Changes between Version 6 and Version 7 of FirstGenBrooks


Ignore:
Timestamp:
02/08/12 18:07:52 (12 years ago)
Author:
kccamer@clemson.edu
Comment:

--

Legend:

Unmodified
Added
Removed
Modified
  • FirstGenBrooks

    v6 v7  
    4040 
    4141                [[Image(Figure1.png)]]
    42                 Figure 1 - DDoS Attack
     42    Figure 1 - DDoS Attack
    4343
    4444In addition to the complexity of the problem, the complexity of the Internet makes analysis even more challenging. We mostly verify theoretical studies using computer simulations and not by using the real Internet and its data. Unfortunately network traffic, one of the most important parameters which is used for DDoS detection routines, cannot be accurately generated because of its unpredictable characteristic.
     
    4747
    4848                [[Image(Figure2.png)]]
    49                 Figure 2 - Experiment Setup
     49    Figure 2 - Experiment Setup
    5050
    5151Our experiment has two main goals. These are: collecting time-series from Internet traffic to use in the future experiments and verifying the performance of DDoS detection methods which are optimized by using computer simulations.
     
    5555 
    5656               [[Image(Figure3.png)]]
    57                Figure 3 - Clemson Uni Traffic
     57     Figure 3 - Clemson Uni Traffic
    5858
    5959