legitimate traffic. By considering the perimeter routers may be disabled under huge attack, this system can ensure the safety by using the intermediate driver to block attack packets.

Related Dissertations

  1. The Research of Malware Detection Technology Based on Active Mode,TP393.08
  2. Topology Measurement and Security Analysis on Gnutella and eMule Network,TP393.08
  3. Region-based wireless sensor network key management scheme for research,TP212.9
  4. SX Provincial Public Security Bureau Network Security Corps Performance Evaluation Index System Design,D631.1
  5. The Research of Insurance Network Marketing of China Insurance Company,F724.6
  6. One based on pattern matching lightweight network intrusion detection system design and implementation,TP393.08
  7. Analysis on DDoS Attacks Detecting Technology Based on Eigenvector,TP393.08
  8. Research and Implemention of Information Security Encryption System Based on the RSA,TP309.7
  9. The Research of Attack Source Traceback in Distributed Denial-of-Service Attacks Based on VoIP,TP393.08
  10. Ship mountain of e-government network security solutions outside the network design and implementation,TP393.08
  11. Research on Streaming Media Detection Methods Against DoS\DDoS Attack Based on Analysis of Self-similarity,TP393.08
  12. Firewall and three switch - based campus network security policy research,TP393.08
  13. Gansu Fuyuan Chemical analysis and design of integrated office platform,TP311.52
  14. Research and Design of Secure Comunication of NVD on Demand System,TP309
  15. Optimization and Design of Ningxia Mobile’s Business Supporting Network’s Security System,TN929.5
  16. QH Software Services Marketing Strategy,F426.672
  17. Fast protocol identification based firewall system design and implementation,TP393.08
  18. IPsec-based remote access to corporate network systems design and implementation,TP393.08
  19. Behavior -based botnet detection method,TP393.08
  20. Based on TCP / IP, no shaft offset Remote Monitoring System Design,TP277
  21. Study browser security issues and solutions,TP393.092

CLC: > Industrial Technology > Automation technology,computer technology > Computing technology,computer technology > Computer applications > Computer network > General issues > Computer Network Security
© 2012 www.DissertationTopic.Net  Mobile