File:A method for mitigating denial of service attacks on differentiated services networks (IA amethodformitiga109459798).pdf
Original file (1,275 × 1,650 pixels, file size: 334 KB, MIME type: application/pdf, 102 pages)
Captions
Summary edit
A method for mitigating denial of service attacks on differentiated services networks ( ) | |
---|---|
Author |
Braun, Matthew J. |
Title |
A method for mitigating denial of service attacks on differentiated services networks |
Publisher |
Monterey, California: Naval Postgraduate School, 2002. |
Description |
This thesis presents a method for countering Denial of Service (DoS) attacks in networks that provide Quality of Service (QoS) guarantees using Differentiated Service (DiffServ). This approach uses feedback from the DiffServ provider to initiate packet signing at the source. The signature allows the DiffServ provider to distinguish valid packets from malicious packets. This mechanism can also be used to provide key management for other digital signature methods, such as the Internet Protocol Authentication Header (IP AH). However, unlike other methods, our solution requires no encryption or cryptographic processing on a per-packet basis. Instead, it utilizes the sender's ability to alter its packet signatures faster than the attacker can duplicate the changes. This method also avoids the fragmentation and decreased throughput associated with increased packet size of IP AH through use of existing fields in the IP header. This method results in a significant reduction in valid packets that are dropped during a DoS attack. Thus, a DiffServ provider would be able to maintain QoS guarantees during an attack without incurring the overhead associated with cryptographic signatures. A C++ implementation of this DoS countermeasure for the ns2 network simulator and the experimental simulation scripts are included as appendices. Subjects: Computers |
Language | English |
Publication date | September 2002 |
Current location |
IA Collections: navalpostgraduateschoollibrary; fedlink |
Accession number |
amethodformitiga109459798 |
Source | |
Permission (Reusing this file) |
This publication is a work of the U.S. Government as defined in Title 17, United States Code, Section 101. As such, it is in the public domain, and under the provisions of Title 17, United States Code, Section 105, it may not be copyrighted |
Licensing edit
Public domainPublic domainfalsefalse |
This work is in the public domain in the United States because it is a work prepared by an officer or employee of the United States Government as part of that person’s official duties under the terms of Title 17, Chapter 1, Section 105 of the US Code.
Note: This only applies to original works of the Federal Government and not to the work of any individual U.S. state, territory, commonwealth, county, municipality, or any other subdivision. This template also does not apply to postage stamp designs published by the United States Postal Service since 1978. (See § 313.6(C)(1) of Compendium of U.S. Copyright Office Practices). It also does not apply to certain US coins; see The US Mint Terms of Use.
|
||
This file has been identified as being free of known restrictions under copyright law, including all related and neighboring rights. |
https://creativecommons.org/publicdomain/mark/1.0/PDMCreative Commons Public Domain Mark 1.0falsefalse
File history
Click on a date/time to view the file as it appeared at that time.
Date/Time | Thumbnail | Dimensions | User | Comment | |
---|---|---|---|---|---|
current | 04:56, 14 July 2020 | 1,275 × 1,650, 102 pages (334 KB) | Fæ (talk | contribs) | FEDLINK - United States Federal Collection amethodformitiga109459798 (User talk:Fæ/IA books#Fork8) (batch 1993-2020 #6099) |
You cannot overwrite this file.
File usage on Commons
The following page uses this file:
Metadata
This file contains additional information such as Exif metadata which may have been added by the digital camera, scanner, or software program used to create or digitize it. If the file has been modified from its original state, some details such as the timestamp may not fully reflect those of the original file. The timestamp is only as accurate as the clock in the camera, and it may be completely wrong.
Short title | A method for mitigating denial of service attacks on differentiated services networks |
---|---|
Author | Braun, Matthew J. |
Software used | Braun, Matthew J. |
Conversion program | Acrobat PDFWriter 5.0 for Windows NT |
Encrypted | no |
Page size | 612 x 792 pts (letter) |
Version of PDF format | 1.4 |