Please use this identifier to cite or link to this item:
Trust-based bandwidth management for critical flows
|Liu_Yuan_r.pdf||Version for non-UH users. Copying/Printing is not permitted||841.46 kB||Adobe PDF||View/Open|
|Liu_Yuan_uh.pdf||Version for UH users||925.17 kB||Adobe PDF||View/Open|
|Title:||Trust-based bandwidth management for critical flows|
|Issue Date:||Dec 2011|
|Publisher:||[Honolulu] : [University of Hawaii at Manoa], [December 2011]|
|Abstract:||In this thesis, we focus on the bandwidth allocation on the bottleneck link and provide several allocation schemes to minimize the potential damage caused by flooding attacks. Assume that we know which flows are critical flows, and all other flows on the bottleneck link are considered as suspicious flows , when the delivery path is under attacks. The proposed schemes try to provide more bandwidth to critical flows and reduce damages as much as possible. Using these schemes, the system can properly allocate the bandwidth among critical flows and suspicious flows on the bottleneck link. At the same time, the congestion of the bottleneck link will be identified and the non-critical flows are tagged as suspicious flows. Once the congestion of the bottleneck link is identified, the bandwidth allocation of suspicious flows is reduced based on the proposed methods. In other words, we can supply proper bandwidth to critical flows, such that critical flows will suffer less damage. Ideally, if a suspicious flow can be determined as an attack flow, this flow will be dropped completely. As a result, the whole system will suffer less damage.|
|Description:||M.S. University of Hawaii at Manoa 2011.|
Includes bibliographical references.
|Appears in Collections:||M.S. - Electrical Engineering|
Items in ScholarSpace are protected by copyright, with all rights reserved, unless otherwise indicated.