Scalable and efficient distributed algorithms for defending against malicious Internet activity

The threat of malicious Internet activities such as Distributed Denial of Service (DDoS) attacks, spam emails or Internet worms/viruses has been increasing in the last several years. The impact and frequency of these malicious activities are expected to grow unless they are properly addressed. In t...

Full description

Bibliographic Details
Main Author: Sung, Minho
Format: Others
Language:en_US
Published: Georgia Institute of Technology 2007
Subjects:
Online Access:http://hdl.handle.net/1853/14090
id ndltd-GATECH-oai-smartech.gatech.edu-1853-14090
record_format oai_dc
spelling ndltd-GATECH-oai-smartech.gatech.edu-1853-140902013-01-07T20:16:32ZScalable and efficient distributed algorithms for defending against malicious Internet activitySung, MinhoNetwork securityDDoS attackComputer networks Security measuresComputer networks MonitoringThe threat of malicious Internet activities such as Distributed Denial of Service (DDoS) attacks, spam emails or Internet worms/viruses has been increasing in the last several years. The impact and frequency of these malicious activities are expected to grow unless they are properly addressed. In this thesis, we propose to design and evaluate a set of practical and effective protection measures against potential malicious activities in current and future networks. Our research objective is twofold. First, we design the methods to defend against DDoS attacks. Our research focuses on two important issues related to DDoS attack defense mechanisms. One issue is the method to trace the sources of attacking packets, which is known as IP traceback. We propose a novel packet logging based (i.e., hash-based) traceback scheme using only a one-bit marking field in IP header. It reduces processing and storage cost by an order of magnitude than the existing hash-based schemes, and is therefore scalable to much higher link speed (e.g., OC-768). Next, we propose an improved traceback scheme with lower storage overhead by using more marking space in IP header. Another issue in DDoS defense is to investigate protocol-independent techniques for improving the throughput of legitimate traffic during DDoS attacks. We propose a novel technique that can effectively filter out the majority of DDoS traffic, thus improving the overall throughput of the legitimate traffic. Second, we investigate the problem of distributed network monitoring. We propose a set of novel distributed data streaming algorithms that allow scalable and efficient monitoring of aggregated traffic. Our algorithms target the specific network monitoring problem of finding common content in traffic traversing several nodes/links across the Internet. These algorithms find applications in network-wide intrusion detection, early warning for fast propagating worms, and detection of hot objects and spam traffic.Georgia Institute of Technology2007-03-27T18:22:17Z2007-03-27T18:22:17Z2006-07-31Dissertation1171870 bytesapplication/pdfhttp://hdl.handle.net/1853/14090en_US
collection NDLTD
language en_US
format Others
sources NDLTD
topic Network security
DDoS attack
Computer networks Security measures
Computer networks Monitoring
spellingShingle Network security
DDoS attack
Computer networks Security measures
Computer networks Monitoring
Sung, Minho
Scalable and efficient distributed algorithms for defending against malicious Internet activity
description The threat of malicious Internet activities such as Distributed Denial of Service (DDoS) attacks, spam emails or Internet worms/viruses has been increasing in the last several years. The impact and frequency of these malicious activities are expected to grow unless they are properly addressed. In this thesis, we propose to design and evaluate a set of practical and effective protection measures against potential malicious activities in current and future networks. Our research objective is twofold. First, we design the methods to defend against DDoS attacks. Our research focuses on two important issues related to DDoS attack defense mechanisms. One issue is the method to trace the sources of attacking packets, which is known as IP traceback. We propose a novel packet logging based (i.e., hash-based) traceback scheme using only a one-bit marking field in IP header. It reduces processing and storage cost by an order of magnitude than the existing hash-based schemes, and is therefore scalable to much higher link speed (e.g., OC-768). Next, we propose an improved traceback scheme with lower storage overhead by using more marking space in IP header. Another issue in DDoS defense is to investigate protocol-independent techniques for improving the throughput of legitimate traffic during DDoS attacks. We propose a novel technique that can effectively filter out the majority of DDoS traffic, thus improving the overall throughput of the legitimate traffic. Second, we investigate the problem of distributed network monitoring. We propose a set of novel distributed data streaming algorithms that allow scalable and efficient monitoring of aggregated traffic. Our algorithms target the specific network monitoring problem of finding common content in traffic traversing several nodes/links across the Internet. These algorithms find applications in network-wide intrusion detection, early warning for fast propagating worms, and detection of hot objects and spam traffic.
author Sung, Minho
author_facet Sung, Minho
author_sort Sung, Minho
title Scalable and efficient distributed algorithms for defending against malicious Internet activity
title_short Scalable and efficient distributed algorithms for defending against malicious Internet activity
title_full Scalable and efficient distributed algorithms for defending against malicious Internet activity
title_fullStr Scalable and efficient distributed algorithms for defending against malicious Internet activity
title_full_unstemmed Scalable and efficient distributed algorithms for defending against malicious Internet activity
title_sort scalable and efficient distributed algorithms for defending against malicious internet activity
publisher Georgia Institute of Technology
publishDate 2007
url http://hdl.handle.net/1853/14090
work_keys_str_mv AT sungminho scalableandefficientdistributedalgorithmsfordefendingagainstmaliciousinternetactivity
_version_ 1716474581592571904