以封包標注為基礎之分散式阻絕服務攻擊 封包過濾及阻塞之近似最佳化聯防策略 Near-optimal Joint Defense Strategies against DDoS Attacks Based upon Packet Filtering and Blocking Enabled by Packet Marking Mechanism 以封包標注為基礎之分散式阻絕服務攻擊 封包過濾及阻塞之近似最佳化聯防策略 Advisor: Prof. F. Y. S. Lin Presented by C.W. FanChiang
Agenda Introduction Scenario Assumption Formulation
INTRODUCTION
Introduction “Worldwide Infrastructure Security Report”
Introduction The network administrator, as the defender, must effectively utilize its limited resources and develop a defense strategy to maximize the contribution of defense resources. Defense resouces Packet Marking Packet Filtering Blocking
Introduction Packet Marking Scheme
SCENARIO
Scenario
Scenario
Scenario
Scenario
Scenario
Scenario
ASSUMption
ASSUMpTION
FORMULATION
ARACTS MODEL- given parameters
ARACTS MODEL- given parameters
ARACTS MODEL- given parameters
ARACTS MODEL- Decision variables
ARACTS MODEL- Decision variables
ARACTS MODEL
ARACTS MODEL
ARACTS MODEL
Auxiliary variAbles
PPM-FRABS model
Methodology Lagrangean Relaxation Simulated Annealing Divide-and-Conquer Simulated Annealing Iteration by iteration
Thanks for your listening