NOTE: This item is not available outside the Texas A&M University network. Texas A&M affiliated users who are off campus can access the item through NetID and password authentication or by using TAMU VPN. Non-affiliated individuals should request a copy through their local library's interlibrary loan service.
Mitigating Denial of Service using QoS regulation
dc.creator | Garg, Aman | |
dc.date.accessioned | 2012-06-07T23:04:26Z | |
dc.date.available | 2012-06-07T23:04:26Z | |
dc.date.created | 2001 | |
dc.date.issued | 2001 | |
dc.identifier.uri | https://hdl.handle.net/1969.1/ETD-TAMU-2001-THESIS-G3714 | |
dc.description | Due to the character of the original source materials and the nature of batch digitization, quality control issues may be present in this document. Please report any quality issues you encounter to digital@library.tamu.edu, referencing the URI of the item. | en |
dc.description | Includes bibliographical references (leaves 55-59). | en |
dc.description | Issued also on microfiche from Lange Micrographics. | en |
dc.description.abstract | As more and more critical services are provided over the Internet, the risk to these services from malicious users is also increasing. Several networks have witnessed problems like Denial of Service attacks over the recent past. Denial of Service attacks work by flooding a network, router or an end server with malicious packets and fooling the underlying system into believing that these malicious packets were legitimate. An excess of these packets can cause overload conditions in the network and on the end servers. The purpose of this research is to provide an efficient way to keep track of server and network resources in an attempt to mitigate the effect of such attacks. Our scheme provides a general, and not attack specific, mechanism to provide graceful server degradation in the face of such an attack. Our solution is based on two seemingly different paradigms -- Denial of Service, and Quality of Service. The solution has two parts. The first part is to maintain sufficient state information per resource in the network layer, so as to be able to get a high-level picture of current network behavior and resource consumption status. The second part is a policing or enforcing mechanism which can regulate resource consumption and recover excess resources if they are believed to be held by malicious flows. A Window Regulation based scheme is proposed and implemented to do the regulation of traffic. It is shown that this scheme works better than conventional rate-based QoS regulation. | en |
dc.format.medium | electronic | en |
dc.format.mimetype | application/pdf | |
dc.language.iso | en_US | |
dc.publisher | Texas A&M University | |
dc.rights | This thesis was part of a retrospective digitization project authorized by the Texas A&M University Libraries in 2008. Copyright remains vested with the author(s). It is the user's responsibility to secure permission from the copyright holder(s) for re-use of the work beyond the provision of Fair Use. | en |
dc.subject | computer engineering. | en |
dc.subject | Major computer engineering. | en |
dc.title | Mitigating Denial of Service using QoS regulation | en |
dc.type | Thesis | en |
thesis.degree.discipline | computer engineering | en |
thesis.degree.name | M.S. | en |
thesis.degree.level | Masters | en |
dc.type.genre | thesis | en |
dc.type.material | text | en |
dc.format.digitalOrigin | reformatted digital | en |
Files in this item
This item appears in the following Collection(s)
-
Digitized Theses and Dissertations (1922–2004)
Texas A&M University Theses and Dissertations (1922–2004)
Request Open Access
This item and its contents are restricted. If this is your thesis or dissertation, you can make it open-access. This will allow all visitors to view the contents of the thesis.