< > - +
A study of denial of service attacks on the Internet
David J. Marchette
marchettedj@nswc.navy.mil
Naval Surface Warfare Center Code B10
A study of denial of service attacks on the Internet – p.1/39
A study of denial of service attacks on the Internet David J. - - PowerPoint PPT Presentation
A study of denial of service attacks on the Internet David J. Marchette marchettedj@nswc.navy.mil Naval Surface Warfare Center Code B10 < > - + A study of denial of service attacks on the Internet p.1/39 Outline Background
< > - +
A study of denial of service attacks on the Internet – p.1/39
< > - +
A study of denial of service attacks on the Internet – p.2/39
< > - +
A study of denial of service attacks on the Internet – p.3/39
< > - +
A study of denial of service attacks on the Internet – p.3/39
< > - +
A study of denial of service attacks on the Internet – p.3/39
< > - +
A study of denial of service attacks on the Internet – p.4/39
< > - +
A study of denial of service attacks on the Internet – p.5/39
< > - +
A study of denial of service attacks on the Internet – p.5/39
< > - +
A study of denial of service attacks on the Internet – p.5/39
< > - +
A study of denial of service attacks on the Internet – p.5/39
< > - +
A study of denial of service attacks on the Internet – p.5/39
< > - +
A study of denial of service attacks on the Internet – p.6/39
< > - +
A study of denial of service attacks on the Internet – p.6/39
< > - +
A study of denial of service attacks on the Internet – p.6/39
< > - +
A study of denial of service attacks on the Internet – p.6/39
< > - +
A study of denial of service attacks on the Internet – p.7/39
< > - +
A study of denial of service attacks on the Internet – p.8/39
< > - +
A study of denial of service attacks on the Internet – p.9/39
< > - +
A study of denial of service attacks on the Internet – p.10/39
< > - +
A study of denial of service attacks on the Internet – p.11/39
< > - +
A study of denial of service attacks on the Internet – p.12/39
< > - +
A study of denial of service attacks on the Internet – p.13/39
< > - +
A study of denial of service attacks on the Internet – p.14/39
< > - +
A study of denial of service attacks on the Internet – p.15/39
< > - +
A study of denial of service attacks on the Internet – p.16/39
< > - +
A study of denial of service attacks on the Internet – p.16/39
< > - +
A study of denial of service attacks on the Internet – p.16/39
< > - +
A study of denial of service attacks on the Internet – p.16/39
< > - +
A study of denial of service attacks on the Internet – p.17/39
< > - +
A study of denial of service attacks on the Internet – p.18/39
< > - +
A study of denial of service attacks on the Internet – p.19/39
< > - +
A study of denial of service attacks on the Internet – p.20/39
< > - +
A study of denial of service attacks on the Internet – p.21/39
< > - +
A study of denial of service attacks on the Internet – p.22/39
< > - +
A study of denial of service attacks on the Internet – p.23/39
< > - +
2 4 6 10000 20000 30000 40000 50000 60000 Time (hours) Spoofed IP
A study of denial of service attacks on the Internet – p.24/39
< > - +
0.00 0.05 0.10 0.15 10000 20000 30000 40000 50000 60000 Time (hours) Spoofed IP
A study of denial of service attacks on the Internet – p.25/39
< > - +
20 40 60 80 100 10000 20000 30000 40000 50000 60000 Time (hours) Spoofed IP
A study of denial of service attacks on the Internet – p.26/39
< > - +
A study of denial of service attacks on the Internet – p.27/39
< > - +
A study of denial of service attacks on the Internet – p.28/39
< > - +
A study of denial of service attacks on the Internet – p.29/39
< > - +
A study of denial of service attacks on the Internet – p.29/39
< > - +
A study of denial of service attacks on the Internet – p.29/39
< > - +
0.00 0.05 0.10 0.15 0.20 10000 20000 30000 40000 50000 60000 Time (hours) Spoofed IP
A study of denial of service attacks on the Internet – p.30/39
< > - +
A study of denial of service attacks on the Internet – p.31/39
< > - +
50 100 150 200 10000 20000 30000 40000 50000 60000 Time (hours) Spoofed IP 50 100 150 200 10000 20000 30000 40000 50000 60000 Time (hours) Spoofed IP
A study of denial of service attacks on the Internet – p.32/39
< > - +
50 100 150 200 10000 20000 30000 40000 50000 60000 Time (hours) Spoofed IP 20 40 60 80 100 10000 20000 30000 40000 50000 60000 Time (hours) Spoofed IP
A study of denial of service attacks on the Internet – p.32/39
< > - +
A study of denial of service attacks on the Internet – p.33/39
< > - +
20 40 60 80 100 10000 20000 30000 40000 50000 60000 Time (hours) Spoofed IP 200 600 1000 1400 0e+00 1e+18 2e+18 3e+18 4e+18 Frequency Amplitude
A study of denial of service attacks on the Internet – p.34/39
< > - +
20 40 60 80 100 10000 20000 30000 40000 50000 60000 Time (hours) Spoofed IP 200 400 600 800 1000 0.0 0.2 0.4 0.6 0.8 1.0 Lag ACF
A study of denial of service attacks on the Internet – p.35/39
< > - +
A study of denial of service attacks on the Internet – p.36/39
< > - +
A study of denial of service attacks on the Internet – p.37/39
< > - +
Time
20000 40000 60000 1e+09 3e+09 20 40 60 80 100 20000 40000 60000
Spoofed IP Source Port
1050 1150 1250 20 40 60 80 100 1e+09 3e+09 1050 1150 1250
Sequence Number
A study of denial of service attacks on the Internet – p.38/39
< > - +
A study of denial of service attacks on the Internet – p.39/39