| ชื่อเรื่อง | : | Simulation and analysis of DDos in active defense environment |
| นักวิจัย | : | Li, Zhongwen. , Xiang, Yang. , He, Dongsheng. |
| คำค้น | : | Computer networks , No affiliation. CQUniversity Research Institute , Computer simulation. , 700102 Application tools and system utilities. , 700399 Communication services not elsewhere classified , 280210 Simulation and Modelling , 280505 Data Security , 890202 Application Tools and System Utilities. , 8902 Computer Software and Services. , 89 Information and Communication Services. , 899999 Information and Communication Services not elsewhere classified. , 8999 Other Information and Communication Services. , 080110 Simulation and Modelling. , 0801 Artificial Intelligence and Image Processing. , 08 Information and Computing Sciences. , 080499 Data Format not elsewhere classified. , 0804 Data Format. , DDoS -- Security |
| หน่วยงาน | : | Central Queensland University, Australia |
| ผู้ร่วมงาน | : | - |
| ปีพิมพ์ | : | 2550 |
| อ้างอิง | : | http://hdl.cqu.edu.au/10018/5116 , http://acquire.cqu.edu.au:8080/vital/access/manager/Repository/cqu:2257 |
| ที่มา | : | Li, Z., Y. Xiang, & He, D 2007 Simulation and Analysis of DDos in Active Defense Environment, in Wang, Y, Cheung, Y-M & Liu, H (eds) 2007 Computational intelligence and security : international conference, CIS 2006, Guangzhou, China, November 3-6, 2006 : revised selected papers, Berlin, Springer, pp. 878-886, http://dx.doi.org/10.1007/978-3-540-74377-4_92 |
| ความเชี่ยวชาญ | : | - |
| ความสัมพันธ์ | : | Computational intelligence and security : international conference, CIS 2006, Guangzhou, China, November 3-6, 2006 : revised selected papers / Yuping Wang, Yiu-ming Cheung, Hailin Liu (eds.) Berlin : Springer, 2007. Chapter 92, p. 878-886 1118 pages 116 chapters 0302-9743 1611-3349 (online) 3540743766 9783540743767 , ACQUIRE [electronic resource] : Central Queensland University Institutional Repository. |
| ขอบเขตของเนื้อหา | : | - |
| บทคัดย่อ/คำอธิบาย | : | Currently there is very few data that can describe the whole profile of a DDoS attack. In this paper, the active DDoS defense system deploys a number of sub-systems, such as Flexible Deterministic Packet Marking (FDPM) and Mark-Aided Distributed Filtering (MADF). In addition, two DDoS tools, TFN2K and Trinoo, are adopted and integrated into SSFNet to create virtual DDoS networks to simulate the attacks. Then, simulation experiments are used to evaluate the performance of the active DDoS defense system. At last, we set up a model to describe the interactions between DDoS attack and defense party, which allows us to have a deep insight of the interactions between the attack and defense parties. Experiment results shows that the model can precisely estimate the defense effectiveness of the system when it encounters attacks. |
| บรรณานุกรม | : |
Li, Zhongwen. , Xiang, Yang. , He, Dongsheng. . (2550). Simulation and analysis of DDos in active defense environment.
กรุงเทพมหานคร : Central Queensland University, Australia. Li, Zhongwen. , Xiang, Yang. , He, Dongsheng. . 2550. "Simulation and analysis of DDos in active defense environment".
กรุงเทพมหานคร : Central Queensland University, Australia. Li, Zhongwen. , Xiang, Yang. , He, Dongsheng. . "Simulation and analysis of DDos in active defense environment."
กรุงเทพมหานคร : Central Queensland University, Australia, 2550. Print. Li, Zhongwen. , Xiang, Yang. , He, Dongsheng. . Simulation and analysis of DDos in active defense environment. กรุงเทพมหานคร : Central Queensland University, Australia; 2550.
|
