Welcome to Scribd. Sign in or start your free trial to enjoy unlimited e-books, audiobooks & documents.Find out more
Standard view
Full view
of .
Look up keyword or section
Like this

Table Of Contents

1 Introduction
1.1 Research objectives
2 Claims
3.1 Related work
3.2 Strategic game model
3.2.1 An abstract view of the client-side puzzle approach
3.2.2 Defining the game: players, strategies, and payoffs
3.3 Solution of the game
3.3.1 Adaptive technique for puzzle level setting
3.4 Proposal for a client-side puzzle
3.4.2 Attack against the proposed puzzle and the protection against it
3.5 Summary
4.1 Motivation to protect SMTP servers against DoS attacks
4.2 Related work on SMTP performance measurements
4.3 DoS of SMTP servers
4.3.1 Definition of SMTP DoS
4.3.3 Benchmark methodology
4.3.4 MTA software under test
4.3.5 Hardware environment
4.3.6 Botnet architecture for testing
4.3.7 Phases of the measured process
4.4 Results
4.4.1 Generic SMTP throughput
4.4.2 Content filtering
4.5 Analysis of results of SMTP performance measurements
4.6 Conclusion on results of SMTP performance measurements
4.7 DoS front-end based on traffic measurements
4.8 DDoS front-end module
4.8.1 Traffic model and attack model
4.8.2 The module
4.8.3 Algorithms of the module
4.9 Analysis of the algorithms
4.9.1 Reliability Of Attack Detection
4.9.2 The Probability Of False Identification And The Problem Of Hiding
4.10 Attack detection with predefined error probability
4.11 Simulation results
4.11.1 Parameter setting
4.11.2 Simulation 1
4.11.3 Simulation 2
4.11.4 Selection of parameter r
4.12 Prototype application
4.13 Summary
5 Protection against DHA attacks
5.1 Motivation
5.2 Related work
5.3 Attack model: The optimal DHA attack
5.3.1 The DHA attack algorithms
5.3.2 Reasons to attack: The economy of the DHA
5.4 Analysis of the DHA attack Algorithms
5.5 Simulation of the attack algorithms
5.6 Countermeasure Against DHA
5.6.1 Host based protection
5.6.2 Network based protection method
5.6.3 Aging
5.7 Simulations on the proposed blacklist algorithms
5.7.1 Simulation 1: Different blacklist thresholds
5.7.2 Simulation 2: Different number of detectors
5.7.3 Simulation 3: False positives with different number of detectors
5.7.4 Simulation 4: False positives with different RBL threshold
5.7.6 Simulation 6: Simple aging
5.7.7 Simulation 7: Simple and A1 aging algorithm
5.8 Adaptive detection
5.8.1 Simulation 8: Adaptive detection
5.9 DHA Protection Prototype
5.9.1 Further applications of the results
5.10 Summary
6 Conclusion and outlook
The author’s publications in the subject of the dissertation
List of Figures
0 of .
Results for:
No results containing your search query
P. 1


Ratings: (0)|Views: 0|Likes:
Published by Aru Singh

More info:

Published by: Aru Singh on Aug 02, 2013
Copyright:Attribution Non-commercial


Read on Scribd mobile: iPhone, iPad and Android.
download as PDF, TXT or read online from Scribd
See more
See less





You're Reading a Free Preview
Pages 4 to 11 are not shown in this preview.
You're Reading a Free Preview
Pages 15 to 27 are not shown in this preview.
You're Reading a Free Preview
Pages 31 to 100 are not shown in this preview.

You're Reading a Free Preview

/*********** DO NOT ALTER ANYTHING BELOW THIS LINE ! ************/ var s_code=s.t();if(s_code)document.write(s_code)//-->