Dissertation > Excellent graduate degree dissertation topics show

Research on IP Traceback under Denial of Service Attack

Author: ZhangHaiCong
Tutor: WangXiaoMing
School: Jinan University
Course: Computer Software and Theory
Keywords: Denial of Service IP traceback packet marking probabilistic packet marking logging
CLC: TP393.08
Type: Master's thesis
Year: 2011
Downloads: 47
Quote: 0
Read: Download Dissertation


With the development of network technology,people’s work and life has become inextricably tied to the intemet.Though the network has brought people lots of convenience, people have to face to more and more network security problems.Denial of Service attack is one of most common attacks.Researchers presented a lot of measures to defence this attack including tracing the sources of attack.Because it is difficult to locate the sources of attack,Denial of Service is one of the major threats to the security of the Internet. The tracing of attacking data source can be not only used as foundation to track the real attacker behind the scenes, providing evidence to call to account, but also provide information to Denial of Service attack, achieve better defense effect.The contributions of the paper are outlined as follows:Firstly,GONG’s hybrid IP traceback scheme which make use of packet marking and logging is analysed. The disadvantages of low speed in reconstructing path and high false positive are pointed out.Moreover it can not locate the attack source.So an improved scheme is proposed in order to overcome the disadvantages. The proposed scheme employs the information of router interface to mark a router so as to reduce the number of queried routers in reconstructing the path. In the proposed scheme, the speed of reconstructing path is enhanced and the false positive is lowered since the number of logging routers is reduced.Moreover,the new scheme can loacte the attacker and does not require all routers to be traceback-enabled.Secondly, the paper analyses two existing Probabilistic Packet Marking schemes.Because they need a large number of packets to reconstruct the attack path and lack of anti-forgery feature.A new Probabilistic Packet Marking based on HMAC is presented.The new scheme use the HMAC of IP address as the mark information.In the new scheme,the number of packets to reconstruct path is reduced,victim can distinguish false information,and the number of combinations of different fragments is also reduced.Finally,according to the simulation result from NS2,the new hybrid scheme in the chapter three is better than the original one.

Related Dissertations

  1. Based on geophysical characteristics of lithofacies palaeogeography,P618.13
  2. Analysis on DDoS Attacks Detecting Technology Based on Eigenvector,TP393.08
  3. Design and Implementation of the Traffic Cleaning Management System Based on the Alarm,TP311.52
  4. Design and Implementation of DDoS Defense System Based on Flow Cleaning,TP393.08
  5. Research on Streaming Media Detection Methods Against DoS\DDoS Attack Based on Analysis of Self-similarity,TP393.08
  6. Applications of Vector Finite Element Method to Simulate Logging While Drilling Resistivity Tools,P631.83
  7. Remote logging sensor fault diagnosis system,TP212
  8. Development of high-resolution gamma-ray logging tool,TE927
  9. Study on the Inversion Algorithm of Nuclear Magnetic Resonance Transverse-relaxation Distribution,P631.81
  10. Cloud security technology in the data center botnet protection application,TP393.08
  11. Research and Implement on Detection DDoS System Based on Network Connection Features,TP393.08
  12. Weak Signal Detection Algorithm for the Array Induction Logging Tools,P631.81
  13. Design and Implementation of Jinan Rain Regime System Based on ArcGIS Engine,P208
  14. A New Node Sampling Tracking Algorithm,TP393.08
  15. Design and Implementation of Jinan Rain WebGIS System Based on ArcGIS Server,TP311.52
  16. Research on Detection and Defense Method of DoS Attacks in WLAN,TN925.93
  17. Research on DDoS Attack and Attack Source Traceback,TP393.08
  18. The Research of Visual Simulation of Chinese Fir Plantation Harvesting Operation,S791.27
  19. Border Gateway based Distributed Denial of Service attack prevention technology,TP393.08
  20. IP Traceback Technology and Its Application to Defense of DDoS Attack,TP393.08
  21. Research on Countermeasures to Denial of Service Attack and IP Traceback Scheme,TP393.08

CLC: > Industrial Technology > Automation technology,computer technology > Computing technology,computer technology > Computer applications > Computer network > General issues > Computer Network Security
© 2012 www.DissertationTopic.Net  Mobile