A PRECISE TERMINATION CONDITION OF THE PROBALASTIC PACKET MARKING ALGORITHM-DEPENDABL
Thread Rating:
  • 0 Vote(s) - 0 Average
  • 1
  • 2
  • 3
  • 4
  • 5
electronics seminars
Active In SP
**

Posts: 694
Joined: Nov 2009
#1
13-01-2010, 07:18 AM


A PRECISE TERMINATION CONDITION OF THE PROBALASTIC PACKET MARKING ALGORITHM-DEPENDABLE AND SECURE COMPUTING

Abstract: The probabilistic packet marking (PPM) algorithm is a promising way to discover the Internet map or an attack graph that the attack packets traversed during a distributed denial-of-service attack. However, the PPM algorithm is not perfect, as its termination condition is not well defined in the literature. More importantly, without a proper termination condition, the attack graph constructed by the PPM algorithm would be wrong. In this work, we provide a precise termination condition for the PPM algorithm and name the new algorithm the Rectified PPM (RPPM) algorithm. The most significant merit of the RPPM algorithm is that when the algorithm terminates, the algorithm guarantees that the constructed attack graph is correct, with a specified level of confidence. We carry out simulations on the RPPM algorithm and show that the RPPM algorithm can guarantee the correctness of the constructed attack graph under 1) different probabilities that a router marks the attack packets and 2) different structures of the network graph. The RPPM algorithm provides an autonomous way for the original PPM algorithm to determine its termination, and it is a promising means of enhancing the reliability of the PPM algorithm.
Technology to use:JAVA
Use Search at http://topicideas.net/search.php wisely To Get Information About Project Topic and Seminar ideas with report/source code along pdf and ppt presenaion
Reply
Eng_7
Active In SP
**

Posts: 1
Joined: May 2011
#2
19-05-2011, 03:45 AM

Hi,

Can you post the code for implementing PPM or attach it.

Many Thanks,
Eng.Mohd
Reply

Important Note..!

If you are not satisfied with above reply ,..Please

ASK HERE

So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page

Quick Reply
Message
Type your reply to this message here.


Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Possibly Related Threads...
Thread Author Replies Views Last Post
  Maximum Power Point Tracking using Perturb and Observe Algorithm For a PV System seminar flower 8 1,948 17-03-2015, 05:40 AM
Last Post: GT Racing
  Image Data Acquisition and compression using K-RLE Algorithm on Embedded ARM ppt seminar projects maker 0 616 28-09-2013, 04:36 PM
Last Post: seminar projects maker
  A Robust Image Watermarking Using Two Level DCT And Wavelet Packet Denoising PPT seminar projects maker 0 452 13-09-2013, 04:56 PM
Last Post: seminar projects maker
  Integer Wavelet Transform based Steganographic Method using OPA Algorithm pdf seminar projects maker 0 382 11-09-2013, 04:04 PM
Last Post: seminar projects maker
  A Time-based Cluster-Head Selection Algorithm for LEACH project girl 2 628 06-09-2013, 09:44 AM
Last Post: study tips
  Optimal Job Scheduling using Ant Colony Algorithm in Grid Computing PPT study tips 0 398 21-08-2013, 02:49 PM
Last Post: study tips
  AN ALGORITHM FOR WATERMARKING MOBILE PHONE COLOUR IMAGES USING BCH CODE pdf study tips 0 387 03-07-2013, 04:53 PM
Last Post: study tips
  Mining Closed Sequences with Constraint Based on BIDE Algorithm Report study tips 0 387 26-06-2013, 04:56 PM
Last Post: study tips
  IMPLEMENTING RSA ENCRYPTION ALGORITHM TO ENHANCE THE DATA SECURITY OF CLOUD study tips 0 400 24-06-2013, 04:56 PM
Last Post: study tips
  Comments on ‘‘A note on teaching–learning-based optimization algorithm’’ pdf study tips 0 402 20-06-2013, 04:40 PM
Last Post: study tips