\relax 
\providecommand\hyper@newdestlabel[2]{}
\providecommand\HyperFirstAtBeginDocument{\AtBeginDocument}
\HyperFirstAtBeginDocument{\ifx\hyper@anchor\@undefined
\global\let\oldcontentsline\contentsline
\gdef\contentsline#1#2#3#4{\oldcontentsline{#1}{#2}{#3}}
\global\let\oldnewlabel\newlabel
\gdef\newlabel#1#2{\newlabelxx{#1}#2}
\gdef\newlabelxx#1#2#3#4#5#6{\oldnewlabel{#1}{{#2}{#3}}}
\AtEndDocument{\ifx\hyper@anchor\@undefined
\let\contentsline\oldcontentsline
\let\newlabel\oldnewlabel
\fi}
\fi}
\global\let\hyper@last\relax 
\gdef\HyperFirstAtBeginDocument#1{#1}
\providecommand\HyField@AuxAddToFields[1]{}
\providecommand\HyField@AuxAddToCoFields[2]{}
\catcode `"\active 
\select@language{american}
\@writefile{toc}{\select@language{american}}
\@writefile{lof}{\select@language{american}}
\@writefile{lot}{\select@language{american}}
\select@language{american}
\@writefile{toc}{\select@language{american}}
\@writefile{lof}{\select@language{american}}
\@writefile{lot}{\select@language{american}}
\select@language{brazil}
\@writefile{toc}{\select@language{brazil}}
\@writefile{lof}{\select@language{brazil}}
\@writefile{lot}{\select@language{brazil}}
\citation{smurfDef}
\citation{smurfDef}
\citation{figSSL}
\citation{figSSL}
\citation{figassimetrica}
\citation{figassimetrica}
\citation{figpacket}
\citation{figpacket}
\citation{diffie}
\citation{diffie}
\citation{vincent}
\citation{vincent}
\@writefile{brf}{\backcite{smurfDef}{{vii}{(document)}{Doc-Start}}}
\@writefile{brf}{\backcite{figSSL}{{vii}{(document)}{Doc-Start}}}
\@writefile{brf}{\backcite{figassimetrica}{{vii}{(document)}{Doc-Start}}}
\@writefile{brf}{\backcite{figpacket}{{vii}{(document)}{Doc-Start}}}
\@writefile{brf}{\backcite{diffie}{{vii}{(document)}{Doc-Start}}}
\@writefile{brf}{\backcite{vincent}{{vii}{(document)}{Doc-Start}}}
\citation{cipher}
\citation{cipher}
\citation{figpacket}
\citation{figpacket}
\citation{figpacket}
\citation{figpacket}
\@writefile{brf}{\backcite{cipher}{{ix}{(document)}{Doc-Start}}}
\@writefile{brf}{\backcite{figpacket}{{ix}{(document)}{Doc-Start}}}
\@writefile{brf}{\backcite{figpacket}{{ix}{(document)}{Doc-Start}}}
\citation{kurose}
\citation{kurose}
\citation{historiaINternet}
\citation{historiaINternet}
\citation{kurose}
\citation{kurose}
\citation{douligeris2007network}
\citation{douligeris2007network}
\@writefile{toc}{\contentsline {chapter}{\numberline {1}Introdu\IeC {\c c}\IeC {\~a}o}{1}{chapter.1}}
\@writefile{lof}{\addvspace {10\p@ }}
\@writefile{lot}{\addvspace {10\p@ }}
\@writefile{brf}{\backcite{kurose}{{1}{1}{chapter.1}}}
\@writefile{brf}{\backcite{historiaINternet}{{1}{1}{chapter.1}}}
\@writefile{brf}{\backcite{kurose}{{1}{1}{chapter.1}}}
\citation{harrington2005network}
\citation{harrington2005network}
\citation{RFCSSL1}
\citation{RFCSSL1}
\citation{RFCSSL2}
\citation{RFCSSL2}
\@writefile{toc}{\contentsline {section}{\numberline {1.1}A seguran\IeC {\c c}a de redes}{2}{section.1.1}}
\@writefile{brf}{\backcite{douligeris2007network}{{2}{1.1}{section.1.1}}}
\@writefile{brf}{\backcite{harrington2005network}{{2}{1.1}{section.1.1}}}
\@writefile{toc}{\contentsline {section}{\numberline {1.2}Objetivo}{2}{section.1.2}}
\@writefile{brf}{\backcite{RFCSSL1}{{2}{1.2}{section.1.2}}}
\@writefile{brf}{\backcite{RFCSSL2}{{2}{1.2}{section.1.2}}}
\citation{kurose}
\citation{kurose}
\citation{taxonomy}
\citation{taxonomy}
\citation{stateoftheart}
\citation{stateoftheart}
\citation{taxonomy}
\citation{taxonomy}
\citation{taxonomy}
\citation{taxonomy}
\citation{codigosHTTP}
\citation{codigosHTTP}
\citation{smurfDef}
\citation{smurfDef}
\@writefile{toc}{\contentsline {chapter}{\numberline {2}Ataques de Nega\IeC {\c c}\IeC {\~a}o de Servi\IeC {\c c}o}{3}{chapter.2}}
\@writefile{lof}{\addvspace {10\p@ }}
\@writefile{lot}{\addvspace {10\p@ }}
\@writefile{brf}{\backcite{kurose}{{3}{2}{chapter.2}}}
\@writefile{toc}{\contentsline {section}{\numberline {2.1}Defini\IeC {\c c}\IeC {\~a}o}{3}{section.2.1}}
\@writefile{brf}{\backcite{taxonomy}{{3}{2.1}{section.2.1}}}
\@writefile{brf}{\backcite{stateoftheart}{{3}{2.1}{section.2.1}}}
