A PRECISE TERMINATION CONDITION OF THE PROBALASTIC PACKET MARKING ALGORITHM
Thread Rating:
  • 0 Vote(s) - 0 Average
  • 1
  • 2
  • 3
  • 4
  • 5
computer science crazy
Super Moderator
******

Posts: 3,048
Joined: Dec 2008
#1
17-09-2009, 10:04 PM


A PRECISE TERMINATION CONDITION OF THE PROBALASTIC PACKET MARKING ALGORITHM

Abstract: The probabilistic packet marking (PPM) algorithm is a promising way to discover the Internet map or an attack graph that the attack packets traversed during a distributed denial-of-service attack. However, the PPM algorithm is not perfect, as its termination condition is not well defined in the literature. More importantly, without a proper termination condition, the attack graph constructed by the PPM algorithm would be wrong. In this work, we provide a precise termination condition for the PPM algorithm and name the new algorithm the Rectified PPM (RPPM) algorithm. The most significant merit of the RPPM algorithm is that when the algorithm terminates, the algorithm guarantees that the constructed attack graph is correct, with a specified level of confidence. We carry out simulations on the RPPM algorithm and show that the RPPM algorithm can guarantee the correctness of the constructed attack graph under 1) different probabilities that a router marks the attack packets and 2) different structures of the network graph. The RPPM algorithm provides an autonomous way for the original PPM algorithm to determine its termination, and it is a promising means of enhancing the reliability of the PPM algorithm.
Use Search at http://topicideas.net/search.php wisely To Get Information About Project Topic and Seminar ideas with report/source code along pdf and ppt presenaion
Reply

Important Note..!

If you are not satisfied with above reply ,..Please

ASK HERE

So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page

Quick Reply
Message
Type your reply to this message here.


Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Possibly Related Threads...
Thread Author Replies Views Last Post
  A New Approach to Radio Astronomy Signal Processing: Packet Switched study tips 0 424 01-07-2013, 04:24 PM
Last Post: study tips
  DTMF Tone Generation and Detection Using Goertzel Algorithm study tips 0 261 25-06-2013, 12:59 PM
Last Post: study tips
  Adaptive Notch Filter for EEG Signals Based on the LMS Algorithm with Variable pdf study tips 0 408 21-06-2013, 04:55 PM
Last Post: study tips
  Design and Implementation of Fast Fourier Transform Algorithm in FPGA pdf study tips 0 335 06-06-2013, 03:06 PM
Last Post: study tips
  Rate Control Algorithm for High Quality Compression of Static Test Pattern study tips 0 274 10-05-2013, 03:19 PM
Last Post: study tips
  Condition Monitoring of Machine Tools and Machining Processes using Internal Sensor study tips 0 456 06-03-2013, 02:08 PM
Last Post: study tips
  DROWSY DETECTION ON EYE BLINK DURATION USING ALGORITHM study tips 0 348 05-03-2013, 02:09 PM
Last Post: study tips
  DENOISING ECG SIGNAL USING ADAPTIVE FILTER ALGORITHM PPT study tips 0 823 27-02-2013, 12:20 PM
Last Post: study tips
  Wheelchair Motion Control Guide Using Eye Gaze and Blinks Based on PointBug Algorithm project girl 0 696 31-01-2013, 09:42 AM
Last Post: project girl
  An Accelerometer-Based Digital Pen With a Trajectory Recognition Algorithm project girl 2 1,316 28-01-2013, 09:34 AM
Last Post: seminar tips