dc.contributor.advisor | Mathuria, Anish M. | |
dc.contributor.author | Basha, Shaik Mahaboob | |
dc.date.accessioned | 2017-06-10T14:40:08Z | |
dc.date.available | 2017-06-10T14:40:08Z | |
dc.date.issued | 2012 | |
dc.identifier.citation | Basha, Shaik Mahaboob (2012). Improvement of RAD technique for detecting reflector based DoS attack. Dhirubhai Ambani Institute of Information and Communication Technology, xi, 56 p. (Acc.No: T00372) | |
dc.identifier.uri | http://drsr.daiict.ac.in/handle/123456789/409 | |
dc.description.abstract | Distributed Reflector Denial-of-service (DRDoS) attack is a challenging problem in present
Internet environment. DRDoS attack is entirely different when compared to DDoS attack. In
DRDoS attack, no need to generate the huge amount of traffic by attacker. Attacker can
initiate the multiple compromised hosts (zombies), they will generate the request traffic. The
innocent reflector generates the attack traffic. But from victim point of view it is very difficult
to find the attacker and attack traffic because actual attacker hides behind the legitimate
reflector. Many prevention systems have been proposed in DRDoS attack. All prevention
techniques have false negatives and false positive. Among all, Reflector Attack Defense
(RAD) technique is efficient one. But RAD technique has few limitations like replay attack and
passing the false request packets by core router. In this thesis work we enhance the RAD
technique in such a way that it will perform successful differentiation between the legitimate
traffic and attack traffic. Not only this, all previous proposals are only compatible with IPv4
only. They are not compatible with IPv6. Science IPv6 is usually to see widespread deployment in the future; we seek a solution that is also compatible with IPv6. So enhanced
prevention system will filter the DRDoS traffic efficiently and also work with IPv6. This thesis
shows the two different techniques to filter the attack traffic. One is filtering the attack traffic
at the client edge router; another one comes when the local filtering cannot handle the huge
attack traffic. Second technique filters the traffic at core of Internet by marking the packets
at Autonomous System level. | |
dc.publisher | Dhirubhai Ambani Institute of Information and Communication Technology | |
dc.subject | DRDoS | |
dc.subject | Distributed Reflector Denial-of-service | |
dc.subject | Reflector Attack Defense | |
dc.classification.ddc | 005.8 BAS | |
dc.title | Improvement of RAD technique for detecting reflector based DoS attack | |
dc.type | Dissertation | |
dc.degree | M. Tech | |
dc.student.id | 201011048 | |
dc.accession.number | T00372 | |