A PRECISE TERMINATION CONDITION OF THE PROBALASTIC PACKET MARKING ALGORITHM
#1

A PRECISE TERMINATION CONDITION OF THE PROBALASTIC PACKET MARKING ALGORITHM

Abstract: The probabilistic packet marking (PPM) algorithm is a promising way to discover the Internet map or an attack graph that the attack packets traversed during a distributed denial-of-service attack. However, the PPM algorithm is not perfect, as its termination condition is not well defined in the literature. More importantly, without a proper termination condition, the attack graph constructed by the PPM algorithm would be wrong. In this work, we provide a precise termination condition for the PPM algorithm and name the new algorithm the Rectified PPM (RPPM) algorithm. The most significant merit of the RPPM algorithm is that when the algorithm terminates, the algorithm guarantees that the constructed attack graph is correct, with a specified level of confidence. We carry out simulations on the RPPM algorithm and show that the RPPM algorithm can guarantee the correctness of the constructed attack graph under 1) different probabilities that a router marks the attack packets and 2) different structures of the network graph. The RPPM algorithm provides an autonomous way for the original PPM algorithm to determine its termination, and it is a promising means of enhancing the reliability of the PPM algorithm.
Reply

Important Note..!

If you are not satisfied with above reply ,..Please

ASK HERE

So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page
Popular Searches: probabilistic packet marking algorithm ppt, condition code 44, a precise termination condition abstract, termination procedures and the, evs project marking scheme, condition education, road marking aa6 and y3,

[-]
Quick Reply
Message
Type your reply to this message here.

Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Possibly Related Threads...
Thread Author Replies Views Last Post
  CONTENT DEPENDENT WATER MARKING SCHEME FOR SPEECH SIGNAL seminar class 3 2,430 04-05-2015, 03:15 PM
Last Post: seminar report asees
  High Speed Downlink Packet Access (HSDPA) – A Means of Increasing Downlink Capacity smart paper boy 1 1,538 08-12-2012, 02:45 PM
Last Post: seminar details
  DETECTING MALICIOUS PACKET LOSSES seminar class 1 2,114 01-02-2012, 10:05 AM
Last Post: seminar addict
  ODAM: An Optimized Distributed Association Rule Mining Algorithm computer science crazy 5 3,394 23-01-2012, 11:56 AM
Last Post: seminar addict
  quantum cost optimization algorithm full report computer science crazy 0 892 16-01-2012, 06:02 PM
Last Post: computer science crazy
  Simulation of Dijkstra Routing Algorithm full report project topics 2 3,826 30-11-2011, 10:22 PM
Last Post: VickyBujju
  An Adaptive Algorithm for Incremental Mining of Association Rules smart paper boy 0 1,031 30-08-2011, 09:38 AM
Last Post: smart paper boy
  A Time-Varying Convergence Parameter for the LMS Algorithm in the Presence of White smart paper boy 0 934 19-08-2011, 10:37 AM
Last Post: smart paper boy
  Supporting POP and IMAP in Pick Packet smart paper boy 0 770 11-08-2011, 10:33 AM
Last Post: smart paper boy
  An Adaptive K-means Clustering Algorithm for Breast Image Segmentation smart paper boy 0 1,146 29-07-2011, 02:19 PM
Last Post: smart paper boy

Forum Jump: