Please use this identifier to cite or link to this item:
Title: Hybrid traceback-filtering (HTF): An efficient DoS/DDoS defense mechanism
Authors: WU YUHUI
Keywords: Denial of service, traceback, packet filtering, controlled flooding
Issue Date: 12-Mar-2005
Citation: WU YUHUI (2005-03-12). Hybrid traceback-filtering (HTF): An efficient DoS/DDoS defense mechanism. ScholarBank@NUS Repository.
Abstract: Denial of service attacks pose great threat to the Internet and many countermeasures have been proposed. However, few proposals address the issue of real time attack mitigation and minimizing false positive ratio and link bandwidth consumption. We propose a Hybrid Traceback-Filtering (HTF) mechanism to address these issues. By recursively activating the routers on the attack path to filter, HTF greatly improves the throughput of legitimate packets. Simulation results show that HTF drops 30% of bad packets at the start of the process and up to 100% when the traceback-filtering is completed. False positive ratio ranges from 15% to 0% at the beginning and end of the process respectively. Theoretical analysis shows that HTF saves link bandwidth consumption. For instances, when the bad packet traffic is 500 times that of the good ones, the link bandwidth consumption can be saved by more than 56%.
Appears in Collections:Master's Theses (Open)

Show full item record
Files in This Item:
File Description SizeFormatAccess SettingsVersion 
Wu Yuhui.pdf963.32 kBAdobe PDF



Page view(s)

checked on Jan 13, 2019


checked on Jan 13, 2019

Google ScholarTM


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.