際際滷

際際滷Share a Scribd company logo
THRESHOLD BASED KERNEL LEVEL
         HTTP FILTER (TBHF)
          for DDoS Mitigation
                             by
            MOHAMED IBRAHIM AK         82008132041
            LIJO GEORGE          82008132515
                        Dept. of CSE
                        TEC, Trichy

INTERNEL GUIDE                             EXTERNAL GUIDE
Mr. A. NARENTHIRA KUMAR                    Dr. S. SELVAKUMAR
Asst. Professor                             Professor
Dept. of CSE                               Dept. of CSE
TEC, Trichy                                NIT, Trichy
OUTLINE
           Abstract
           Insight into DDoS attack
           Existing and Proposed system
           Algorithm
           Modules
           TBHF Driver
           Technology
           Conclusion
           References

際際滷 2                   Dept. of CSE, TEC.   3 April 2012
Abstract
           Application layer attack

           Client Side Scripting

           High rate flooding attack

           No manifestation

           Data on the flow analysis

           Threshold based Decision Support System

           Vulnerability Status: Effective  Real time


際際滷 3                     Dept. of CSE, TEC.            3 April 2012
OUTLINE
   Abstract
   Insight into DDoS attack
   Existing and Proposed system
   Algorithm
   Modules
   TBHF Driver
   Technology
   Conclusion
   References

                  Dept. of CSE, TEC.   3 April 2012
DDoS attack - Actors
           Individuals

             Julian Assange - Wikileaks

           Blackhat underground community

             Anonymous, Lords of Dharmaraja

           Government sponsored

             China - GhostNet

             Israel - Stuxnet



際際滷 4                    Dept. of CSE, TEC.      3 April 2012
DDoS attack - Scenario
           Coordinated attack on a given target system

           through many compromised systems.

                                  Attacker

           Medium
                                                      
                    M1       M2            M3                 Mn
      Compromised
      Systems
              C          C    C                  C       C       C



                                         Target

際際滷 5                      Dept. of CSE, TEC.                    3 April 2012
DDoS attack - Analysis




際際滷 6       Dept. of CSE, TEC.   3 April 2012
DDoS attack - Timeline
           July 2011
             Live Journal Hit by Massive Cyber Attack
           March 2011 (Korean Websites)
             40 websites under DDoS attack
           February 2011 (Total Choice Hosting Network)
             7,00,000 packets per second
             600 Mbps
           January 2011
             FBI executed 40 search warrants for DDoS attacks
               Low Orbit Ion Cannon tool



際際滷 7                     Dept. of CSE, TEC.           3 April 2012
OUTLINE
   Abstract
   Insight into DDoS attack
   Existing and Proposed system
   Algorithm
   Modules
   TBHF Driver
   Technology
   Conclusion
   References

                  Dept. of CSE, TEC.   3 April 2012
Existing System
           Predominately in Server side

           Page access behaviour

           Captcha

           Black list

           Signature based detection




際際滷 8                   Dept. of CSE, TEC.   3 April 2012
Proposed System
           Client side

           Threshold based

           Real time

             Monitoring

             Detection

             Prevention

           Detects zero-day vulnerability


際際滷 9                    Dept. of CSE, TEC.   3 April 2012
OUTLINE
   Abstract
   Insight into DDoS attack
   Existing and Proposed system
   Algorithm
   Modules
   TBHF Driver
   Technology
   Conclusion
   References

                  Dept. of CSE, TEC.   3 April 2012
Algorithm
           1. Capture traffic:
            a.   Filter outbound TCP packets
            b.   Filter HTTP packets
            c.   if(packet type == GET)
                        Action == inspect;
            d.   else
                        Action == allow;
           2. Extract parameters:
            a.   remote IP
            b.   Time

