Automated alerting for black hole routing
dc.contributor.advisor | Xie, Geoffrey | |
dc.contributor.advisor | Fulp, J. D. | |
dc.contributor.author | Puri, Vinay | |
dc.date.accessioned | 2012-03-14T17:37:46Z | |
dc.date.available | 2012-03-14T17:37:46Z | |
dc.date.issued | 2007-09 | |
dc.identifier.uri | http://hdl.handle.net/10945/3245 | |
dc.description.abstract | Distributed/Denial of Service (D/DoS) attacks are the most common and easy-tolaunch attacks against a computer or network. Once a D/DoS attack is recognized, there are several methods available to mitigate its impact. One of the methods is to drop the attacker's traffic at the edge of the network via Null Routing-also called Black Hole Routing (BHR). BHR is more efficient than the creation and processing of access control lists. Prior work has validated the effectiveness of BHR in mitigating D/DoS attacks in a setting where the defense is activated manually. This research built upon that work and developed a proof-of-concept automated BHR process integrated with Snort, an open source Intrusion Detection System (IDS), to facilitate a faster reaction to a D/DoS attack. A real test bed consisting of Cisco routers was created to evaluate the performance of the developed system. The results demonstrated that the automation of BHR is both possible and desirable in mitigating D/DoS attacks. | en_US |
dc.description.uri | http://archive.org/details/automatedlerting109453245 | |
dc.format.extent | xvi,121 p. : ill. ; | en_US |
dc.publisher | Monterey, California. Naval Postgraduate School | en_US |
dc.rights | This publication is a work of the U.S. Government as defined in Title 17, United States Code, Section 101. Copyright protection is not available for this work in the United States. | en_US |
dc.subject.lcsh | Computer science | en_US |
dc.subject.lcsh | Information warfare | en_US |
dc.title | Automated alerting for black hole routing | en_US |
dc.type | Thesis | en_US |
dc.contributor.corporate | Naval Postgraduate School (U.S.) | |
dc.description.service | Indian Air Force author. | en_US |
dc.identifier.oclc | 176914533 | |
etd.thesisdegree.name | M.S. | en_US |
etd.thesisdegree.level | Masters | en_US |
etd.thesisdegree.discipline | Information Warfare and M.S. in Computer Science | en_US |
etd.thesisdegree.grantor | Naval Postgraduate School | en_US |
etd.verified | no | en_US |
dc.description.distributionstatement | Approved for public release; distribution is unlimited. | |
dc.description.distributionstatement | Approved for public release; distribution is unlimited. |
Files in this item
This item appears in the following Collection(s)
-
1. Thesis and Dissertation Collection, all items
Publicly releasable NPS Theses, Dissertations, MBA Professional Reports, Joint Applied Projects, Systems Engineering Project Reports and other NPS degree-earning written works.