\@writefile{brf}{\backcite{taxonomy}{{3}{2.1}{section.2.1}}}
\@writefile{brf}{\backcite{taxonomy}{{3}{2.1}{section.2.1}}}
\citation{slowloris}
\citation{slowloris}
\citation{defcom}
\citation{defcom}
\@writefile{toc}{\contentsline {subsection}{\numberline {2.1.1}Um breve exemplo}{4}{subsection.2.1.1}}
\@writefile{brf}{\backcite{codigosHTTP}{{4}{2.1.1}{subsection.2.1.1}}}
\@writefile{brf}{\backcite{smurfDef}{{4}{2.1.1}{subsection.2.1.1}}}
\@writefile{brf}{\backcite{slowloris}{{4}{2.1.1}{subsection.2.1.1}}}
\@writefile{brf}{\backcite{defcom}{{4}{2.1.1}{subsection.2.1.1}}}
\@writefile{lof}{\contentsline {figure}{\numberline {2.1}{\ignorespaces Imagem contendo o funcionamento normal de um servidor web, com requisi\IeC {\c c}\IeC {\~o}es GET.}}{4}{figure.2.1}}
\newlabel{fig:normalGet}{{2.1}{4}{Imagem contendo o funcionamento normal de um servidor web, com requisições GET}{figure.2.1}{}}
\citation{stateoftheart}
\citation{stateoftheart}
\citation{stateoftheart}
\citation{stateoftheart}
\@writefile{lof}{\contentsline {figure}{\numberline {2.2}{\ignorespaces Imagem descrevendo o ataque slowloris para uma conex\IeC {\~a}o.}}{5}{figure.2.2}}
\newlabel{fig:slowloris}{{2.2}{5}{Imagem descrevendo o ataque slowloris para uma conexão}{figure.2.2}{}}
\@writefile{toc}{\contentsline {section}{\numberline {2.2}Dificuldades na seguran\IeC {\c c}a contra ataques DoS}{5}{section.2.2}}
\@writefile{brf}{\backcite{stateoftheart}{{5}{2.2}{section.2.2}}}
\citation{stateoftheart}
\citation{stateoftheart}
\citation{taxonomy}
\citation{taxonomy}
\citation{stateoftheart}
\citation{stateoftheart}
\citation{taxonomy}
\citation{taxonomy}
\@writefile{brf}{\backcite{stateoftheart}{{6}{2.2}{section.2.2}}}
\@writefile{toc}{\contentsline {subsection}{\numberline {2.2.1}Empecilhos na cria\IeC {\c c}\IeC {\~a}o de mecanismos de defesa}{6}{subsection.2.2.1}}
\@writefile{brf}{\backcite{stateoftheart}{{6}{2.2.1}{subsection.2.2.1}}}
\@writefile{brf}{\backcite{taxonomy}{{6}{2.2.1}{subsection.2.2.1}}}
\@writefile{brf}{\backcite{stateoftheart}{{7}{2.2.1}{subsection.2.2.1}}}
\@writefile{brf}{\backcite{taxonomy}{{7}{2.2.1}{subsection.2.2.1}}}
\citation{taxonomy}
\citation{taxonomy}
\citation{stateoftheart}
\citation{stateoftheart}
\citation{stateoftheart}
\citation{stateoftheart}
\@writefile{toc}{\contentsline {chapter}{\numberline {3}Taxonomia dos Ataques de nega\IeC {\c c}\IeC {\~a}o de servi\IeC {\c c}o e mecanismos de defesa}{8}{chapter.3}}
\@writefile{lof}{\addvspace {10\p@ }}
\@writefile{lot}{\addvspace {10\p@ }}
\@writefile{toc}{\contentsline {section}{\numberline {3.1}Taxonomia dos DDoS}{8}{section.3.1}}
\@writefile{brf}{\backcite{taxonomy}{{8}{3.1}{section.3.1}}}
\@writefile{brf}{\backcite{stateoftheart}{{8}{3.1}{section.3.1}}}
\@writefile{toc}{\contentsline {subsection}{\numberline {3.1.1}Grau de automa\IeC {\c c}\IeC {\~a}o}{8}{subsection.3.1.1}}
\@writefile{brf}{\backcite{stateoftheart}{{8}{3.1.1}{subsection.3.1.1}}}
\citation{taxonomy}
\citation{taxonomy}
\citation{taxonomy}
\citation{taxonomy}
\citation{irc}
\citation{irc}
\citation{trojan}
\citation{trojan}
\citation{taxonomy}
\citation{taxonomy}
\@writefile{brf}{\backcite{taxonomy}{{9}{3.1.1}{subsection.3.1.1}}}
\@writefile{toc}{\contentsline {subsection}{\numberline {3.1.2}Comunica\IeC {\c c}\IeC {\~a}o}{9}{subsection.3.1.2}}
\@writefile{brf}{\backcite{taxonomy}{{9}{3.1.2}{subsection.3.1.2}}}
\@writefile{brf}{\backcite{irc}{{9}{3.1.2}{subsection.3.1.2}}}
\@writefile{toc}{\contentsline {subsection}{\numberline {3.1.3}Varredura de v\IeC {\'\i }timas}{9}{subsection.3.1.3}}
\@writefile{brf}{\backcite{trojan}{{9}{3.1.3}{subsection.3.1.3}}}
\@writefile{brf}{\backcite{taxonomy}{{9}{3.1.3}{subsection.3.1.3}}}
\citation{stateoftheart}
\citation{stateoftheart}
\citation{smurf}
\citation{smurf}
\citation{smurfDef}
\citation{smurfDef}
\citation{dnsamp}
\citation{dnsamp}
\@writefile{toc}{\contentsline {subsection}{\numberline {3.1.4}Vulnerabilidades exploradas pelos DDoS}{10}{subsection.3.1.4}}
\@writefile{brf}{\backcite{stateoftheart}{{10}{3.1.4}{subsection.3.1.4}}}
\@writefile{brf}{\backcite{smurf}{{10}{3.1.4}{subsection.3.1.4}}}