際際滷 10                         Dept. of CSE, TEC.   3 April 2012
Algorithm Contd
           //r.addr1, r.addr2, , r.addri -> remote IP
           //T1, T2, , Ti -> packet time
           // t -> Time stamp
           3. Inspect:
            a.   If(r. addri not in array)
                   addr[i] = r.addri;
                   t[i] = Ti;
            b.   else if (r. addri in array && (T(i+1)  Ti)<=t)
                   r.count[i]++;
            c.   Else
                   Reset r.count[];

際際滷 11                           Dept. of CSE, TEC.           3 April 2012
Algorithm Contd
           //N -> Threshold value
           4. Decision Making:
            a.   If(r.count[i] >= N)
                   Action = allow packet;
            b.   else
                   Action = drop packet;




際際滷 12                       Dept. of CSE, TEC.   3 April 2012
Software Requirements
            Attacker end

              PHP (Front end)

              MySQL (Back end)

              WampServer 2.2a

            Analysis

              Wireshark

            Prevention

              Windows Filtering Platform (WFP)



際際滷 13                     Dept. of CSE, TEC.   3 April 2012
OUTLINE
   Abstract
   Insight into DDoS attack
   Existing and Proposed system
   Algorithm
   Modules
   TBHF Driver
   Technology
   Conclusion
   References

                  Dept. of CSE, TEC.   3 April 2012
Modules

                   Capture Traffic
                    Filter
                      Out Bound
                        TCP Packet
                          HTTP Packet
                            HTTP  GET  Packet


                   Extract Parameters
                    IP
                    Time of packet Arrival


                   Inspect
                    TBHF policy


                   Decision Making
                    Dropped or Allowed




際際滷 14    Dept. of CSE, TEC.                     3 April 2012
Modules  Capture Traffic
            Filter

              Outbound packets

              TCP packets

              HTTP packets

              HTTP GET packets




際際滷 15                      Dept. of CSE, TEC.   3 April 2012
Modules  Extract Parameters
            Scan

              HTTP GET packets

            Extract

              Remote IP

              Arrival time

            Store

              UINT32 array


際際滷 16                      Dept. of CSE, TEC.   3 April 2012
Modules  Inspect, Decision
  Making
            Inspect

              Time stamp

              Remote IP

              IP count

            Decision Making

              Threshold




際際滷 17                    Dept. of CSE, TEC.   3 April 2012
OUTLINE
   Abstract
   Insight into DDoS attack
   Existing and Proposed system
   Algorithm
   Modules
   TBHF Driver
   Technology
   Conclusion
   References

                  Dept. of CSE, TEC.   3 April 2012
Positioning of TBHF in kernel
  space




際際滷 18       Dept. of CSE, TEC.   3 April 2012
Implementation




際際滷 19      Dept. of CSE, TEC.   3 April 2012
Life Cycle
                                            Capturing
                                             Packet


                                                            Filtering
                        Inference                          Outbound
                                                            Packet




                                           TBHF
                                                                    Filtering TCP
           Inspection
                                           Driver                      Packets




                    Extract Time
                                                         Filtering HTTP
                         of
                                                          GET  Packet
                      Packet


                                             Extract
                                               IP 
                                              Info


際際滷 20                            Dept. of CSE, TEC.                              3 April 2012
Filter performance




際際滷 21       Dept. of CSE, TEC.   3 April 2012
OUTLINE
   Abstract
   Insight into DDoS attack
   Existing and Proposed system
   Algorithm
   Modules
   TBHF Driver
   Technology
   Conclusion
   References

                  Dept. of CSE, TEC.   3 April 2012
Technology
            Windows Filtering Platform (WFP)

              Supports from Longhorn

              Manipulate packet at OSI layers




際際滷 22                     Dept. of CSE, TEC.   3 April 2012
Conclusion
            Deployed in kernel level

