RISS 학술연구정보서비스

검색
다국어 입력

http://chineseinput.net/에서 pinyin(병음)방식으로 중국어를 변환할 수 있습니다.

변환된 중국어를 복사하여 사용하시면 됩니다.

예시)
  • 中文 을 입력하시려면 zhongwen을 입력하시고 space를누르시면됩니다.
  • 北京 을 입력하시려면 beijing을 입력하시고 space를 누르시면 됩니다.
닫기
    인기검색어 순위 펼치기

    RISS 인기검색어

      • PMS, 분산 서비스 거부 공격에 대한 방어 전략 : PMS, a NOBLE DEFENSIVE APPROACH AGAINST DDOS ATTACKS

        Usman Tariq 아주대학교 정보통신전문대학원 2006 국내석사

        RANK : 231999

        Distributed Denial of Service attack is a challenging threat to current internet world. Due to thousands of vulnerable machines connected to internet, hackers need little preparation to launch a highly destructive attack. Attacks can be easily downloaded and launched through these fertilized zombie machines. While defense mechanisms and trace back is highly inefficient due to high number of attack machines. Researchers and commercial organizations are putting all there efforts to deal with the DDoS attack problem but the problem is still unsolved. In this thesis we discussed the DDoS problem in two directions: 1) Cause of problem. 2) Design (architecture and implementation) of defense of DDoS problem which we named PMS that highly prevents the spoofed IP packets to consume legitimate internet bandwidth. In PMS, the packet is marked by the routers which come along the path to the destination. The packets traveling along the same path will have the same marking which will be dynamically changed after certain span of time. PMS can not only defend against the DDoS attack but also it can deal with the TCP hijacking and multicast source spoofing attacks. PMS defense mechanism just needs to identify only one malicious packet to identify the attack. PMS also supports incremental deployment which enhances its effectiveness against the DDoS attack. PMS scheme effectively defend the network from DDoS attack.

      • DACRA: A LIGHT WEIGHT HYBRID APPROACH to DEFEND against CRIPPLING ROUTING ATTACKS in WIRELESS SENSOR NETWORKS

        Tariq,Usman Ajou University 2010 국내박사

        RANK : 231983

        Ubiquitous wireless sensor networks are networks consisting of several small computers operational with sensors to discover events like human movement with infrared sensors or resolve the existing state of certain parameters like temperature. These sensor nodes are assembled with a radio to commune with each other and to broadcast data to a central computer where this data can be analyzed. These new sensing computing machines come with new challenges. To eliminate the limitations imposed by wires, sensors possess limited energy sources and correspond with neighboring nodes using wireless networks. Due to critical nature of applications, securing data generated in sensor field by sensors is important. While data security is necessary, the functionality cost in terms of routing and energy needs to be assessed carefully. Limited bandwidth and memory pull the trigger to make more sophisticated and light weight cryptography models. Moreover, deployment of tiny devices like sensor nodes in hostile environment, make it easier for intruder to budge in, plant attack node or control over the legitimate node to launch an attack. In this thesis, we have analyzed the basic threat model in ubiquitous wireless sensor network (USWN), and presented a quad tree based network portioning scheme, which ensure data accuracy at primary level. Each sensor node maintains neighboring table which stores the node information, our neighbor voting based defense solution helps to authenticate clear text broadcast of control packets. Once we have identified malicious node, our localization scheme can highlight the vulnerable node locality, even most of anchors are compromised. Localization scheme also helped us to strengthen defense against Sybil attack and wormhole attack. We analyze security of proposed scheme against Hello flood, data authentication attacks, node cloning attack and routing attacks. In the existing scenarios, where diverse security services are independent from each other, each service adds an additive communication overhead. By incorporating energy-concentrated security services that are regularly required in sensor network applications, we considerably decrease the energy.

      연관 검색어 추천

      이 검색어로 많이 본 자료

      활용도 높은 자료

      해외이동버튼