projects
Differences
This shows you the differences between two versions of the page.
| Both sides previous revisionPrevious revision | |||
| projects [2011/09/19 18:59] – bil | projects [2011/10/14 12:56] (current) – bil | ||
|---|---|---|---|
| Line 48: | Line 48: | ||
| Eleventh International Conference on Mobile Data Management (MDM '10). | Eleventh International Conference on Mobile Data Management (MDM '10). | ||
| - | ====== Web Crawlers Behaving Like Humans: Are We There Yet!? ====== | ||
| - | |||
| - | **Supervisor**: | ||
| - | |||
| - | **Required Background**: | ||
| - | |||
| - | __Description__ | ||
| - | |||
| - | Distributed Denial of Service (DDoS) attacks are recognized as one | ||
| - | of the most serious threats to today' | ||
| - | simplicity of their execution and their ability to severely degrade | ||
| - | the quality at which Web-based services are offered to the end users. | ||
| - | An especially challenging form of DDoS attacks are the so-called | ||
| - | Application-Layer DDoS attacks. Namely: | ||
| - | |||
| - | - In Application-Layer DDoS attacks, the attackers utilize a flood of legitimate-looking Layer-7 network sessions (i.e., sessions that are generally hard to detect and/or filter out by a firewall or an IDS system) | ||
| - | - Increasingly, | ||
| - | |||
| - | The goal of this project is to investigate the state of the art in | ||
| - | malicious web crawler design. In particular, the project will look | ||
| - | into the challenges of designing a smart-DDoS-crawler from the | ||
| - | attacker point of view - one of these challenges being the estimation | ||
| - | of web-page popularity assuming no a priori access to the web-logs | ||
| - | of the victim web-site. | ||
projects.txt · Last modified: by bil