            Priority to overwrite packets

            Real time prevention

            DDoS participation is prevented

            Future Enhancement

              Mobile platforms




際際滷 23                     Dept. of CSE, TEC.   3 April 2012
References
            Ying Xuan, Incheol Shin, My T. Thai, and Taieb
             Znati, Detecting Application Denial-of-Service
             Attacks: A Group-Testing-Based Approach
             IEEE Transactions on Parallel and Distributed
             Systems, Vol. 21, No. 8, pp. 1203-1216, August
             2010.
            Takeshi Yatagai, Takamasa Isohara, and Iwao
             Sasase, Detection of HTTP-GET flood Attack
             Based on Analysis of Page Access Behaviour,
             IEEE Conference on Communications, Computers
             and Signal Processing, August 2007
            http://msdn.microsoft.com/en-
             us/library/windows/desktop/aa366510%28v=vs.85
             %29.aspx

際際滷 24                   Dept. of CSE, TEC.         3 April 2012
Thank
You!!!



   Dept. of CSE, TEC.   3 April 2012
Ad

Recommended

Qualifying exam-2015-final
Qualifying exam-2015-final
Open Networking Per炭 (Opennetsoft)
Anomaly detection final
Anomaly detection final
Akshay Bansal
Report on TCP vulnerabilities
Report on TCP vulnerabilities
Prakhar Bansal
TCP Vulnerabilities
TCP Vulnerabilities
Prakhar Bansal
Machine Learning Based Botnet Detection
Machine Learning Based Botnet Detection
butest
Dos attack basic
Dos attack basic
Sanoj Kumar
Ddos
Ddos
Abhishek Malik
Prevention against new cell counting attack against tor network
Prevention against new cell counting attack against tor network
eSAT Journals
Presentation of "On the effectiveness of route-based packet filtering for dis...
Presentation of "On the effectiveness of route-based packet filtering for dis...
Jammy Wang
Trabajo no. 2
Uniandes
Mas based framework to protect cloud computing against ddos attack
Mas based framework to protect cloud computing against ddos attack
eSAT Journals
D do s
D do s
sunilkumar021
E0162736
E0162736
IOSR Journals
Firewall & its Services
Firewall & its Services
Navdeep Dhingra
DNS DDoS Attack and Risk
DNS DDoS Attack and Risk
Sukbum Hong
From Web Vulnerability to Exploit in 15 minutes
From Web Vulnerability to Exploit in 15 minutes
Pichaya Morimoto
Water Torture: A Slow Drip DNS DDoS Attack on QTNet by Kei Nishida [APRICOT 2...
Water Torture: A Slow Drip DNS DDoS Attack on QTNet by Kei Nishida [APRICOT 2...
APNIC
DoS or DDoS attack
DoS or DDoS attack
stollen_fusion
Butterworth filter design
Butterworth filter design
Sushant Shankar
Ddos and mitigation methods.pptx (1)
Ddos and mitigation methods.pptx (1)
btpsec
Cloud Computing Security Issues
Cloud Computing Security Issues
Discover Cloud Computing
Denial of Service Attacks
Denial of Service Attacks
Pascal Fl旦schel
DDoS Attacks
DDoS Attacks
Jignesh Patel
Search Engines Presentation
Search Engines Presentation
JSCHO9
Packet sniffers
Packet sniffers
Kunal Thakur
FireWall
FireWall
rubal_9
Search Engine Powerpoint
Search Engine Powerpoint
201014161
Network Security Presentation
Network Security Presentation
Allan Pratt MBA
An Efficient Framework for Detection & Classification of IoT BotNet.pptx
An Efficient Framework for Detection & Classification of IoT BotNet.pptx
Sandeep Maurya
Guadalajara con 2012
Guadalajara con 2012
Jaime Restrepo

More Related Content

Viewers also liked (20)

