projects
Differences
This shows you the differences between two versions of the page.
Both sides previous revisionPrevious revision | |||
projects [2011/09/19 18:59] – bil | projects [2011/10/14 12:56] (current) – bil | ||
---|---|---|---|
Line 48: | Line 48: | ||
Eleventh International Conference on Mobile Data Management (MDM '10). | Eleventh International Conference on Mobile Data Management (MDM '10). | ||
- | ====== Web Crawlers Behaving Like Humans: Are We There Yet!? ====== | ||
- | |||
- | **Supervisor**: | ||
- | |||
- | **Required Background**: | ||
- | |||
- | __Description__ | ||
- | |||
- | Distributed Denial of Service (DDoS) attacks are recognized as one | ||
- | of the most serious threats to today' | ||
- | simplicity of their execution and their ability to severely degrade | ||
- | the quality at which Web-based services are offered to the end users. | ||
- | An especially challenging form of DDoS attacks are the so-called | ||
- | Application-Layer DDoS attacks. Namely: | ||
- | |||
- | - In Application-Layer DDoS attacks, the attackers utilize a flood of legitimate-looking Layer-7 network sessions (i.e., sessions that are generally hard to detect and/or filter out by a firewall or an IDS system) | ||
- | - Increasingly, | ||
- | |||
- | The goal of this project is to investigate the state of the art in | ||
- | malicious web crawler design. In particular, the project will look | ||
- | into the challenges of designing a smart-DDoS-crawler from the | ||
- | attacker point of view - one of these challenges being the estimation | ||
- | of web-page popularity assuming no a priori access to the web-logs | ||
- | of the victim web-site. | ||
projects.1316458794.txt.gz · Last modified: 2011/09/19 18:59 by bil