Enhanced IP spoofing defense through clustered interdomain packet filtering strategy
In current Internet communication world, validity of the source of Internet Protocol packet is an important issue. The problems of IP spoofing alarm legitimate users of the Internet. Various spoofing defenses techniques and mechanisms are proposed by researchers, among which, Interdomain Packet Filt...
| Auteur principal: | |
|---|---|
| Format: | Thèse |
| Langue: | anglais anglais |
| Publié: |
2011
|
| Sujets: | |
| Accès en ligne: | http://psasir.upm.edu.my/id/eprint/27379/1/FSKTM%202011%2018R.pdf |
| _version_ | 1846215182151319552 |
|---|---|
| author | Lee, Soon |
| author_facet | Lee, Soon |
| author_sort | Lee, Soon |
| description | In current Internet communication world, validity of the source of Internet Protocol packet is an important issue. The problems of IP spoofing alarm legitimate users of the Internet. Various spoofing defenses techniques and mechanisms are proposed by researchers, among which, Interdomain Packet Filter (IDPF) architecture proposed by Duan, et al. is promising. Based on the information from Border Gateway Protocol (BGP), IDPF is constructed. Filtering nodes are chosen based on vertex cover of the graph. This thesis presents a clustered strategy for selection of filtering nodes for IDPF architecture. Clusters of filtering nodes are chosen from the Autonomous System with highest number degree. Through analysis and simulation, the effectiveness of IDPF with Clustered Filtering was measured. The work presented here has profound implications for future studies of IP spoofing defense under IDPF. |
| format | Thesis |
| id | oai:psasir.upm.edu.my:27379 |
| institution | Universiti Putra Malaysia |
| language | English English |
| publishDate | 2011 |
| record_format | eprints |
| spelling | oai:psasir.upm.edu.my:273792014-02-26T05:04:54Z http://psasir.upm.edu.my/id/eprint/27379/ Enhanced IP spoofing defense through clustered interdomain packet filtering strategy Lee, Soon In current Internet communication world, validity of the source of Internet Protocol packet is an important issue. The problems of IP spoofing alarm legitimate users of the Internet. Various spoofing defenses techniques and mechanisms are proposed by researchers, among which, Interdomain Packet Filter (IDPF) architecture proposed by Duan, et al. is promising. Based on the information from Border Gateway Protocol (BGP), IDPF is constructed. Filtering nodes are chosen based on vertex cover of the graph. This thesis presents a clustered strategy for selection of filtering nodes for IDPF architecture. Clusters of filtering nodes are chosen from the Autonomous System with highest number degree. Through analysis and simulation, the effectiveness of IDPF with Clustered Filtering was measured. The work presented here has profound implications for future studies of IP spoofing defense under IDPF. 2011-09 Thesis NonPeerReviewed application/pdf en http://psasir.upm.edu.my/id/eprint/27379/1/FSKTM%202011%2018R.pdf Lee, Soon (2011) Enhanced IP spoofing defense through clustered interdomain packet filtering strategy. Masters thesis, Universiti Putra Malaysia. Computer network protocols - Security measures BGP (Computer network protocol) English |
| spellingShingle | Computer network protocols - Security measures BGP (Computer network protocol) Lee, Soon Enhanced IP spoofing defense through clustered interdomain packet filtering strategy |
| title | Enhanced IP spoofing defense through clustered interdomain packet filtering strategy |
| title_full | Enhanced IP spoofing defense through clustered interdomain packet filtering strategy |
| title_fullStr | Enhanced IP spoofing defense through clustered interdomain packet filtering strategy |
| title_full_unstemmed | Enhanced IP spoofing defense through clustered interdomain packet filtering strategy |
| title_short | Enhanced IP spoofing defense through clustered interdomain packet filtering strategy |
| title_sort | enhanced ip spoofing defense through clustered interdomain packet filtering strategy |
| topic | Computer network protocols - Security measures BGP (Computer network protocol) |
| url | http://psasir.upm.edu.my/id/eprint/27379/1/FSKTM%202011%2018R.pdf |
| url-record | http://psasir.upm.edu.my/id/eprint/27379/ |
| work_keys_str_mv | AT leesoon enhancedipspoofingdefensethroughclusteredinterdomainpacketfilteringstrategy |