\@writefile{brf}{\backcite{smurfDef}{{10}{3.1.4}{subsection.3.1.4}}}
\citation{smurfDef}
\citation{smurfDef}
\citation{smurfDef}
\citation{smurfDef}
\@writefile{brf}{\backcite{dnsamp}{{11}{3.1.4}{subsection.3.1.4}}}
\@writefile{lof}{\contentsline {figure}{\numberline {3.1}{\ignorespaces Imagem descrevendo o funcionamento de um ataque \emph  {smurf}~\cite  {smurfDef}(adaptada para o portugu\IeC {\^e}s).}}{11}{figure.3.1}}
\@writefile{brf}{\backcite{smurfDef}{{11}{3.1}{figure.3.1}}}
\newlabel{fig:smurf}{{3.1}{11}{Imagem descrevendo o funcionamento de um ataque \emph {smurf}~\cite {smurfDef}(adaptada para o português)}{figure.3.1}{}}
\citation{stateoftheart}
\citation{stateoftheart}
\citation{taxonomy}
\citation{taxonomy}
\citation{taxonomy}
\citation{taxonomy}
\citation{taxonomy}
\citation{taxonomy}
\citation{stateoftheart}
\citation{stateoftheart}
\@writefile{toc}{\contentsline {subsection}{\numberline {3.1.5}Din\IeC {\^a}micas do fluxo de ataque}{12}{subsection.3.1.5}}
\@writefile{brf}{\backcite{stateoftheart}{{12}{3.1.5}{subsection.3.1.5}}}
\@writefile{brf}{\backcite{taxonomy}{{12}{3.1.5}{subsection.3.1.5}}}
\@writefile{toc}{\contentsline {subsection}{\numberline {3.1.6}Tipo de v\IeC {\'\i }tima e impactos}{12}{subsection.3.1.6}}
\@writefile{brf}{\backcite{taxonomy}{{12}{3.1.6}{subsection.3.1.6}}}
\@writefile{brf}{\backcite{taxonomy}{{12}{3.1.6}{subsection.3.1.6}}}
\@writefile{brf}{\backcite{stateoftheart}{{12}{3.1.6}{subsection.3.1.6}}}
\citation{taxonomy}
\citation{taxonomy}
\citation{taxonomy}
\citation{taxonomy}
\citation{stateoftheart}
\citation{stateoftheart}
\@writefile{brf}{\backcite{taxonomy}{{13}{3.1.6}{subsection.3.1.6}}}
\@writefile{brf}{\backcite{taxonomy}{{13}{3.1.6}{subsection.3.1.6}}}
\@writefile{toc}{\contentsline {section}{\numberline {3.2}Classifica\IeC {\c c}\IeC {\~a}o dos mecanismos de defesa}{13}{section.3.2}}
\@writefile{brf}{\backcite{stateoftheart}{{13}{3.2}{section.3.2}}}
\@writefile{toc}{\contentsline {subsection}{\numberline {3.2.1}Mecanismos de defesa preventivos}{13}{subsection.3.2.1}}
\citation{taxonomy}
\citation{taxonomy}
\citation{taxonomy}
\citation{taxonomy}
\@writefile{brf}{\backcite{taxonomy}{{14}{3.2.1}{subsection.3.2.1}}}
\@writefile{toc}{\contentsline {subsection}{\numberline {3.2.2}Mecanismos de defesa reativos}{14}{subsection.3.2.2}}
\@writefile{brf}{\backcite{taxonomy}{{14}{3.2.2}{subsection.3.2.2}}}
\citation{taxonomy}
\citation{taxonomy}
\citation{taxonomy}
\citation{taxonomy}
\@writefile{brf}{\backcite{taxonomy}{{15}{3.2.2}{subsection.3.2.2}}}
\@writefile{toc}{\contentsline {subsection}{\numberline {3.2.3}Estrat\IeC {\'e}gias de resposta ao ataque}{15}{subsection.3.2.3}}
\@writefile{brf}{\backcite{taxonomy}{{16}{3.2.3}{subsection.3.2.3}}}
\@writefile{toc}{\contentsline {subsection}{\numberline {3.2.4}Implanta\IeC {\c c}\IeC {\~a}o do mecanismo de defesa}{16}{subsection.3.2.4}}
\citation{RFCSSL1}
\citation{RFCSSL1}
\citation{RFCSSL2}
\citation{RFCSSL2}
\citation{figSSL}
\citation{figSSL}
\citation{figSSL}
\citation{figSSL}
\citation{RFCSSL1}
\citation{RFCSSL1}
\citation{RFCSSL2}
\citation{RFCSSL2}
\@writefile{toc}{\contentsline {chapter}{\numberline {4}TLS/SSL}{17}{chapter.4}}
\@writefile{lof}{\addvspace {10\p@ }}
\@writefile{lot}{\addvspace {10\p@ }}
\@writefile{brf}{\backcite{RFCSSL1}{{17}{4}{chapter.4}}}
\@writefile{brf}{\backcite{RFCSSL2}{{17}{4}{chapter.4}}}
\@writefile{brf}{\backcite{figSSL}{{17}{4}{chapter.4}}}
\@writefile{lof}{\contentsline {figure}{\numberline {4.1}{\ignorespaces Esquema de localiza\IeC {\c c}\IeC {\~a}o do protocolo TLS/SSL na pilha TCP/IP ~\cite  {figSSL}. }}{17}{figure.4.1}}
\@writefile{brf}{\backcite{figSSL}{{17}{4.1}{figure.4.1}}}
\newlabel{fig:pilhaSSL}{{4.1}{17}{Esquema de localização do protocolo TLS/SSL na pilha TCP/IP ~\cite {figSSL}}{figure.4.1}{}}
\@writefile{brf}{\backcite{RFCSSL1}{{17}{4}{figure.4.1}}}
\@writefile{brf}{\backcite{RFCSSL2}{{17}{4}{figure.4.1}}}
\citation{assimetrica}
\citation{assimetrica}
\citation{assimetrica}
\citation{assimetrica}
\citation{figassimetrica}
\citation{figassimetrica}
\citation{figassimetrica}
\citation{figassimetrica}
