능력 토큰을 이용한 SYN 범람 공격 방어 프레임워크

DC Field Value Language
dc.contributor.advisor劉昇和, 金東圭-
dc.contributor.author금동수-
dc.date.accessioned2018-11-14T06:30:29Z-
dc.date.available2018-11-14T06:30:29Z-
dc.date.issued2005-08-
dc.identifier.other740-
dc.identifier.urihttps://dspace.ajou.ac.kr/handle/2018.oak/14701-
dc.description학위논문(석사)--亞洲大學校 情報通信專門大學院 정보통신전문대학원 :정보통신공학과,2005. 8-
dc.description.tableofcontents목차 제1장 서론 = 1 제2장 관련 연구 = 3 제1절 피해호스트 기반 필터링 방법 = 4 제1항 PI(Path identification) = 4 제2항 Hop-count Filtering = 6 제3항 Puzzle Auction = 7 제4항 SYN Cookie = 10 제2절 라우터 기반 패킷 필터링 = 12 제1항 Ingress Filtering = 12 제2항 Pushback = 13 제3항 SIFF(a Stateless Internet Flow Filter) = 15 제3장 제안하는 방법 = 19 제1절 디자인 = 22 제2절 해쉬 함수의 입력 변수 = 22 제4장 제안된 방법의 분석 = 23 제1절 고려사항 = 24 제5장 결론 = 26-
dc.language.isokor-
dc.publisherThe Graduate School, Ajou University-
dc.rights아주대학교 논문은 저작권에 의해 보호받습니다.-
dc.title능력 토큰을 이용한 SYN 범람 공격 방어 프레임워크-
dc.title.alternativeKim, Dongsoo-
dc.typeThesis-
dc.contributor.affiliation아주대학교 정보통신전문대학원-
dc.contributor.alternativeNameKim, Dongsoo-
dc.contributor.department정보통신전문대학원 정보통신공학과-
dc.date.awarded2005. 8-
dc.description.degreeMaster-
dc.identifier.localId564811-
dc.identifier.urlhttp://dcoll.ajou.ac.kr:9080/dcollection/jsp/common/DcLoOrgPer.jsp?sItemId=000000000740-
dc.description.alternativeAbstractNowadays, Internet infrastructure has quickly grown up. Additionally, DDoS attacks have been serious threat on Internet infrastructure ever since Internet was established. These attacks block and limit legitimate user’s access links against the intended services. The methods of these attacks are consuming the network resources or remote victim’s resources by flooding packets on the network. A characteristic of DDoS attacks is that the flooded attack packets are source IP spoofed packets. Attacker even can manipulate all the fields of IP header. Consequently by using IP spoofing technique, attackers can flood spoofed IP packets on Internet that consume limited Internet resources. It is hard to filer these attack packets because it is also hard to identify normal packets and attacks packets. The SYN flooding attacks disturb TCP / IP 3-way handshaking between normal user and victim host. SYN flooding attacks use weakness of TCP/IP protocol. These attacks are easy to implement and efficient to disturb services between normal users and victim hosts. In this paper, we proposed framework to cope with flooding based DDoS attacks. In our method, the victims can survive from DDoS flooding based attacks.-
Appears in Collections:
Special Graduate Schools > Graduate School of Information and Communication Technology > Department of Information and Communication > 3. Theses(Master)
Files in This Item:
There are no files associated with this item.

Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.

Browse