語系:
繁體中文
English
說明(常見問題)
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
Packet filter performance monitor (a...
~
ProQuest Information and Learning Co.
Packet filter performance monitor (anti-DDOS algorithm for hybrid topologies).
紀錄類型:
書目-語言資料,手稿 : Monograph/item
正題名/作者:
Packet filter performance monitor (anti-DDOS algorithm for hybrid topologies)./
作者:
Waziri, Ibrahim M., Jr.
面頁冊數:
1 online resource (126 pages)
附註:
Source: Dissertation Abstracts International, Volume: 78-05(E), Section: B.
Contained By:
Dissertation Abstracts International78-05B(E).
標題:
Computer science. -
電子資源:
click for full text (PQDT)
ISBN:
9781369286335
Packet filter performance monitor (anti-DDOS algorithm for hybrid topologies).
Waziri, Ibrahim M., Jr.
Packet filter performance monitor (anti-DDOS algorithm for hybrid topologies).
- 1 online resource (126 pages)
Source: Dissertation Abstracts International, Volume: 78-05(E), Section: B.
Thesis (Ph.D.)
Includes bibliographical references
DDoS attacks are increasingly becoming a major problem. According to Arbor Networks, the largest DDoS attack reported by a respondent in 2015 was 500 Gbps. Hacker News stated that the largest DDoS attack as of March 2016 was over 600 Gbps, and the attack targeted the entire BBC website.
Electronic reproduction.
Ann Arbor, Mich. :
ProQuest,
2018
Mode of access: World Wide Web
ISBN: 9781369286335Subjects--Topical Terms:
573171
Computer science.
Index Terms--Genre/Form:
554714
Electronic books.
Packet filter performance monitor (anti-DDOS algorithm for hybrid topologies).
LDR
:03638ntm a2200385Ki 4500
001
909649
005
20180426091042.5
006
m o u
007
cr mn||||a|a||
008
190606s2016 xx obm 000 0 eng d
020
$a
9781369286335
035
$a
(MiAaPQ)AAI10174093
035
$a
(MiAaPQ)purdue:20405
035
$a
AAI10174093
040
$a
MiAaPQ
$b
eng
$c
MiAaPQ
099
$a
TUL
$f
hyy
$c
available through World Wide Web
100
1
$a
Waziri, Ibrahim M., Jr.
$3
1180532
245
1 0
$a
Packet filter performance monitor (anti-DDOS algorithm for hybrid topologies).
264
0
$c
2016
300
$a
1 online resource (126 pages)
336
$a
text
$b
txt
$2
rdacontent
337
$a
computer
$b
c
$2
rdamedia
338
$a
online resource
$b
cr
$2
rdacarrier
500
$a
Source: Dissertation Abstracts International, Volume: 78-05(E), Section: B.
500
$a
Advisers: Victor Raskin; Julia Taylor.
502
$a
Thesis (Ph.D.)
$c
Purdue University
$d
2016.
504
$a
Includes bibliographical references
520
$a
DDoS attacks are increasingly becoming a major problem. According to Arbor Networks, the largest DDoS attack reported by a respondent in 2015 was 500 Gbps. Hacker News stated that the largest DDoS attack as of March 2016 was over 600 Gbps, and the attack targeted the entire BBC website.
520
$a
With this increasing frequency and threat, and the average DDoS attack duration at about 16 hours, we know for certain that DDoS attacks will not be going away anytime soon. Commercial companies are not effectively providing mitigation techniques against these attacks, considering that major corporations face the same challenges. Current security appliances are not strong enough to handle the overwhelming traffic that accompanies current DDoS attacks. There is also a limited research on solutions to mitigate DDoS attacks. Therefore, there is a need for a means of mitigating DDoS attacks in order to minimize downtime. One possible solution is for organizations to implement their own architectures that are meant to mitigate DDoS attacks.
520
$a
In this dissertation, we present and implement an architecture that utilizes an activity monitor to change the states of firewalls based on their performance in a hybrid network. Both firewalls are connected inline. The monitor is mirrored to monitor the firewall states. The monitor reroutes traffic when one of the firewalls become overwhelmed due to a HTTP DDoS flooding attack. The monitor connects to the API of both firewalls. The communication between the rewalls and monitor is encrypted using AES, based on PyCrypto Python implementation.
520
$a
This dissertation is structured in three parts. The first found the weakness of the hardware firewall and determined its threshold based on spike and endurance tests. This was achieved by flooding the hardware firewall with HTTP packets until the firewall became overwhelmed and unresponsive. The second part implements the same test as the first, but targeted towards the virtual firewall. The same parameters, test factors, and determinants were used; however a different load tester was utilized. The final part was the implementation and design of the firewall performance monitor. The main goal of the dissertation is to minimize downtime when network firewalls are overwhelmed as a result of a DDoS attack.
533
$a
Electronic reproduction.
$b
Ann Arbor, Mich. :
$c
ProQuest,
$d
2018
538
$a
Mode of access: World Wide Web
650
4
$a
Computer science.
$3
573171
650
4
$a
Information technology.
$3
559429
655
7
$a
Electronic books.
$2
local
$3
554714
690
$a
0984
690
$a
0489
710
2
$a
ProQuest Information and Learning Co.
$3
1178819
710
2
$a
Purdue University.
$b
Information Security.
$3
1180533
773
0
$t
Dissertation Abstracts International
$g
78-05B(E).
856
4 0
$u
http://pqdd.sinica.edu.tw/twdaoapp/servlet/advanced?query=10174093
$z
click for full text (PQDT)
筆 0 讀者評論
多媒體
評論
新增評論
分享你的心得
Export
取書館別
處理中
...
變更密碼[密碼必須為2種組合(英文和數字)及長度為10碼以上]
登入