\@writefile{toc}{\contentsline {section}{\numberline {4.1}Criptografia sim\IeC {\'e}trica e assim\IeC {\'e}trica}{18}{section.4.1}}
\@writefile{brf}{\backcite{assimetrica}{{18}{4.1}{section.4.1}}}
\@writefile{brf}{\backcite{assimetrica}{{18}{4.1}{section.4.1}}}
\@writefile{lof}{\contentsline {figure}{\numberline {4.2}{\ignorespaces Figura com o diagrama de uso de criptografia de chaves assim\IeC {\'e}tricas~\cite  {figassimetrica}(adaptada para o portugu\IeC {\^e}s). }}{19}{figure.4.2}}
\@writefile{brf}{\backcite{figassimetrica}{{19}{4.2}{figure.4.2}}}
\newlabel{fig:public}{{4.2}{19}{Figura com o diagrama de uso de criptografia de chaves assimétricas~\cite {figassimetrica}(adaptada para o português)}{figure.4.2}{}}
\@writefile{toc}{\contentsline {section}{\numberline {4.2}Certificados}{19}{section.4.2}}
\citation{RFCSSL1}
\citation{RFCSSL1}
\citation{RFCSSL2}
\citation{RFCSSL2}
\@writefile{lof}{\contentsline {figure}{\numberline {4.3}{\ignorespaces Exemplo de um certificado auto assinado e de campos de informa\IeC {\c c}\IeC {\~a}o dos certificados. }}{20}{figure.4.3}}
\newlabel{fig:selfcertificate}{{4.3}{20}{Exemplo de um certificado auto assinado e de campos de informação dos certificados}{figure.4.3}{}}
\@writefile{toc}{\contentsline {section}{\numberline {4.3}Fun\IeC {\c c}\IeC {\~o}es de resumo}{20}{section.4.3}}
\citation{figSSL}
\citation{figSSL}
\citation{cipher}
\citation{cipher}
\@writefile{toc}{\contentsline {section}{\numberline {4.4}\emph  {Handshake} TLS/SSL}{21}{section.4.4}}
\@writefile{brf}{\backcite{RFCSSL1}{{21}{4.4}{section.4.4}}}
\@writefile{brf}{\backcite{RFCSSL2}{{21}{4.4}{section.4.4}}}
\@writefile{lof}{\contentsline {figure}{\numberline {4.4}{\ignorespaces Exemplo de \emph  {client hello}, pode-se observar que o campo de sess\IeC {\~a}o est\IeC {\'a} vazio pois \IeC {\'e} uma nova sess\IeC {\~a}o.}}{21}{figure.4.4}}
\newlabel{fig:clienthello}{{4.4}{21}{Exemplo de \emph {client hello}, pode-se observar que o campo de sessão está vazio pois é uma nova sessão}{figure.4.4}{}}
\@writefile{brf}{\backcite{figSSL}{{21}{4.4}{figure.4.4}}}
\@writefile{lot}{\contentsline {table}{\numberline {4.1}{\ignorespaces Exemplos de \emph  {cipher suites} ~\cite  {cipher}.}}{22}{table.4.1}}
\@writefile{brf}{\backcite{cipher}{{22}{4.1}{table.4.1}}}
\@writefile{lof}{\contentsline {figure}{\numberline {4.5}{\ignorespaces Exemplo de \emph  {server hello}.}}{22}{figure.4.5}}
\newlabel{fig:serverhello}{{4.5}{22}{Exemplo de \emph {server hello}}{figure.4.5}{}}
\@writefile{lof}{\contentsline {figure}{\numberline {4.6}{\ignorespaces Exemplo completo, com todas as mensagens necess\IeC {\'a}rias na resposta do servidor.}}{23}{figure.4.6}}
\newlabel{fig:ser}{{4.6}{23}{Exemplo completo, com todas as mensagens necessárias na resposta do servidor}{figure.4.6}{}}
\@writefile{lof}{\contentsline {figure}{\numberline {4.7}{\ignorespaces Exemplo com a resposta final do cliente.}}{23}{figure.4.7}}
\newlabel{fig:clie}{{4.7}{23}{Exemplo com a resposta final do cliente}{figure.4.7}{}}
\@writefile{lof}{\contentsline {figure}{\numberline {4.8}{\ignorespaces Exemplo com a resposta final do servidor, finalizando o \emph  {handshake}.}}{24}{figure.4.8}}
\newlabel{fig:servvvv}{{4.8}{24}{Exemplo com a resposta final do servidor, finalizando o \emph {handshake}}{figure.4.8}{}}
\citation{RFCSSL1}
\citation{RFCSSL1}
\citation{RFCSSL2}
\citation{RFCSSL2}
\citation{figpacket}
\citation{figpacket}
\@writefile{lof}{\contentsline {figure}{\numberline {4.9}{\ignorespaces Exemplo geral de um \emph  {handshake}. Nota-se que o \emph  {encrypted handshake message} est\IeC {\'a} sendo chamando apenas de \emph  {finished}.}}{25}{figure.4.9}}
\newlabel{fig:handsssha}{{4.9}{25}{Exemplo geral de um \emph {handshake}. Nota-se que o \emph {encrypted handshake message} está sendo chamando apenas de \emph {finished}}{figure.4.9}{}}
\@writefile{toc}{\contentsline {section}{\numberline {4.5}Formato dos pacotes TLS/SSL}{25}{section.4.5}}
\@writefile{brf}{\backcite{RFCSSL1}{{25}{4.5}{section.4.5}}}
\@writefile{brf}{\backcite{RFCSSL2}{{25}{4.5}{section.4.5}}}
\citation{figpacket}
