Scalable and efficient distributed algorithms for defending against malicious Internet activity
The threat of malicious Internet activities such as Distributed Denial of Service (DDoS) attacks, spam emails or Internet worms/viruses has been increasing in the last several years. The impact and frequency of these malicious activities are expected to grow unless they are properly addressed. In t...
Main Author: | |
---|---|
Format: | Others |
Language: | en_US |
Published: |
Georgia Institute of Technology
2007
|
Subjects: | |
Online Access: | http://hdl.handle.net/1853/14090 |
id |
ndltd-GATECH-oai-smartech.gatech.edu-1853-14090 |
---|---|
record_format |
oai_dc |
spelling |
ndltd-GATECH-oai-smartech.gatech.edu-1853-140902013-01-07T20:16:32ZScalable and efficient distributed algorithms for defending against malicious Internet activitySung, MinhoNetwork securityDDoS attackComputer networks Security measuresComputer networks MonitoringThe threat of malicious Internet activities such as Distributed Denial of Service (DDoS) attacks, spam emails or Internet worms/viruses has been increasing in the last several years. The impact and frequency of these malicious activities are expected to grow unless they are properly addressed. In this thesis, we propose to design and evaluate a set of practical and effective protection measures against potential malicious activities in current and future networks. Our research objective is twofold. First, we design the methods to defend against DDoS attacks. Our research focuses on two important issues related to DDoS attack defense mechanisms. One issue is the method to trace the sources of attacking packets, which is known as IP traceback. We propose a novel packet logging based (i.e., hash-based) traceback scheme using only a one-bit marking field in IP header. It reduces processing and storage cost by an order of magnitude than the existing hash-based schemes, and is therefore scalable to much higher link speed (e.g., OC-768). Next, we propose an improved traceback scheme with lower storage overhead by using more marking space in IP header. Another issue in DDoS defense is to investigate protocol-independent techniques for improving the throughput of legitimate traffic during DDoS attacks. We propose a novel technique that can effectively filter out the majority of DDoS traffic, thus improving the overall throughput of the legitimate traffic. Second, we investigate the problem of distributed network monitoring. We propose a set of novel distributed data streaming algorithms that allow scalable and efficient monitoring of aggregated traffic. Our algorithms target the specific network monitoring problem of finding common content in traffic traversing several nodes/links across the Internet. These algorithms find applications in network-wide intrusion detection, early warning for fast propagating worms, and detection of hot objects and spam traffic.Georgia Institute of Technology2007-03-27T18:22:17Z2007-03-27T18:22:17Z2006-07-31Dissertation1171870 bytesapplication/pdfhttp://hdl.handle.net/1853/14090en_US |
collection |
NDLTD |
language |
en_US |
format |
Others
|
sources |
NDLTD |
topic |
Network security DDoS attack Computer networks Security measures Computer networks Monitoring |
spellingShingle |
Network security DDoS attack Computer networks Security measures Computer networks Monitoring Sung, Minho Scalable and efficient distributed algorithms for defending against malicious Internet activity |
description |
The threat of malicious Internet activities
such as Distributed Denial of Service (DDoS) attacks, spam emails
or Internet worms/viruses has been increasing in the
last several years. The impact and frequency of these malicious
activities are expected to grow unless they are properly addressed.
In this thesis, we propose to design and evaluate a set of practical and
effective protection measures against potential malicious
activities in current and future networks. Our research objective is twofold.
First, we design the methods to defend against DDoS attacks.
Our research focuses on two important issues related to DDoS attack defense mechanisms.
One issue is the method to trace the sources of attacking packets, which is known as
IP traceback. We propose a novel packet logging based (i.e., hash-based) traceback
scheme using only a one-bit marking field in IP header.
It reduces processing and storage cost by an order of magnitude than the existing
hash-based schemes, and is therefore scalable to much higher link speed (e.g., OC-768).
Next, we propose an improved traceback scheme with lower storage overhead
by using more marking space in IP header.
Another issue in DDoS defense is to investigate protocol-independent techniques for
improving the throughput of legitimate traffic during DDoS attacks.
We propose a novel technique that can effectively filter out the majority of DDoS
traffic, thus improving the overall throughput of the legitimate traffic.
Second, we investigate the problem of distributed network monitoring.
We propose a set of novel distributed data streaming algorithms
that allow scalable and efficient monitoring of aggregated traffic.
Our algorithms target the specific network monitoring problem of
finding common content in traffic traversing several
nodes/links across the Internet. These algorithms find applications in
network-wide intrusion detection, early warning for fast propagating worms,
and detection of hot objects and spam traffic. |
author |
Sung, Minho |
author_facet |
Sung, Minho |
author_sort |
Sung, Minho |
title |
Scalable and efficient distributed algorithms for defending against malicious Internet activity |
title_short |
Scalable and efficient distributed algorithms for defending against malicious Internet activity |
title_full |
Scalable and efficient distributed algorithms for defending against malicious Internet activity |
title_fullStr |
Scalable and efficient distributed algorithms for defending against malicious Internet activity |
title_full_unstemmed |
Scalable and efficient distributed algorithms for defending against malicious Internet activity |
title_sort |
scalable and efficient distributed algorithms for defending against malicious internet activity |
publisher |
Georgia Institute of Technology |
publishDate |
2007 |
url |
http://hdl.handle.net/1853/14090 |
work_keys_str_mv |
AT sungminho scalableandefficientdistributedalgorithmsfordefendingagainstmaliciousinternetactivity |
_version_ |
1716474581592571904 |