A PRECISE TERMINATION CONDITION OF THE PROBALASTIC PACKET MARKING ALGORITHM-DEPENDABL
#1

A PRECISE TERMINATION CONDITION OF THE PROBALASTIC PACKET MARKING ALGORITHM-DEPENDABLE AND SECURE COMPUTING

Abstract: The probabilistic packet marking (PPM) algorithm is a promising way to discover the Internet map or an attack graph that the attack packets traversed during a distributed denial-of-service attack. However, the PPM algorithm is not perfect, as its termination condition is not well defined in the literature. More importantly, without a proper termination condition, the attack graph constructed by the PPM algorithm would be wrong. In this work, we provide a precise termination condition for the PPM algorithm and name the new algorithm the Rectified PPM (RPPM) algorithm. The most significant merit of the RPPM algorithm is that when the algorithm terminates, the algorithm guarantees that the constructed attack graph is correct, with a specified level of confidence. We carry out simulations on the RPPM algorithm and show that the RPPM algorithm can guarantee the correctness of the constructed attack graph under 1) different probabilities that a router marks the attack packets and 2) different structures of the network graph. The RPPM algorithm provides an autonomous way for the original PPM algorithm to determine its termination, and it is a promising means of enhancing the reliability of the PPM algorithm.
Technology to use:JAVA
Reply
#2

Hi,

Can you post the code for implementing PPM or attach it.

Many Thanks,
Eng.Mohd
Reply

Important Note..!

If you are not satisfied with above reply ,..Please

ASK HERE

So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page
Popular Searches: watre marking vhdl code, pci express termination, probabilistic packet marking algorithmdeterministic, a precise termination condition, termination procedures and the, a precise termination condition of the probabiistic packet marking algorithm, embedded systems defense precise timing,

[-]
Quick Reply
Message
Type your reply to this message here.

Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Possibly Related Threads...
Thread Author Replies Views Last Post
  Packet-Hiding Methods for Preventing Selective Jamming Attacks 1 682 14-02-2017, 11:35 AM
Last Post: ijasti
  An Efficient Algorithm for Mining Frequent Patterns full report project topics 3 4,768 01-10-2016, 10:02 AM
Last Post: Guest
  watermarking algorithm seminar class 3 2,679 27-04-2016, 11:17 AM
Last Post: dhanabhagya
  DYNAMIC SEARCH ALGORITHM IN UNSTRUCTURED PEER-TO-PEER NETWORKS--PARALLEL AND DISTRIBU electronics seminars 9 7,372 14-07-2015, 02:25 PM
Last Post: seminar report asees
  TEA ENCRYPTION (ALGORITHM) computer science technology 1 2,659 11-11-2014, 10:45 AM
Last Post: Guest
  Packet-Hiding Methods for Preventing Selective Jamming Attacks Projects9 5 4,374 30-07-2013, 05:30 PM
Last Post: mounikabujji
  A TABU SEARCH ALGORITHM FOR CLUSTER BUILDING IN WIRELESS SENSOR NETWORKS- MOBILE COMP electronics seminars 1 2,064 01-12-2012, 12:06 PM
Last Post: seminar details
  A Tabu Search Algorithm for Cluster Building in Wireless Sensor Networks Electrical Fan 13 8,673 01-12-2012, 12:05 PM
Last Post: seminar details
  A ROBUST DIGITAL IMAGE WATERMARKING ALGORITHM USING DNA SEQUENCES smart paper boy 1 1,939 29-11-2012, 01:42 PM
Last Post: seminar details
  Medical image segmentation using clustering algorithm computer science technology 2 5,983 08-11-2012, 01:00 PM
Last Post: seminar details

Forum Jump: