An effective methodology to traceback DDoS attackers.
Lam, Kwok Tai. === Thesis (M.Phil.)--Chinese University of Hong Kong, 2003. === Includes bibliographical references (leaves 64-66). === Abstracts in English and Chinese. === Chapter 1 --- Introduction to Network Security via Efficient IP Traceback --- p.10 === Chapter 1.1 --- Motivation --- p.10 =...
Other Authors: | |
---|---|
Format: | Others |
Language: | English Chinese |
Published: |
2003
|
Subjects: | |
Online Access: | http://library.cuhk.edu.hk/record=b5891537 http://repository.lib.cuhk.edu.hk/en/item/cuhk-324239 |
Summary: | Lam, Kwok Tai. === Thesis (M.Phil.)--Chinese University of Hong Kong, 2003. === Includes bibliographical references (leaves 64-66). === Abstracts in English and Chinese. === Chapter 1 --- Introduction to Network Security via Efficient IP Traceback --- p.10 === Chapter 1.1 --- Motivation --- p.10 === Chapter 1.2 --- DDoS Attacker Traceback Problem --- p.11 === Chapter 1.3 --- Document Roadmap --- p.13 === Chapter 2 --- Background --- p.14 === Chapter 2.1 --- Probabilistic Edge Marking Algorithm --- p.14 === Chapter 2.1.1 --- Probabilistic Edge Marking Procedure --- p.15 === Chapter 2.1.2 --- Attack Graph Construction Procedure --- p.17 === Chapter 2.1.3 --- Advantages and Disadvantages of Algorithm --- p.19 === Chapter 3 --- Attacker Traceback: Linear Topology --- p.22 === Chapter 3.1 --- Determination of Local Traffic Rates --- p.23 === Chapter 3.2 --- Determination of Minimum Stable Time tmin --- p.25 === Chapter 3.3 --- Elimination of Attackers --- p.26 === Chapter 4 --- Attacker Traceback: General Topology --- p.30 === Chapter 4.1 --- Determination of Local Traffic Rates --- p.30 === Chapter 4.2 --- Determination of Minimum Stable Time tmin --- p.33 === Chapter 5 --- Simulations --- p.36 === Chapter 5.1 --- Simulation 1 - Correctness and robustness of estimating the min- imum stable time tmin --- p.37 === Chapter 5.1.1 --- Simulation l.A - Influence on tmin by different packet arrival processes --- p.37 === Chapter 5.1.2 --- Simulation l.B - Influence on tmin by different packet arrival processes under MMPP --- p.38 === Chapter 5.1.3 --- Simulation l.C - Influence on tmin and variance of traffic rate estimation by different pthreshold --- p.39 === Chapter 5.2 --- Simulation 2 - Factors which influence the minimum stable time tmin --- p.40 === Chapter 5.2.1 --- Simulation 2.A - Influence on tmin by different length of the attack path --- p.41 === Chapter 5.2.2 --- Simulation 2.B - Influence on tmin by the relative posi- tions of the attackers --- p.42 === Chapter 5.2.3 --- Simulation 2.C - Influence on tmin by different ATR and different length of the attack path --- p.43 === Chapter 5.3 --- Simulation 3 - Extension to General Network Topology --- p.45 === Chapter 5.3.1 --- Simulation 3.A - Influence on tmin by different ATR and different diameter of the network topology --- p.45 === Chapter 5.3.2 --- Simulation 3.B - Influence on tmin by different number of attackers --- p.46 === Chapter 5.4 --- Simulation 4 - Extension to Internet Topology --- p.47 === Chapter 5.4.1 --- Simulation 4.A - Influence on tminby different diameter of the network topology --- p.49 === Chapter 5.4.2 --- Simulation 4.B - Influence on tmin by different number of attackers --- p.50 === Chapter 6 --- Experiments --- p.51 === Chapter 6.1 --- Experiment 1: Simple DoS Attack --- p.53 === Chapter 6.1.1 --- Experiment l.A - Influence on tmin by different types of DDoS attack --- p.54 === Chapter 6.1.2 --- Experiment l.B - Influence on tmin by different length of the attack path --- p.55 === Chapter 6.2 --- Experiment 2: Coordinated DoS Attack --- p.55 === Chapter 6.2.1 --- Experiment 2.A - Influence on tmin by the relative posi- tions of the attackers --- p.56 === Chapter 6.2.2 --- Experiment 2.B - Influence on tmin by different number of attackers --- p.58 === Chapter 7 --- Related Work --- p.59 === Chapter 8 --- Conclusion --- p.62 === Bibliography --- p.64 |
---|