Presentation of "On the effectiveness of route-based packet filtering for dis...
Presentation of "On the effectiveness of route-based packet filtering for dis...
Jammy Wang
Trabajo no. 2
Uniandes
Mas based framework to protect cloud computing against ddos attack
Mas based framework to protect cloud computing against ddos attack
eSAT Journals
D do s
D do s
sunilkumar021
E0162736
E0162736
IOSR Journals
Firewall & its Services
Firewall & its Services
Navdeep Dhingra
DNS DDoS Attack and Risk
DNS DDoS Attack and Risk
Sukbum Hong
From Web Vulnerability to Exploit in 15 minutes
From Web Vulnerability to Exploit in 15 minutes
Pichaya Morimoto
Water Torture: A Slow Drip DNS DDoS Attack on QTNet by Kei Nishida [APRICOT 2...
Water Torture: A Slow Drip DNS DDoS Attack on QTNet by Kei Nishida [APRICOT 2...
APNIC
DoS or DDoS attack
DoS or DDoS attack
stollen_fusion
Butterworth filter design
Butterworth filter design
Sushant Shankar
Ddos and mitigation methods.pptx (1)
Ddos and mitigation methods.pptx (1)
btpsec
Cloud Computing Security Issues
Cloud Computing Security Issues
Discover Cloud Computing
Denial of Service Attacks
Denial of Service Attacks
Pascal Fl旦schel
DDoS Attacks
DDoS Attacks
Jignesh Patel
Search Engines Presentation
Search Engines Presentation
JSCHO9
Packet sniffers
Packet sniffers
Kunal Thakur
FireWall
FireWall
rubal_9
Search Engine Powerpoint
Search Engine Powerpoint
201014161
Network Security Presentation
Network Security Presentation
Allan Pratt MBA
Presentation of "On the effectiveness of route-based packet filtering for dis...
Presentation of "On the effectiveness of route-based packet filtering for dis...
Jammy Wang
Trabajo no. 2
Uniandes
Mas based framework to protect cloud computing against ddos attack
Mas based framework to protect cloud computing against ddos attack
eSAT Journals
Firewall & its Services
Firewall & its Services
Navdeep Dhingra
DNS DDoS Attack and Risk
DNS DDoS Attack and Risk
Sukbum Hong
From Web Vulnerability to Exploit in 15 minutes
From Web Vulnerability to Exploit in 15 minutes
Pichaya Morimoto
Water Torture: A Slow Drip DNS DDoS Attack on QTNet by Kei Nishida [APRICOT 2...
Water Torture: A Slow Drip DNS DDoS Attack on QTNet by Kei Nishida [APRICOT 2...
APNIC
Butterworth filter design
Butterworth filter design
Sushant Shankar
Ddos and mitigation methods.pptx (1)
Ddos and mitigation methods.pptx (1)
btpsec
Denial of Service Attacks
Denial of Service Attacks
Pascal Fl旦schel
Search Engines Presentation
Search Engines Presentation
JSCHO9
Packet sniffers
Packet sniffers
Kunal Thakur
FireWall
FireWall
rubal_9
Search Engine Powerpoint
Search Engine Powerpoint
201014161
Network Security Presentation
Network Security Presentation
Allan Pratt MBA

Similar to Tbhf (20)

