Dissertation > Excellent graduate degree dissertation topics show

Research on Streaming Media Detection Methods Against DoS\DDoS Attack Based on Analysis of Self-similarity

Author: YuChuanMing
Tutor: WangRuChuan
School: Nanjing University of Posts and Telecommunications
Course: Information network
Keywords: Streaming Media Technology Distributed denial of service attacks Self-similarity Network Security
CLC: TP393.08
Type: Master's thesis
Year: 2012
Downloads: 23
Quote: 0
Read: Download Dissertation

Abstract


With the rapid development of Internet technology , is becoming increasingly popular form of streaming audio and video information , and the ever-growing user base . The streaming technology is widely used in multimedia news releases, online all aspects of the broadcast , video on demand , e-commerce , online advertising , telemedicine , distance education , Internet radio , real-time video conferencing and other Internet information services , attention to growing , especially streaming the quality of service is good or bad is under increasing attention of people . Streaming media technology has the characteristics of high timeliness of its direct impact on people's experience feelings , thus streaming media server once suffered a malicious attack , leading to the response delay even paralysis and the consequences will be more serious . This article as a starting point , the systematic study of traditional DoS, DDoS attacks , and in-depth analysis of streaming RTSP interaction protocol basis , the agreement specified launch DoS , DDoS attacks security loophole . Then designed and implemented a set of streaming DoS , DDoS attack defense program . The defense program effective denial of service attack detection and attack defense strategy based on self-similarity of network traffic . Finally, the experimental test , the results show that the effect of the sets of the defense program convection Media Services DoS , DDoS attacks defense .

Related Dissertations

  1. The Research of Malware Detection Technology Based on Active Mode,TP393.08
  2. Topology Measurement and Security Analysis on Gnutella and eMule Network,TP393.08
  3. Region-based wireless sensor network key management scheme for research,TP212.9
  4. SX Provincial Public Security Bureau Network Security Corps Performance Evaluation Index System Design,D631.1
  5. The Research of Insurance Network Marketing of China Insurance Company,F724.6
  6. Research and Implemention of Information Security Encryption System Based on the RSA,TP309.7
  7. The Research of Attack Source Traceback in Distributed Denial-of-Service Attacks Based on VoIP,TP393.08
  8. Firewall and three switch - based campus network security policy research,TP393.08
  9. Research and Design of Secure Comunication of NVD on Demand System,TP309
  10. QH Software Services Marketing Strategy,F426.672
  11. Fast protocol identification based firewall system design and implementation,TP393.08
  12. IPsec-based remote access to corporate network systems design and implementation,TP393.08
  13. Behavior -based botnet detection method,TP393.08
  14. Based on TCP / IP, no shaft offset Remote Monitoring System Design,TP277
  15. Study browser security issues and solutions,TP393.092
  16. The Research of Security Issues in Cognitive Radio Networks,TN915.08
  17. The Design and Implementation of an Online Shopping System Based on PKI,TP393.09
  18. Zhengzhou, China Unicom office automation network security protection Strategy,TP393.08
  19. OTN networking and security technology and its applications in mobile networks in Nanjing Research,TN929.5
  20. China Mobile EPON network access solutions and full-service safety study,TN929.5

CLC: > Industrial Technology > Automation technology,computer technology > Computing technology,computer technology > Computer applications > Computer network > General issues > Computer Network Security
© 2012 www.DissertationTopic.Net  Mobile