\citation{figpacket}
\citation{figpacket}
\citation{figpacket}
\citation{figpacket}
\citation{figpacket}
\@writefile{lot}{\contentsline {table}{\numberline {4.2}{\ignorespaces Tipos de pacotes TLS/SSL~\cite  {figpacket}.}}{26}{table.4.2}}
\@writefile{brf}{\backcite{figpacket}{{26}{4.2}{table.4.2}}}
\newlabel{tab:opcode}{{4.3}{26}{Formato dos pacotes TLS/SSL}{table.4.3}{}}
\@writefile{lot}{\contentsline {table}{\numberline {4.3}{\ignorespaces Tipos de mensagens durante o \emph  {handshake}~\cite  {figpacket}.}}{26}{table.4.3}}
\@writefile{brf}{\backcite{figpacket}{{26}{4.3}{table.4.3}}}
\@writefile{lof}{\contentsline {figure}{\numberline {4.10}{\ignorespaces Esquema geral de um pacote do protocolo TLS/SSL durante um \emph  {handshake}~\cite  {figpacket}(adaptada para o portugu\IeC {\^e}s).}}{27}{figure.4.10}}
\@writefile{brf}{\backcite{figpacket}{{27}{4.10}{figure.4.10}}}
\newlabel{fig:package}{{4.10}{27}{Esquema geral de um pacote do protocolo TLS/SSL durante um \emph {handshake}~\cite {figpacket}(adaptada para o português)}{figure.4.10}{}}
\@writefile{toc}{\contentsline {section}{\numberline {4.6}Diffie \& Hellman}{27}{section.4.6}}
\newlabel{eq1}{{4.1}{27}{Diffie \& Hellman}{equation.4.6.1}{}}
\newlabel{eq2}{{4.2}{27}{Diffie \& Hellman}{equation.4.6.2}{}}
\newlabel{eq3}{{4.3}{27}{Diffie \& Hellman}{equation.4.6.3}{}}
\newlabel{eq4}{{4.4}{27}{Diffie \& Hellman}{equation.4.6.4}{}}
\citation{diffie}
\citation{diffie}
\citation{diffie}
\citation{diffie}
\@writefile{lof}{\contentsline {figure}{\numberline {4.11}{\ignorespaces Diagrama da negocia\IeC {\c c}\IeC {\~a}o de chaves usando Diffie \& Hellman~\cite  {diffie}. Sendo `{}K'{} a chave, `{}g'{} o gerador, `{}p'{} um n\IeC {\'u}mero primo e `{}a'{} e `{}b'{} n\IeC {\'u}meros escolhidos aleat\IeC {\'o}riamente.}}{28}{figure.4.11}}
\@writefile{brf}{\backcite{diffie}{{28}{4.11}{figure.4.11}}}
\newlabel{fig:diffie}{{4.11}{28}{Diagrama da negociação de chaves usando Diffie \& Hellman~\cite {diffie}. Sendo \lq {}K\rq {} a chave, \lq {}g\rq {} o gerador, \lq {}p\rq {} um número primo e \lq {}a\rq {} e \lq {}b\rq {} números escolhidos aleatóriamente}{figure.4.11}{}}
\citation{thc}
\citation{thc}
\@writefile{toc}{\contentsline {chapter}{\numberline {5}Motiva\IeC {\c c}\IeC {\~o}es}{29}{chapter.5}}
\@writefile{lof}{\addvspace {10\p@ }}
\@writefile{lot}{\addvspace {10\p@ }}
\@writefile{toc}{\contentsline {section}{\numberline {5.1}Objetivos e C\IeC {\'o}digo de Conduta}{29}{section.5.1}}
\citation{thc}
\citation{thc}
\citation{thc2}
\citation{thc2}
\citation{vincent}
\citation{vincent}
\citation{vincent}
\citation{vincent}
\citation{nsa}
\citation{nsa}
\citation{nsa2}
\citation{nsa2}
\citation{nsa2}
\citation{nsa2}
\citation{pfs}
\citation{pfs}
\@writefile{toc}{\contentsline {section}{\numberline {5.2}Ataques relacionados}{30}{section.5.2}}
\@writefile{brf}{\backcite{thc}{{30}{5.2}{section.5.2}}}
\@writefile{brf}{\backcite{thc}{{30}{5.2}{section.5.2}}}
\@writefile{brf}{\backcite{thc2}{{30}{5.2}{section.5.2}}}
\@writefile{brf}{\backcite{vincent}{{30}{5.2}{section.5.2}}}
\@writefile{brf}{\backcite{vincent}{{30}{5.2}{section.5.2}}}
\@writefile{brf}{\backcite{nsa}{{30}{5.2}{section.5.2}}}
\@writefile{brf}{\backcite{nsa2}{{30}{5.2}{section.5.2}}}
\citation{nsa2}
\citation{nsa2}
\citation{pfs}
\citation{pfs}
\citation{pfs}
\citation{pfs}
\citation{nsa2}
\citation{nsa2}
\citation{vincent}
\citation{vincent}
\@writefile{brf}{\backcite{nsa2}{{31}{5.2}{section.5.2}}}
\@writefile{brf}{\backcite{pfs}{{31}{5.2}{section.5.2}}}
\@writefile{brf}{\backcite{nsa2}{{31}{5.2}{section.5.2}}}
\@writefile{brf}{\backcite{pfs}{{31}{5.2}{section.5.2}}}
\@writefile{brf}{\backcite{pfs}{{31}{5.2}{section.5.2}}}
\@writefile{brf}{\backcite{nsa2}{{31}{5.2}{section.5.2}}}
\@writefile{toc}{\contentsline {section}{\numberline {5.3}Contribui\IeC {\c c}\IeC {\~o}es e contrastes}{31}{section.5.3}}
\@writefile{brf}{\backcite{vincent}{{31}{5.3}{section.5.3}}}
\citation{vincent}
\citation{vincent}
\citation{nsa2}
\citation{nsa2}
\@writefile{brf}{\backcite{vincent}{{32}{5.3}{section.5.3}}}