An Efficient Framework for Detection & Classification of IoT BotNet.pptx
An Efficient Framework for Detection & Classification of IoT BotNet.pptx
Sandeep Maurya
Guadalajara con 2012
Guadalajara con 2012
Jaime Restrepo
DotDotPwn v3.0 [GuadalajaraCON 2012]
DotDotPwn v3.0 [GuadalajaraCON 2012]
Websec M辿xico
Network Security Data Visualization
Network Security Data Visualization
amiable_indian
DDOS ATTACK DETECTION ON INTERNET OF THINGS USING UNSUPERVISED ALGORITHMS
DDOS ATTACK DETECTION ON INTERNET OF THINGS USING UNSUPERVISED ALGORITHMS
ijfls
International Journal of Fuzzy Logic Systems (IJFLS)
International Journal of Fuzzy Logic Systems (IJFLS)
ijflsjournal087
International Journal of Fuzzy Logic Systems (IJFLS)
International Journal of Fuzzy Logic Systems (IJFLS)
ijflsjournal087
DDoS Attack Detection on Internet o Things using Unsupervised Algorithms
DDoS Attack Detection on Internet o Things using Unsupervised Algorithms
ijfls
International Journal of Fuzzy Logic Systems (IJFLS)
International Journal of Fuzzy Logic Systems (IJFLS)
ijflsjournal087
International Journal of Fuzzy Logic Systems (IJFLS)
International Journal of Fuzzy Logic Systems (IJFLS)
ijflsjournal087
Genetic Algorithm based Layered Detection and Defense of HTTP Botnet
Genetic Algorithm based Layered Detection and Defense of HTTP Botnet
IDES Editor
Ntp in Amplification Inferno
Ntp in Amplification Inferno
Sriram Krishnan
Open source network forensics and advanced pcap analysis
Open source network forensics and advanced pcap analysis
GTKlondike
Anomaly Detection at Scale
Anomaly Detection at Scale
Jeff Henrikson
1.Architecture
1.Architecture
phanleson
I034_I041_I052_DDOS Attacks_Presentation.pdf
I034_I041_I052_DDOS Attacks_Presentation.pdf
Devesh Pawar
L1803046876
L1803046876
IOSR Journals
Machine Learning Techniques Used for the Detection and Analysis of Modern Typ...
Machine Learning Techniques Used for the Detection and Analysis of Modern Typ...
IRJET Journal
690 698
690 698
Editor IJARCET
Proactive ops for container orchestration environments
Proactive ops for container orchestration environments
Docker, Inc.
An Efficient Framework for Detection & Classification of IoT BotNet.pptx
An Efficient Framework for Detection & Classification of IoT BotNet.pptx
Sandeep Maurya
Guadalajara con 2012
Guadalajara con 2012
Jaime Restrepo
DotDotPwn v3.0 [GuadalajaraCON 2012]
DotDotPwn v3.0 [GuadalajaraCON 2012]
Websec M辿xico
Network Security Data Visualization
Network Security Data Visualization
amiable_indian
DDOS ATTACK DETECTION ON INTERNET OF THINGS USING UNSUPERVISED ALGORITHMS
DDOS ATTACK DETECTION ON INTERNET OF THINGS USING UNSUPERVISED ALGORITHMS
ijfls
International Journal of Fuzzy Logic Systems (IJFLS)
International Journal of Fuzzy Logic Systems (IJFLS)
ijflsjournal087
International Journal of Fuzzy Logic Systems (IJFLS)
International Journal of Fuzzy Logic Systems (IJFLS)
ijflsjournal087
DDoS Attack Detection on Internet o Things using Unsupervised Algorithms
DDoS Attack Detection on Internet o Things using Unsupervised Algorithms
ijfls
International Journal of Fuzzy Logic Systems (IJFLS)
International Journal of Fuzzy Logic Systems (IJFLS)
ijflsjournal087
International Journal of Fuzzy Logic Systems (IJFLS)
International Journal of Fuzzy Logic Systems (IJFLS)
ijflsjournal087
Genetic Algorithm based Layered Detection and Defense of HTTP Botnet
Genetic Algorithm based Layered Detection and Defense of HTTP Botnet
IDES Editor
Ntp in Amplification Inferno
Ntp in Amplification Inferno
Sriram Krishnan
Open source network forensics and advanced pcap analysis
Open source network forensics and advanced pcap analysis
GTKlondike
Anomaly Detection at Scale
Anomaly Detection at Scale
Jeff Henrikson
1.Architecture
1.Architecture
phanleson
I034_I041_I052_DDOS Attacks_Presentation.pdf
I034_I041_I052_DDOS Attacks_Presentation.pdf
Devesh Pawar
Machine Learning Techniques Used for the Detection and Analysis of Modern Typ...
Machine Learning Techniques Used for the Detection and Analysis of Modern Typ...
IRJET Journal
Proactive ops for container orchestration environments
Proactive ops for container orchestration environments
Docker, Inc.
Ad

