語系:
繁體中文
English
說明(常見問題)
回圖書館首頁
手機版館藏查詢
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
Modeling, analysis and defense strat...
~
Kim, Jonghyun.
FindBook
Google Book
Amazon
博客來
Modeling, analysis and defense strategies against Internet attacks.
紀錄類型:
書目-電子資源 : Monograph/item
正題名/作者:
Modeling, analysis and defense strategies against Internet attacks./
作者:
Kim, Jonghyun.
面頁冊數:
141 p.
附註:
Source: Dissertation Abstracts International, Volume: 66-01, Section: B, page: 0365.
Contained By:
Dissertation Abstracts International66-01B.
標題:
Computer Science. -
電子資源:
http://pqdd.sinica.edu.tw/twdaoapp/servlet/advanced?query=3161634
ISBN:
9780496955060
Modeling, analysis and defense strategies against Internet attacks.
Kim, Jonghyun.
Modeling, analysis and defense strategies against Internet attacks.
- 141 p.
Source: Dissertation Abstracts International, Volume: 66-01, Section: B, page: 0365.
Thesis (Ph.D.)--The University of Oklahoma, 2005.
Many early Internet protocols were designed without a fundamentally secure infrastructure and hence vulnerable to attacks such as denial of service (DoS) attacks and worms. DoS attacks attempt to consume the resources of a remote host or network, thereby denying or degrading service to legitimate users. Network forensics is an emerging area wherein the source or the cause of the attacker is determined using IDS tools. The problem of finding the source(s) of attack(s) is called the "trace back problem". Lately, Internet worms have become a major problem for the security of computer networks, causing considerable amount of resources and time to be spent recovering from the disruption of systems. In addition to breaking down victims, these worms create large amounts of unnecessary network data traffic that results in network congestion, thereby affecting the entire network.
ISBN: 9780496955060Subjects--Topical Terms:
626642
Computer Science.
Modeling, analysis and defense strategies against Internet attacks.
LDR
:03110nmm 2200313 4500
001
1822392
005
20061129132702.5
008
130610s2005 eng d
020
$a
9780496955060
035
$a
(UnM)AAI3161634
035
$a
AAI3161634
040
$a
UnM
$c
UnM
100
1
$a
Kim, Jonghyun.
$3
1911538
245
1 0
$a
Modeling, analysis and defense strategies against Internet attacks.
300
$a
141 p.
500
$a
Source: Dissertation Abstracts International, Volume: 66-01, Section: B, page: 0365.
500
$a
Advisers: Sridhar Radhakrishnan; Sudarshan Dhall.
502
$a
Thesis (Ph.D.)--The University of Oklahoma, 2005.
520
$a
Many early Internet protocols were designed without a fundamentally secure infrastructure and hence vulnerable to attacks such as denial of service (DoS) attacks and worms. DoS attacks attempt to consume the resources of a remote host or network, thereby denying or degrading service to legitimate users. Network forensics is an emerging area wherein the source or the cause of the attacker is determined using IDS tools. The problem of finding the source(s) of attack(s) is called the "trace back problem". Lately, Internet worms have become a major problem for the security of computer networks, causing considerable amount of resources and time to be spent recovering from the disruption of systems. In addition to breaking down victims, these worms create large amounts of unnecessary network data traffic that results in network congestion, thereby affecting the entire network.
520
$a
In this dissertation, first we solve the trace back problem more efficiently in terms of the number of routers needed to complete the track back. We provide an efficient algorithm to decompose a network into connected components and construct a terminal network. We show that for a terminal network with n routers, the trace back can be completed in O(log n) steps.
520
$a
Second, we apply two classical epidemic SIS and SIR models to study the spread of Internet Worm. The analytical models that we provide are useful in determining the rate of spread and time required to infect a majority of the nodes in the network. Our simulation results on large Internet like topologies show that in a fairly small amount of time, 80% of the network nodes is infected.
520
$a
Third, we have analyzed the tradeoff between delay caused by filtering of worms at routers, and the delay due to worms' excessive amount of network traffic. We have used the optimal control problem, to determine the appropriate tradeoffs between these two delays for a given rate of a worm spreading. Using our technique we can minimize the overall network delay by finding the number of routers that should perform filtering and the time at which they should start the filtering process.
590
$a
School code: 0169.
650
4
$a
Computer Science.
$3
626642
690
$a
0984
710
2 0
$a
The University of Oklahoma.
$3
1021915
773
0
$t
Dissertation Abstracts International
$g
66-01B.
790
1 0
$a
Radhakrishnan, Sridhar,
$e
advisor
790
1 0
$a
Dhall, Sudarshan,
$e
advisor
790
$a
0169
791
$a
Ph.D.
792
$a
2005
856
4 0
$u
http://pqdd.sinica.edu.tw/twdaoapp/servlet/advanced?query=3161634
筆 0 讀者評論
館藏地:
全部
電子資源
出版年:
卷號:
館藏
1 筆 • 頁數 1 •
1
條碼號
典藏地名稱
館藏流通類別
資料類型
索書號
使用類型
借閱狀態
預約狀態
備註欄
附件
W9213255
電子資源
11.線上閱覽_V
電子書
EB
一般使用(Normal)
在架
0
1 筆 • 頁數 1 •
1
多媒體
評論
新增評論
分享你的心得
Export
取書館
處理中
...
變更密碼
登入