\@writefile{brf}{\backcite{nsa2}{{32}{5.3}{section.5.3}}}
\citation{qt}
\citation{qt}
\citation{qt}
\citation{qt}
\citation{posix}
\citation{posix}
\citation{libevent}
\citation{libevent}
\citation{vincent}
\citation{vincent}
\@writefile{toc}{\contentsline {chapter}{\numberline {6}Implementa\IeC {\c c}\IeC {\~a}o e Testes}{33}{chapter.6}}
\@writefile{lof}{\addvspace {10\p@ }}
\@writefile{lot}{\addvspace {10\p@ }}
\@writefile{toc}{\contentsline {section}{\numberline {6.1}Implementa\IeC {\c c}\IeC {\~a}o}{33}{section.6.1}}
\@writefile{brf}{\backcite{qt}{{33}{6.1}{section.6.1}}}
\@writefile{brf}{\backcite{qt}{{33}{6.1}{section.6.1}}}
\@writefile{brf}{\backcite{posix}{{33}{6.1}{section.6.1}}}
\@writefile{brf}{\backcite{libevent}{{33}{6.1}{section.6.1}}}
\citation{libevent}
\citation{libevent}
\citation{qt}
\citation{qt}
\@writefile{brf}{\backcite{vincent}{{34}{6.1}{section.6.1}}}
\@writefile{brf}{\backcite{libevent}{{34}{6.1}{section.6.1}}}
\@writefile{brf}{\backcite{qt}{{34}{6.1}{section.6.1}}}
\citation{vincent}
\citation{vincent}
\citation{vincent}
\citation{vincent}
\citation{vincent}
\citation{vincent}
\@writefile{lot}{\contentsline {table}{\numberline {6.1}{\ignorespaces Descri\IeC {\c c}\IeC {\~a}o abreviada das diferen\IeC {\c c}as entre as quatro ferramentas.}}{35}{table.6.1}}
\newlabel{tab:tools}{{6.1}{35}{Descrição abreviada das diferenças entre as quatro ferramentas}{table.6.1}{}}
\@writefile{brf}{\backcite{vincent}{{35}{2}{table.6.1}}}
\@writefile{lof}{\contentsline {figure}{\numberline {6.1}{\ignorespaces Imagem contendo o \emph  {benchmark} de \emph  {ciphersuites} usado como par\IeC {\^a}metro~\cite  {vincent} (adaptada para o portugu\IeC {\^e}s).}}{36}{figure.6.1}}
\@writefile{brf}{\backcite{vincent}{{36}{6.1}{figure.6.1}}}
\newlabel{fig:cipherOnerosas}{{6.1}{36}{Imagem contendo o \emph {benchmark} de \emph {ciphersuites} usado como parâmetro~\cite {vincent} (adaptada para o português)}{figure.6.1}{}}
\@writefile{lof}{\contentsline {figure}{\numberline {6.2}{\ignorespaces Imagem contendo o fluxograma de como as ferramentas funcionam. Diferen\IeC {\c c}as bem sutis diferenciam as ferramentas, mas o funcinamento padr\IeC {\~a}o \IeC {\'e} o esquematizado.}}{37}{figure.6.2}}
\newlabel{fig:fluxo}{{6.2}{37}{Imagem contendo o fluxograma de como as ferramentas funcionam. Diferenças bem sutis diferenciam as ferramentas, mas o funcinamento padrão é o esquematizado}{figure.6.2}{}}
\@writefile{toc}{\contentsline {section}{\numberline {6.2}Ferramentas e metodologia usadas nos testes}{37}{section.6.2}}
\@writefile{lof}{\contentsline {figure}{\numberline {6.3}{\ignorespaces Imagem descrevendo a organiza\IeC {\c c}\IeC {\~a}o da bancada de testes. Atacante, cliente(simulando usu\IeC {\'a}rio leg\IeC {\'\i }timo) e servidor s\IeC {\~a}o todos ligados por cabos a um roteador exclusivo e isolado.}}{38}{figure.6.3}}
\newlabel{fig:bancada}{{6.3}{38}{Imagem descrevendo a organização da bancada de testes. Atacante, cliente(simulando usuário legítimo) e servidor são todos ligados por cabos a um roteador exclusivo e isolado}{figure.6.3}{}}
\citation{wireshark}
\citation{wireshark}
\citation{apache}
\citation{apache}
\@writefile{lot}{\contentsline {table}{\numberline {6.2}{\ignorespaces Configura\IeC {\c c}\IeC {\~a}o de hardware e software das m\IeC {\'a}quinas atacante e servidor.}}{39}{table.6.2}}
\newlabel{tab:config}{{6.2}{39}{Configuração de hardware e software das máquinas atacante e servidor}{table.6.2}{}}
\@writefile{brf}{\backcite{wireshark}{{39}{6.2}{table.6.2}}}
\@writefile{brf}{\backcite{apache}{{39}{6.2}{table.6.2}}}
\@writefile{toc}{\contentsline {chapter}{\numberline {7}Resutados}{40}{chapter.7}}
\@writefile{lof}{\addvspace {10\p@ }}
\@writefile{lot}{\addvspace {10\p@ }}
\@writefile{toc}{\contentsline {section}{\numberline {7.1}Primeira vers\IeC {\~a}o da ferramenta}{40}{section.7.1}}
\@writefile{lof}{\contentsline {figure}{\numberline {7.1}{\ignorespaces Gr\IeC {\'a}fico com os tempos m\IeC {\'e}dios de dura\IeC {\c c}\IeC {\~a}o de handshake durante o ataque com a primeira vers\IeC {\~a}o da ferramenta.}}{41}{figure.7.1}}
