Important: Use custom search function to get better results from our thousands of pages

Use " " for compulsory search eg:"electronics seminar" , use -" " for filter something eg: "electronics seminar" -"/tag/" (used for exclude results from tag pages)


Tags: Flexible, Deterministic, Packet, MarkingAn, Traceback, System, Find, Real, source, Flexible Deterministic Packet MarkingAn IP Traceback System to Find the Real source of Attack, Flexible Deterministic Packet MarkingAn IP Traceback System to Find the Real source of Attack ppt, Flexible Deterministic Packet MarkingAn IP Traceback System to Find the Real source of Attack pdf, flexible deterministic packet marking, flexible deterministic packet marking ppt, flexible deterministic packet marking pdf,
 
 
Thread Rating:
  • 0 Votes - 0 Average
  • 1
  • 2
  • 3
  • 4
  • 5
Flexible Deterministic Packet Marking:An IP Traceback System to Find the Real source
Post: #1

Flexible Deterministic Packet Marking:An IP Traceback System to Find the Real source of Attacks

Abstract”Internet Protocol (IP) traceback is the enabling technology to control Internet crime. In this paper, we present a novel and practical IP traceback system called Flexible Deterministic Packet Marking (FDPM) which provides a defense system with the ability to find out the real sources of attacking packets that traverse through the network. While a number of other traceback schemes exist,FDPM provides innovative features to trace the source of IP packets and can obtain better tracing capability than others. In particular, FDPM adopts a flexible mark length strategy to make it compatible to different network environments; it also adaptively changes its marking rate according to the load of the participating router by a flexible flow-based marking scheme. Evaluations on both simulation and real system implementation demonstrate that FDPM requires a moderately small number of packets to complete the traceback process; add little additional load to routers and can trace a large number of sources in one traceback process with low false positive rates. The built-in overload prevention mechanism makes this system capable of achieving a satisfactory traceback result even when the router is heavily loaded. The motivation of this traceback system is from DDoS defense. It has been used to not only trace DDoS attacking packets but also enhance filtering attacking traffic. It has a wide array of applications for other security systems. Index Terms”DDoS attacks, IP traceback, performance evaluation, routers, security.


Presented By:
Yang Xiang, Member, IEEE, Wanlei Zhou, Member, IEEE, and Minyi Guo, Senior Member, IEEE


read full report

http://fabiestudents.cqu.edu.au/FCWViewe...o?id=23671
Post: #2
i want a Flexiable Deterministic Packet Marking (FDPM) project .u give an project explanation and the project source code.
Post: #3
ABSTRACT


Internet Protocol (IP) traceback is the enabling technology to control Internet crime. In this paper, we present a novel and practical IP traceback system called Flexible Deterministic Packet Marking (FDPM) which provides a defense system with the ability to find out the real sources of attacking packets that traverse through the network. While a number of other traceback schemes exist, FDPM provides innovative features to trace the source of IP packets and can obtain better tracing capability than others. In particular, FDPM adopts a flexible mark length strategy to make it compatible to different network environments; it also adaptively changes its marking rate according to the load of the participating router by a flexible flow-based marking scheme.

Evaluations on both simulation and real system implementation demonstrate that FDPM requires a moderately small number of packets to complete the traceback process; add little additional load to routers and can trace a large number of sources in one traceback process with low false positive rates. The built-in overload prevention mechanism makes this system capable of achieving a satisfactory traceback result even when the router is heavily loaded. The motivation of this traceback system is from DDoS defense. It has been used to not only trace DDoS attacking packets but also enhance filtering attacking traffic. It has a wide array of applications for other security systems.








Hardware specification
Processor Type : Pentium-IV
Speed : 2.4 GHZ
Ram : 256 MB RAM
Hard Disk : 80 GB HD


Software Specification
Operating System : Windows XP
Front End : JAVA Swing
Code Behind : JAVA
Database : SQL Server
Post: #4
can i get the code plz
Post: #5
Can U give me the source code in java please..Im waiting for that...
Post: #6
How can we show simulations for FDPM scheme?
How to identify the DOS attack by using simulations.
How to adjust the mark length?
In flow based marking scheme ,which values should be taken for Lmax,Lmin.
what is the packet size.


Attached File(s)
.pdf  fdpm[1].pdf (Size: 658.99 KB / Downloads: 86)
Post: #7
which value should be taken for the packet size?
Post: #8
plesse send document to my id shaik.fayas009[at]gmail.com
 

Marked Categories : fdpm java code download, fdpm code download, flexible de terministic packet marking, ppt on flexible deterministic packet marking an ip traceback system to find out real source of attacks, java code for ip traceback in network system, deterministic packet marking an ip trackback system to find the real source of attacks, java code for flexible deterministic packet marking ip traceback system find real source attacks, flexible deterministic packet marking an ip traceback system to find the real source of attacks pdf, java source code on project flexible deterministic packet marking, packet marking code java, java code to traceback the packet,

[-]
Quick Reply
Message
Type your reply to this message here.

Image Verification
Image Verification
(case insensitive)
Please enter the text within the image on the left in to the text box below. This process is used to prevent automated posts.

Possibly Related Threads...
Thread: Author Replies: Views: Last Post
  source code of wormhole attack effects through ids in manet for ns2 Guest 0 0 Yesterday 01:21 PM
Last Post: Guest
  project on intrusion detection system with full source code Guest 1 0 25-04-2017 04:54 PM
Last Post: jaseela123
  source code handwriting recognition in matlab Guest 0 0 23-04-2017 09:50 AM
Last Post: Guest
  kaleidoscope source code opengl mini project Guest 0 0 23-04-2017 08:56 AM
Last Post: Guest
  matlab source code for cartoon texture image decomposition Guest 0 0 22-04-2017 04:54 PM
Last Post: Guest
  school management software vb6 source code free download Guest 0 0 22-04-2017 02:12 PM
Last Post: Guest
  windmill mini project using opengl with source code Guest 0 0 21-04-2017 08:20 PM
Last Post: Guest
  project source code for genetic algorithm in matlab Guest 0 0 21-04-2017 02:18 PM
Last Post: Guest
  source code for aquarium in computer graphics using opengl Guest 2 0 21-04-2017 01:57 PM
Last Post: jaseela123
  voice based email for the blind project in java source code download Guest 1 0 21-04-2017 10:58 AM
Last Post: jaseela123
This Page May Contain What is Flexible Deterministic Packet Marking:An IP Traceback System to Find the Real source And Latest Information/News About Flexible Deterministic Packet Marking:An IP Traceback System to Find the Real source,If Not ...Use Search to get more info about Flexible Deterministic Packet Marking:An IP Traceback System to Find the Real source Or Ask Here

Options: