Dissertation > Excellent graduate degree dissertation topics show

Denial of service attacks IP traceback technology research

Author: TangJun
Tutor: FeiYaoPing
School: Central South University
Course: Applied Computer Technology
Keywords: Denial of Service Attack IP Tracking Probabilistic Packet Marking Router interface ID tag
CLC: TP393.08
Type: Master's thesis
Year: 2008
Downloads: 159
Quote: 3
Read: Download Dissertation

Abstract


Denial of service (Denial-of-Service, DoS) attacks because easy to implement , difficult to guard , difficult to track , network security has become one of the issues most difficult to resolve . IP tracking to locate the source of the attack is a proactive defense technology , quickly and accurately locate attack source for real-time blocking or quarantine attack provided favorable conditions , can provide legal proof , deter attackers , thereby improving network security . Therefore , IP tracing DoS attack has become the most important defense research is one of the most critical issues . DoS attacks around the issues of IP traceback depth study and discussion. Two new remedy proposed probabilistic packet marking IP traceback : Non- mandatory compensate probabilistic packet marking method and record-based probabilistic packet marking method to make up . Improved IP header tag field and tag content ; in the tag strategy, were thinking of using a non-mandatory marking and use of record table thinking on the re-marking caused by the loss of the remaining probabilities were offset ; while using network topology verification IP address legitimacy. Solved due to packet duplication marks caused by the \Theoretical analysis and experimental results show that the basic package marking and advanced packet marking , the new program has the ideal convergence performance , false alarm rate and computational overhead . Router interface ID tag in the study based on the proposed relationship based on trust router interface ID labeling scheme . For using the IP address as the unique identifier for the router caused by low convergence, high computational overhead and false positives , as well as address spoofing attacks and other issues. Solve the basic router interface can not support the tag number is greater than 64 router interface problems . At the same time , for different routers to configure different trust factor by dividing the trusting domain trust factor to solve the problem of inter-domain tracking . In the border router dishonest or compromised circumstances, be able to quickly and accurately track the trust domain boundaries.

Related Dissertations

  1. Research on Countermeasures to Denial of Service Attack and IP Traceback Scheme,TP393.08
  2. Research on Probabilistic Packet Marking Based Intrusion Traceback Technology,TP393.08
  3. Dynamic - static combination of probabilistic packet marking technology,TP393.08
  4. Research and Implementation of Probability Packet Marking Based IP Traceback,TP393.08
  5. Research on IP Traceback under Denial of Service Attack,TP393.08
  6. Research on Probabilistic Packet Marking Algorithms in IP Traceback,TP393.07
  7. The Research on IP Traceback Based on Internet Control Message Protocol,TP393.04
  8. Research on IP Traceback Based on Probabilistic Packet Marking,TP393.08
  9. Based the packet marking DDoS initiative tracking model design,TP393.08
  10. Resilient False Data Detection Mechanisms in Wireless Sensor Networks,TN929.5
  11. Research on Attack Source Traceback in Distributed Denial-of-Service Attacks,TP393.08
  12. Design and Implementation of Special Network Security Policies,TP393.08
  13. Research on Probabilistic Packet Marking Algorithm for IP Traceback under Denial of Service Attack,TP393.08
  14. Against denial of service attacks Active Queue Management Algorithm,TP393.08
  15. A Method for Detecting Low-rate Denial of Service Attack,TP393.08
  16. Research on Defense Against TCP-based Distributed Denial-of-Service Attack,TP393.08
  17. The Research of Internet Traffic Control and Usability of Information,TP393.02
  18. DDoS attacks based on autonomous system follow-up study,TP393.08
  19. Research on Key Technology of VoIP Network Dfense,TN916.2
  20. Research for Source-Based DDoS Attacks Defense Method,TP393.08

CLC: > Industrial Technology > Automation technology,computer technology > Computing technology,computer technology > Computer applications > Computer network > General issues > Computer Network Security
© 2012 www.DissertationTopic.Net  Mobile