\newlabel{fig:f1-absoluto}{{7.1}{41}{Gráfico com os tempos médios de duração de handshake durante o ataque com a primeira versão da ferramenta}{figure.7.1}{}}
\@writefile{lof}{\contentsline {figure}{\numberline {7.2}{\ignorespaces Gr\IeC {\'a}fico com o aumento proporcional do tempo de resposta gerado pela primeira vers\IeC {\~a}o da ferramenta.}}{41}{figure.7.2}}
\newlabel{fig:f1-tempo}{{7.2}{41}{Gráfico com o aumento proporcional do tempo de resposta gerado pela primeira versão da ferramenta}{figure.7.2}{}}
\@writefile{lof}{\contentsline {figure}{\numberline {7.3}{\ignorespaces Gr\IeC {\'a}fico com o consumo de CPU gerado pela primeira vers\IeC {\~a}o da ferramenta.}}{42}{figure.7.3}}
\newlabel{fig:f1-cpu}{{7.3}{42}{Gráfico com o consumo de CPU gerado pela primeira versão da ferramenta}{figure.7.3}{}}
\@writefile{lot}{\contentsline {table}{\numberline {7.1}{\ignorespaces Estado das conex\IeC {\~o}es ocupadas durante ataque com a ferramenta vers\IeC {\~a}o 1.}}{43}{table.7.1}}
\newlabel{tab:f1-conexoes}{{7.1}{43}{Estado das conexões ocupadas durante ataque com a ferramenta versão 1}{table.7.1}{}}
\@writefile{toc}{\contentsline {section}{\numberline {7.2}Segunda vers\IeC {\~a}o da ferramenta}{43}{section.7.2}}
\@writefile{lof}{\contentsline {figure}{\numberline {7.4}{\ignorespaces Gr\IeC {\'a}fico com os tempos m\IeC {\'e}dios de dura\IeC {\c c}\IeC {\~a}o de handshake durante o ataque com a segunda vers\IeC {\~a}o da ferramenta.}}{44}{figure.7.4}}
\newlabel{fig:f2-absoluto}{{7.4}{44}{Gráfico com os tempos médios de duração de handshake durante o ataque com a segunda versão da ferramenta}{figure.7.4}{}}
\@writefile{lof}{\contentsline {figure}{\numberline {7.5}{\ignorespaces Gr\IeC {\'a}fico com o aumento proporcional do tempo de resposta gerado pela segunda vers\IeC {\~a}o da ferramenta.}}{44}{figure.7.5}}
\newlabel{fig:f2-tempo}{{7.5}{44}{Gráfico com o aumento proporcional do tempo de resposta gerado pela segunda versão da ferramenta}{figure.7.5}{}}
\@writefile{lof}{\contentsline {figure}{\numberline {7.6}{\ignorespaces Gr\IeC {\'a}fico com o consumo de CPU gerado pela segunda vers\IeC {\~a}o da ferramenta.}}{45}{figure.7.6}}
\newlabel{fig:f2-cpu}{{7.6}{45}{Gráfico com o consumo de CPU gerado pela segunda versão da ferramenta}{figure.7.6}{}}
\citation{libevent2}
\citation{libevent2}
\@writefile{lot}{\contentsline {table}{\numberline {7.2}{\ignorespaces Estado das conex\IeC {\~o}es ocupadas durante ataque com a ferramenta vers\IeC {\~a}o 2.}}{46}{table.7.2}}
\newlabel{tab:f2-conexoes}{{7.2}{46}{Estado das conexões ocupadas durante ataque com a ferramenta versão 2}{table.7.2}{}}
\@writefile{toc}{\contentsline {section}{\numberline {7.3}Vers\IeC {\~a}o da ferramenta com libevent e RSA}{46}{section.7.3}}
\@writefile{brf}{\backcite{libevent2}{{46}{7.3}{section.7.3}}}
\@writefile{lof}{\contentsline {figure}{\numberline {7.7}{\ignorespaces Gr\IeC {\'a}fico com os tempos m\IeC {\'e}dios de dura\IeC {\c c}\IeC {\~a}o de handshake durante o ataque com a vers\IeC {\~a}o da ferramenta usando libevent e RSA.}}{47}{figure.7.7}}
\newlabel{fig:f3-absoluto}{{7.7}{47}{Gráfico com os tempos médios de duração de handshake durante o ataque com a versão da ferramenta usando libevent e RSA}{figure.7.7}{}}
\@writefile{lof}{\contentsline {figure}{\numberline {7.8}{\ignorespaces Gr\IeC {\'a}fico com o aumento proporcional do tempo de resposta gerado pela vers\IeC {\~a}o da ferramenta com libevent e RSA. Nota-se o termo `clientes` para se referir as m\IeC {\'u}ltiplas inst\IeC {\^a}ncias usadas pela API.}}{47}{figure.7.8}}
\newlabel{fig:f3-tempo}{{7.8}{47}{Gráfico com o aumento proporcional do tempo de resposta gerado pela versão da ferramenta com libevent e RSA. Nota-se o termo `clientes` para se referir as múltiplas instâncias usadas pela API}{figure.7.8}{}}
\@writefile{lof}{\contentsline {figure}{\numberline {7.9}{\ignorespaces Gr\IeC {\'a}fico com o consumo de CPU gerado pela vers\IeC {\~a}o da ferramenta com libevent e RSA.}}{48}{figure.7.9}}
\newlabel{fig:f3-cpu}{{7.9}{48}{Gráfico com o consumo de CPU gerado pela versão da ferramenta com libevent e RSA}{figure.7.9}{}}