Tbhf

  • 1. THRESHOLD BASED KERNEL LEVEL HTTP FILTER (TBHF) for DDoS Mitigation by MOHAMED IBRAHIM AK 82008132041 LIJO GEORGE 82008132515 Dept. of CSE TEC, Trichy INTERNEL GUIDE EXTERNAL GUIDE Mr. A. NARENTHIRA KUMAR Dr. S. SELVAKUMAR Asst. Professor Professor Dept. of CSE Dept. of CSE TEC, Trichy NIT, Trichy
  • 2. OUTLINE Abstract Insight into DDoS attack Existing and Proposed system Algorithm Modules TBHF Driver Technology Conclusion References 際際滷 2 Dept. of CSE, TEC. 3 April 2012
  • 3. Abstract Application layer attack Client Side Scripting High rate flooding attack No manifestation Data on the flow analysis Threshold based Decision Support System Vulnerability Status: Effective Real time 際際滷 3 Dept. of CSE, TEC. 3 April 2012
  • 4. OUTLINE Abstract Insight into DDoS attack Existing and Proposed system Algorithm Modules TBHF Driver Technology Conclusion References Dept. of CSE, TEC. 3 April 2012
  • 5. DDoS attack - Actors Individuals Julian Assange - Wikileaks Blackhat underground community Anonymous, Lords of Dharmaraja Government sponsored China - GhostNet Israel - Stuxnet 際際滷 4 Dept. of CSE, TEC. 3 April 2012
  • 6. DDoS attack - Scenario Coordinated attack on a given target system through many compromised systems. Attacker Medium M1 M2 M3 Mn Compromised Systems C C C C C C Target 際際滷 5 Dept. of CSE, TEC. 3 April 2012
  • 7. DDoS attack - Analysis 際際滷 6 Dept. of CSE, TEC. 3 April 2012
  • 8. DDoS attack - Timeline July 2011 Live Journal Hit by Massive Cyber Attack March 2011 (Korean Websites) 40 websites under DDoS attack February 2011 (Total Choice Hosting Network) 7,00,000 packets per second 600 Mbps January 2011 FBI executed 40 search warrants for DDoS attacks Low Orbit Ion Cannon tool 際際滷 7 Dept. of CSE, TEC. 3 April 2012
  • 9. OUTLINE Abstract Insight into DDoS attack Existing and Proposed system Algorithm Modules TBHF Driver Technology Conclusion References Dept. of CSE, TEC. 3 April 2012
  • 10. Existing System Predominately in Server side Page access behaviour Captcha Black list Signature based detection 際際滷 8 Dept. of CSE, TEC. 3 April 2012
  • 11. Proposed System Client side Threshold based Real time Monitoring Detection Prevention Detects zero-day vulnerability 際際滷 9 Dept. of CSE, TEC. 3 April 2012
  • 12. OUTLINE Abstract Insight into DDoS attack Existing and Proposed system Algorithm Modules TBHF Driver Technology Conclusion References Dept. of CSE, TEC. 3 April 2012
  • 13. Algorithm 1. Capture traffic: a. Filter outbound TCP packets b. Filter HTTP packets c. if(packet type == GET) Action == inspect; d. else Action == allow; 2. Extract parameters: a. remote IP b. Time 際際滷 10 Dept. of CSE, TEC. 3 April 2012
  • 14. Algorithm Contd //r.addr1, r.addr2, , r.addri -> remote IP //T1, T2, , Ti -> packet time // t -> Time stamp 3. Inspect: a. If(r. addri not in array) addr[i] = r.addri; t[i] = Ti; b. else if (r. addri in array && (T(i+1) Ti)<=t) r.count[i]++; c. Else Reset r.count[]; 際際滷 11 Dept. of CSE, TEC. 3 April 2012
