
NSF Org: |
CNS Division Of Computer and Network Systems |
Recipient: |
|
Initial Amendment Date: | August 25, 2008 |
Latest Amendment Date: | August 25, 2008 |
Award Number: | 0847869 |
Award Instrument: | Standard Grant |
Program Manager: |
Sajal Das
CNS Division Of Computer and Network Systems CSE Directorate for Computer and Information Science and Engineering |
Start Date: | September 1, 2008 |
End Date: | August 31, 2010 (Estimated) |
Total Intended Award Amount: | $150,000.00 |
Total Awarded Amount to Date: | $150,000.00 |
Funds Obligated to Date: |
|
History of Investigator: |
|
Recipient Sponsored Research Office: |
1523 UNION RD RM 207 GAINESVILLE FL US 32611-1941 (352)392-3516 |
Sponsor Congressional District: |
|
Primary Place of Performance: |
1523 UNION RD RM 207 GAINESVILLE FL US 32611-1941 |
Primary Place of
Performance Congressional District: |
|
Unique Entity Identifier (UEI): |
|
Parent UEI: |
|
NSF Program(s): | Networking Technology and Syst |
Primary Program Source: |
|
Program Reference Code(s): |
|
Program Element Code(s): |
|
Award Agency Code: | 4900 |
Fund Agency Code: | 4900 |
Assistance Listing Number(s): | 47.070 |
ABSTRACT
One of the most critical problems in Internet security is
the Denial-of-Service (DoS) attack, which aims to make a
service unavailable to legitimate clients. In this project,
we consider a sophisticated attack, called service-level DoS
attack, which is very difficult to identify as malicious
requests can be made arbitrarily similar to legitimate ones
and can bypass the network-based defense systems. We propose
a novel framework to detect the attackers based on the group
testing (GT) technique which can overcome the limitations of
current detection approaches. More specifically, this project
seeks to investigate the following challenges: 1) Dynamic
threshold model is studied to handle the legitimate bursts
and variance in the number of clients on each server; 2)
Legitimates and malicious requests are similar, required
new testing design without examining each request one by
one or tightly specifying legitimate behaviors; 3) In
addition, the study of the proposed model evokes a new
type of GT, called Size Constraint Group Testing (SCGT)
which requires an in depth analysis of matrix construction
complexity. This mathematically rigorous framework helps
to minimize the false positive and false negative of detection,
which is the main problem currently for any existing defense
mechanisms.
PUBLICATIONS PRODUCED AS A RESULT OF THIS RESEARCH
Note:
When clicking on a Digital Object Identifier (DOI) number, you will be taken to an external
site maintained by the publisher. Some full text articles may not yet be available without a
charge during the embargo (administrative interval).
Some links on this page may take you to non-federal websites. Their policies may differ from
this site.
Please report errors in award information by writing to: awardsearch@nsf.gov.