Welcome to Scribd, the world's digital library. Read, publish, and share books and documents. See more
Download
Standard view
Full view
of .
Look up keyword or section
Like this
0Activity

Table Of Contents

Summary
Acknowledgements
1 Introduction
1.1 Research objectives
1.2 Research methodology
2 Claims
3.1 Related work
3.2 Strategic game model
3.2.1 An abstract view of the client-side puzzle approach
3.2.2 Defining the game: players, strategies, and payoffs
3.3 Solution of the game
3.3.1 Adaptive technique for puzzle level setting
3.4 Proposal for a client-side puzzle
3.4.2 Attack against the proposed puzzle and the protection against it
3.5 Summary
4.1 Motivation to protect SMTP servers against DoS attacks
4.2 Related work on SMTP performance measurements
4.3 DoS of SMTP servers
4.3.1 Definition of SMTP DoS
4.3.3 Benchmark methodology
4.3.4 MTA software under test
4.3.5 Hardware environment
4.3.6 Botnet architecture for testing
4.3.7 Phases of the measured process
4.4 Results
4.4.1 Generic SMTP throughput
4.4.2 Content filtering
4.5 Analysis of results of SMTP performance measurements
4.6 Conclusion on results of SMTP performance measurements
4.7 DoS front-end based on traffic measurements
4.8 DDoS front-end module
4.8.1 Traffic model and attack model
4.8.2 The module
4.8.3 Algorithms of the module
4.9 Analysis of the algorithms
4.9.1 Reliability Of Attack Detection
4.9.2 The Probability Of False Identification And The Problem Of Hiding
4.10 Attack detection with predefined error probability
4.11 Simulation results
4.11.1 Parameter setting
4.11.2 Simulation 1
4.11.3 Simulation 2
4.11.4 Selection of parameter r
4.12 Prototype application
4.13 Summary
5 Protection against DHA attacks
5.1 Motivation
5.2 Related work
5.3 Attack model: The optimal DHA attack
5.3.1 The DHA attack algorithms
5.3.2 Reasons to attack: The economy of the DHA
5.4 Analysis of the DHA attack Algorithms
5.5 Simulation of the attack algorithms
5.6 Countermeasure Against DHA
5.6.1 Host based protection
5.6.2 Network based protection method
5.6.3 Aging
5.7 Simulations on the proposed blacklist algorithms
5.7.1 Simulation 1: Different blacklist thresholds
5.7.2 Simulation 2: Different number of detectors
5.7.3 Simulation 3: False positives with different number of detectors
5.7.4 Simulation 4: False positives with different RBL threshold
5.7.6 Simulation 6: Simple aging
5.7.7 Simulation 7: Simple and A1 aging algorithm
5.8 Adaptive detection
5.8.1 Simulation 8: Adaptive detection
5.9 DHA Protection Prototype
5.9.1 Further applications of the results
5.10 Summary
6 Conclusion and outlook
The author’s publications in the subject of the dissertation
List of Figures
Abbreviations
0 of .
Results for:
No results containing your search query
P. 1
Bencsath2009phd

Bencsath2009phd

Ratings: (0)|Views: 0|Likes:
Published by Aru Singh
benscath2009phd
benscath2009phd

More info:

Published by: Aru Singh on Aug 02, 2013
Copyright:Attribution Non-commercial

Availability:

Read on Scribd mobile: iPhone, iPad and Android.
download as PDF, TXT or read online from Scribd
See more
See less

08/02/2013

pdf

text

original

You're Reading a Free Preview
Pages 4 to 28 are not shown in this preview.
You're Reading a Free Preview
Pages 30 to 100 are not shown in this preview.

You're Reading a Free Preview

Download
scribd
/*********** DO NOT ALTER ANYTHING BELOW THIS LINE ! ************/ var s_code=s.t();if(s_code)document.write(s_code)//-->