  • 15. Algorithm Contd //N -> Threshold value 4. Decision Making: a. If(r.count[i] >= N) Action = allow packet; b. else Action = drop packet; 際際滷 12 Dept. of CSE, TEC. 3 April 2012
  • 16. Software Requirements Attacker end PHP (Front end) MySQL (Back end) WampServer 2.2a Analysis Wireshark Prevention Windows Filtering Platform (WFP) 際際滷 13 Dept. of CSE, TEC. 3 April 2012
  • 17. OUTLINE Abstract Insight into DDoS attack Existing and Proposed system Algorithm Modules TBHF Driver Technology Conclusion References Dept. of CSE, TEC. 3 April 2012
  • 18. Modules Capture Traffic Filter Out Bound TCP Packet HTTP Packet HTTP GET Packet Extract Parameters IP Time of packet Arrival Inspect TBHF policy Decision Making Dropped or Allowed 際際滷 14 Dept. of CSE, TEC. 3 April 2012
  • 19. Modules Capture Traffic Filter Outbound packets TCP packets HTTP packets HTTP GET packets 際際滷 15 Dept. of CSE, TEC. 3 April 2012
  • 20. Modules Extract Parameters Scan HTTP GET packets Extract Remote IP Arrival time Store UINT32 array 際際滷 16 Dept. of CSE, TEC. 3 April 2012
  • 21. Modules Inspect, Decision Making Inspect Time stamp Remote IP IP count Decision Making Threshold 際際滷 17 Dept. of CSE, TEC. 3 April 2012
  • 22. OUTLINE Abstract Insight into DDoS attack Existing and Proposed system Algorithm Modules TBHF Driver Technology Conclusion References Dept. of CSE, TEC. 3 April 2012
  • 23. Positioning of TBHF in kernel space 際際滷 18 Dept. of CSE, TEC. 3 April 2012
  • 24. Implementation 際際滷 19 Dept. of CSE, TEC. 3 April 2012
  • 25. Life Cycle Capturing Packet Filtering Inference Outbound Packet TBHF Filtering TCP Inspection Driver Packets Extract Time Filtering HTTP of GET Packet Packet Extract IP Info 際際滷 20 Dept. of CSE, TEC. 3 April 2012
  • 26. Filter performance 際際滷 21 Dept. of CSE, TEC. 3 April 2012
  • 27. OUTLINE Abstract Insight into DDoS attack Existing and Proposed system Algorithm Modules TBHF Driver Technology Conclusion References Dept. of CSE, TEC. 3 April 2012
  • 28. Technology Windows Filtering Platform (WFP) Supports from Longhorn Manipulate packet at OSI layers 際際滷 22 Dept. of CSE, TEC. 3 April 2012
  • 29. Conclusion Deployed in kernel level Priority to overwrite packets Real time prevention DDoS participation is prevented Future Enhancement Mobile platforms 際際滷 23 Dept. of CSE, TEC. 3 April 2012
  • 30. References Ying Xuan, Incheol Shin, My T. Thai, and Taieb Znati, Detecting Application Denial-of-Service Attacks: A Group-Testing-Based Approach IEEE Transactions on Parallel and Distributed Systems, Vol. 21, No. 8, pp. 1203-1216, August 2010. Takeshi Yatagai, Takamasa Isohara, and Iwao Sasase, Detection of HTTP-GET flood Attack Based on Analysis of Page Access Behaviour, IEEE Conference on Communications, Computers and Signal Processing, August 2007 http://msdn.microsoft.com/en- us/library/windows/desktop/aa366510%28v=vs.85 %29.aspx 際際滷 24 Dept. of CSE, TEC. 3 April 2012
  • 31. Thank You!!! Dept. of CSE, TEC. 3 April 2012