\@writefile{lot}{\contentsline {table}{\numberline {7.3}{\ignorespaces Estado das conex\IeC {\~o}es ocupadas durante ataque com a ferramenta libevent e RSA.}}{49}{table.7.3}}
\newlabel{tab:f3-conexoes}{{7.3}{49}{Estado das conexões ocupadas durante ataque com a ferramenta libevent e RSA}{table.7.3}{}}
\@writefile{toc}{\contentsline {section}{\numberline {7.4}Vers\IeC {\~a}o da ferramenta com libevent e Diffie \& Hellman}{49}{section.7.4}}
\@writefile{lof}{\contentsline {figure}{\numberline {7.10}{\ignorespaces Gr\IeC {\'a}fico com os tempos m\IeC {\'e}dios de dura\IeC {\c c}\IeC {\~a}o de handshake durante o ataque com a vers\IeC {\~a}o da ferramenta usando libevent e Diffie \& Hellman(\emph  {Perfect Foward Secrecy}).}}{50}{figure.7.10}}
\newlabel{fig:f4-absoluto}{{7.10}{50}{Gráfico com os tempos médios de duração de handshake durante o ataque com a versão da ferramenta usando libevent e Diffie \& Hellman(\emph {Perfect Foward Secrecy})}{figure.7.10}{}}
\@writefile{lof}{\contentsline {figure}{\numberline {7.11}{\ignorespaces Gr\IeC {\'a}fico com o aumento proporcional do tempo de resposta gerado pela vers\IeC {\~a}o da ferramenta com libevent e Diffie \& Hellman.}}{51}{figure.7.11}}
\newlabel{fig:f4-tempo}{{7.11}{51}{Gráfico com o aumento proporcional do tempo de resposta gerado pela versão da ferramenta com libevent e Diffie \& Hellman}{figure.7.11}{}}
\@writefile{lof}{\contentsline {figure}{\numberline {7.12}{\ignorespaces Gr\IeC {\'a}fico com o consumo de CPU gerado pela vers\IeC {\~a}o da ferramenta com libevent e Diffie \& Hellman.}}{52}{figure.7.12}}
\newlabel{fig:f4-cpu}{{7.12}{52}{Gráfico com o consumo de CPU gerado pela versão da ferramenta com libevent e Diffie \& Hellman}{figure.7.12}{}}
\@writefile{lot}{\contentsline {table}{\numberline {7.4}{\ignorespaces Estado das conex\IeC {\~o}es ocupadas durante ataque com a ferramenta libevent e Diffie \& Hellman.}}{53}{table.7.4}}
\newlabel{tab:f4-conexoes}{{7.4}{53}{Estado das conexões ocupadas durante ataque com a ferramenta libevent e Diffie \& Hellman}{table.7.4}{}}
\@writefile{toc}{\contentsline {chapter}{\numberline {8}Conclus\IeC {\~o}es}{54}{chapter.8}}
\@writefile{lof}{\addvspace {10\p@ }}
\@writefile{lot}{\addvspace {10\p@ }}
\@writefile{toc}{\contentsline {section}{\numberline {8.1}An\IeC {\'a}lise e classifica\IeC {\c c}\IeC {\~a}o}{54}{section.8.1}}
\@writefile{toc}{\contentsline {section}{\numberline {8.2}Sugest\IeC {\~o}es para a evolu\IeC {\c c}\IeC {\~a}o do ataque}{54}{section.8.2}}
\@writefile{toc}{\contentsline {section}{\numberline {8.3}Poss\IeC {\'\i }veis contramedidas}{55}{section.8.3}}
\citation{nsa}
\citation{nsa}
\bibstyle{plain}
\@writefile{brf}{\backcite{nsa}{{56}{8.3}{section.8.3}}}
\bibdata{bibliografia}
\bibcite{historiaINternet}{{1}{}{{}}{{}}}
\bibcite{posix}{{2}{}{{}}{{}}}
\bibcite{defcom}{{3}{}{{}}{{}}}
\bibcite{irc}{{4}{}{{}}{{}}}
\bibcite{thc}{{5}{}{{}}{{}}}
\bibcite{smurf}{{6}{}{{}}{{}}}
\bibcite{thc2}{{7}{}{{}}{{}}}
\bibcite{RFCSSL2}{{8}{}{{}}{{}}}
\bibcite{RFCSSL1}{{9}{}{{}}{{}}}
\bibcite{douligeris2007network}{{10}{}{{}}{{}}}
\bibcite{apache}{{11}{}{{}}{{}}}
\bibcite{wireshark}{{12}{}{{}}{{}}}
\bibcite{nsa}{{13}{}{{}}{{}}}
\bibcite{slowloris}{{14}{}{{}}{{}}}
\bibcite{harrington2005network}{{15}{}{{}}{{}}}
\@writefile{toc}{\contentsline {chapter}{Refer\^encias}{57}{section*.8}}
\bibcite{figpacket}{{16}{}{{}}{{}}}
\bibcite{cipher}{{17}{}{{}}{{}}}
\bibcite{kurose}{{18}{}{{}}{{}}}
\bibcite{libevent2}{{19}{}{{}}{{}}}
\bibcite{nsa2}{{20}{}{{}}{{}}}
\bibcite{taxonomy}{{21}{}{{}}{{}}}
\bibcite{stateoftheart}{{22}{}{{}}{{}}}
\bibcite{codigosHTTP}{{23}{}{{}}{{}}}
\bibcite{libevent}{{24}{}{{}}{{}}}
\bibcite{smurfDef}{{25}{}{{}}{{}}}
\bibcite{figassimetrica}{{26}{}{{}}{{}}}
\bibcite{dnsamp}{{27}{}{{}}{{}}}
\bibcite{qt}{{28}{}{{}}{{}}}
\bibcite{pfs}{{29}{}{{}}{{}}}
\bibcite{assimetrica}{{30}{}{{}}{{}}}
\bibcite{diffie}{{31}{}{{}}{{}}}
\bibcite{figSSL}{{32}{}{{}}{{}}}
\bibcite{vincent}{{33}{}{{}}{{}}}
\bibcite{trojan}{{34}{}{{}}{{}}}
\newlabel{TotPaginas}{{137}{58}{}{page.58}{}}
\providecommand\NAT@force@numbers{}\NAT@force@numbers
