\select@language {american}
\select@language {american}
\select@language {brazil}
\contentsline {chapter}{\numberline {1}Introdu\IeC {\c c}\IeC {\~a}o}{1}{chapter.1}
\contentsline {section}{\numberline {1.1}A seguran\IeC {\c c}a de redes}{2}{section.1.1}
\contentsline {section}{\numberline {1.2}Objetivo}{2}{section.1.2}
\contentsline {chapter}{\numberline {2}Ataques de Nega\IeC {\c c}\IeC {\~a}o de Servi\IeC {\c c}o}{3}{chapter.2}
\contentsline {section}{\numberline {2.1}Defini\IeC {\c c}\IeC {\~a}o}{3}{section.2.1}
\contentsline {subsection}{\numberline {2.1.1}Um breve exemplo}{4}{subsection.2.1.1}
\contentsline {section}{\numberline {2.2}Dificuldades na seguran\IeC {\c c}a contra ataques DoS}{5}{section.2.2}
\contentsline {subsection}{\numberline {2.2.1}Empecilhos na cria\IeC {\c c}\IeC {\~a}o de mecanismos de defesa}{6}{subsection.2.2.1}
\contentsline {chapter}{\numberline {3}Taxonomia dos Ataques de nega\IeC {\c c}\IeC {\~a}o de servi\IeC {\c c}o e mecanismos de defesa}{8}{chapter.3}
\contentsline {section}{\numberline {3.1}Taxonomia dos DDoS}{8}{section.3.1}
\contentsline {subsection}{\numberline {3.1.1}Grau de automa\IeC {\c c}\IeC {\~a}o}{8}{subsection.3.1.1}
\contentsline {subsection}{\numberline {3.1.2}Comunica\IeC {\c c}\IeC {\~a}o}{9}{subsection.3.1.2}
\contentsline {subsection}{\numberline {3.1.3}Varredura de v\IeC {\'\i }timas}{9}{subsection.3.1.3}
\contentsline {subsection}{\numberline {3.1.4}Vulnerabilidades exploradas pelos DDoS}{10}{subsection.3.1.4}
\contentsline {subsection}{\numberline {3.1.5}Din\IeC {\^a}micas do fluxo de ataque}{12}{subsection.3.1.5}
\contentsline {subsection}{\numberline {3.1.6}Tipo de v\IeC {\'\i }tima e impactos}{12}{subsection.3.1.6}
\contentsline {section}{\numberline {3.2}Classifica\IeC {\c c}\IeC {\~a}o dos mecanismos de defesa}{13}{section.3.2}
\contentsline {subsection}{\numberline {3.2.1}Mecanismos de defesa preventivos}{13}{subsection.3.2.1}
\contentsline {subsection}{\numberline {3.2.2}Mecanismos de defesa reativos}{14}{subsection.3.2.2}
\contentsline {subsection}{\numberline {3.2.3}Estrat\IeC {\'e}gias de resposta ao ataque}{15}{subsection.3.2.3}
\contentsline {subsection}{\numberline {3.2.4}Implanta\IeC {\c c}\IeC {\~a}o do mecanismo de defesa}{16}{subsection.3.2.4}
\contentsline {chapter}{\numberline {4}TLS/SSL}{17}{chapter.4}
\contentsline {section}{\numberline {4.1}Criptografia sim\IeC {\'e}trica e assim\IeC {\'e}trica}{18}{section.4.1}
\contentsline {section}{\numberline {4.2}Certificados}{19}{section.4.2}
\contentsline {section}{\numberline {4.3}Fun\IeC {\c c}\IeC {\~o}es de resumo}{20}{section.4.3}
\contentsline {section}{\numberline {4.4}\emph {Handshake} TLS/SSL}{21}{section.4.4}
\contentsline {section}{\numberline {4.5}Formato dos pacotes TLS/SSL}{25}{section.4.5}
\contentsline {section}{\numberline {4.6}Diffie \& Hellman}{27}{section.4.6}
\contentsline {chapter}{\numberline {5}Motiva\IeC {\c c}\IeC {\~o}es}{29}{chapter.5}
\contentsline {section}{\numberline {5.1}Objetivos e C\IeC {\'o}digo de Conduta}{29}{section.5.1}
\contentsline {section}{\numberline {5.2}Ataques relacionados}{30}{section.5.2}
\contentsline {section}{\numberline {5.3}Contribui\IeC {\c c}\IeC {\~o}es e contrastes}{31}{section.5.3}
\contentsline {chapter}{\numberline {6}Implementa\IeC {\c c}\IeC {\~a}o e Testes}{33}{chapter.6}
\contentsline {section}{\numberline {6.1}Implementa\IeC {\c c}\IeC {\~a}o}{33}{section.6.1}
\contentsline {section}{\numberline {6.2}Ferramentas e metodologia usadas nos testes}{37}{section.6.2}
\contentsline {chapter}{\numberline {7}Resutados}{40}{chapter.7}
\contentsline {section}{\numberline {7.1}Primeira vers\IeC {\~a}o da ferramenta}{40}{section.7.1}
\contentsline {section}{\numberline {7.2}Segunda vers\IeC {\~a}o da ferramenta}{43}{section.7.2}
\contentsline {section}{\numberline {7.3}Vers\IeC {\~a}o da ferramenta com libevent e RSA}{46}{section.7.3}
\contentsline {section}{\numberline {7.4}Vers\IeC {\~a}o da ferramenta com libevent e Diffie \& Hellman}{49}{section.7.4}
\contentsline {chapter}{\numberline {8}Conclus\IeC {\~o}es}{54}{chapter.8}
\contentsline {section}{\numberline {8.1}An\IeC {\'a}lise e classifica\IeC {\c c}\IeC {\~a}o}{54}{section.8.1}
\contentsline {section}{\numberline {8.2}Sugest\IeC {\~o}es para a evolu\IeC {\c c}\IeC {\~a}o do ataque}{54}{section.8.2}
\contentsline {section}{\numberline {8.3}Poss\IeC {\'\i }veis contramedidas}{55}{section.8.3}
\contentsline {chapter}{Refer\^encias}{57}{section*.8}
