Please use this identifier to cite or link to this item: http://localhost:8081/xmlui/handle/123456789/12087
Full metadata record
DC FieldValueLanguage
dc.contributor.authorParachikapu, Krishna-
dc.date.accessioned2014-11-29T06:14:20Z-
dc.date.available2014-11-29T06:14:20Z-
dc.date.issued2009-
dc.identifierM.Techen_US
dc.identifier.urihttp://hdl.handle.net/123456789/12087-
dc.guideSarje, A. K.-
dc.description.abstractToday, Internet is the prime medium for communication and is the most sought after service by innumerable amount of users across the globe. At the same time, its commercial nature is causing increasing vulnerability to cyber crimes and there has been an enormous increase in the number of DDoS attacks on the internet over the past decade. Network resources such as network bandwidth, web servers and network switches are mostly the victims of many attacks. Current internet architecture allows the attacker to spoof the source address of the IP packet by rewriting the packet header. This gives provision to conceal the identity of the source of attack. IP spoofing is the most popular form of Distributed Denial of Service attack. A large number of schemes have been proposed and implemented for the defense against DDoS attacks. Some defend the attack by filtering and dropping packets and some defend the attack by tracing back to the source of attack after experiencing it. Both the mechanisms have their own drawbacks. In this dissertation "A HYBRID APPROACH TO FILTER AND TRACEBACK IP-SPOOFED PACKETS IN DDoS ATTACKS", we propose a hybrid packet marking mechanism to overcome the short comings of the above methods. This mechanism filters out the IP-spoofed packets and simultaneously traces back to the source of attack. Two different mechanisms for traceback are developed, one is using Bloom filters and another is by using Probabilistic Packet Marking strategy. In the proposed strategy, packet marking can be done at intermediate routers. Each packet is marked in two areas where one mark is used in filtering process and another is used in traceback process. The proposed scheme has been simulated using JAVA based HST (Java In Simulation Time) Simulator. Various test cases have been thought of, for which simulations were performed by varying different parameters. The results are compared with the existing schemes and filially, conclusions are presented.en_US
dc.language.isoenen_US
dc.subjectELECTRONICS AND COMPUTER ENGINEERINGen_US
dc.subjectHYBRIDen_US
dc.subjectFILTER AND TRACEBACKen_US
dc.subjectIP-SPOOFED PACKETSen_US
dc.titleA HYBRID APPROACH TO FILTER AND TRACEBACK IP-SPOOFED PACKETS IN DDoS ATTACKSen_US
dc.typeM.Tech Dessertationen_US
dc.accession.numberG14632en_US
Appears in Collections:MASTERS' THESES (E & C)

Files in This Item:
File Description SizeFormat 
ECDG14632.pdf3.06 MBAdobe PDFView/Open


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.