Optimal filter assignment policy against link flooding attack

被引:0
|
作者
Biswas, Rajorshi [1 ]
Wu, Jie [2 ]
Chang, Wei [3 ]
Ostovari, Pouya [4 ]
机构
[1] Penn State Univ Berks, Informat Sci & Technol, Reading, PA 19610 USA
[2] Temple Univ, Dept Comp & Informat Sci, Philadelphia, PA 19122 USA
[3] St Josephs Univ, Dept Comp Sci, Philadelphia, PA 19131 USA
[4] KLA Corp, Milpitas, CA 95035 USA
来源
HIGH-CONFIDENCE COMPUTING | 2025年 / 5卷 / 01期
关键词
Botnet; DDoS defense; Quality-of-service; Filter router; Link flooding attack; Network security;
D O I
10.1016/j.hcc.2024.100231
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
A Link Flooding Attack (LFA) is a special type of Denial-of-Service (DoS) attack in which the attacker sends out a huge number of requests to exhaust the capacity of a link on the path the traffic comes to a server. As a result, user traffic cannot reach the server. As a result, DoS and degradation of Quality- of-Service (QoS) occur. Because the attack traffic does not go to the victim, protecting the legitimate traffic alone is hard for the victim. The victim can protect its legitimate traffic by using a special type of router called filter router (FR). An FR can receive server filters and apply them to block a link incident to it. An FR probabilistically appends its own IP address to packets it forwards, and the victim uses that information to discover the traffic topology. By analyzing traffic rates and paths, the victim identifies some links that may be congested. The victim needs to select some of these possible congested links (PCLs) and send a filter to the corresponding FR so that legitimate traffic avoids congested paths. In this paper, we formulate two optimization problems for blocking the least number of PCLs so that the legitimate traffic goes through a non-congested path. We consider the scenario where every user has at least one non-congested shortest path in the first problem. We extend the first problem to a scenario where there are some users whose shortest paths are all congested. We transform the original problem to the vertex separation problem to find the links to block. We use a custom-built Java multi-threaded simulator and conduct extensive simulations to support our solutions. (c) 2024 The Author(s). Published by Elsevier B.V. on behalf of Shandong University. This is an open access article under the CC BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/).
引用
收藏
页数:10
相关论文
共 50 条
  • [1] Optimal Filter Assignment Policy Against Transit-link Distributed Denial-of-Service Attack
    Biswas, Rajorshi
    Wu, Jie
    Chang, Wei
    Ostovari, Pouya
    2019 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM), 2019,
  • [2] Optimal Filter Assignment Policy Against Distributed Denial-of-Service Attack
    Biswas, Rajorshi
    Wu, Jie
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2022, 19 (01) : 339 - 352
  • [3] Cost-Aware Optimal Filter Assignment Policy Against Distributed Denial-of-Service Attack
    Biswas, Rajorshi
    Wu, Jie
    Srinivasan, Avinash
    2019 RESILIENCE WEEK (RWS), 2019, : 57 - 63
  • [4] Filter Assignment Policy Against Distributed Denial-of-Service Attack
    Biswas, Rajorshi
    Wu, Jie
    2018 IEEE 24TH INTERNATIONAL CONFERENCE ON PARALLEL AND DISTRIBUTED SYSTEMS (ICPADS 2018), 2018, : 537 - 544
  • [5] A Policy based preventive measure against flooding attack in MANETs
    Kumar, Mohan S. B.
    Vijay, Anand K. M.
    Suhas, N. S.
    2016 IEEE INTERNATIONAL CONFERENCE ON RECENT TRENDS IN ELECTRONICS, INFORMATION & COMMUNICATION TECHNOLOGY (RTEICT), 2016, : 1612 - 1616
  • [6] A Lightweight Detection Using Bloom Filter against Flooding DDoS Attack
    Choi, Sanghun
    An, Yichen
    Sasase, Iwao
    IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2020, E103D (12) : 2600 - 2610
  • [7] Block Link Flooding Algorithm for TCP SYN Flooding Attack
    Nalayini, C. M.
    Katiravan, Jeevaa
    INTERNATIONAL CONFERENCE ON COMPUTER NETWORKS AND COMMUNICATION TECHNOLOGIES (ICCNCT 2018), 2019, 15 : 895 - 905
  • [8] AFA: Anti-Flooding Attack Scheme Against Flooding Attack in MANET
    Mankotia, Vivek
    Sunkaria, Ramesh Kumar
    Gurung, Shashi
    WIRELESS PERSONAL COMMUNICATIONS, 2023, 130 (02) : 1161 - 1190
  • [9] AFA: Anti-Flooding Attack Scheme Against Flooding Attack in MANET
    Vivek Mankotia
    Ramesh Kumar Sunkaria
    Shashi Gurung
    Wireless Personal Communications, 2023, 130 : 1161 - 1190
  • [10] Optimal DoS Attack Policy Against Remote State Estimation
    Zhang, Heng
    Cheng, Peng
    Shi, Ling
    Chen, Jiming
    2013 IEEE 52ND ANNUAL CONFERENCE ON DECISION AND CONTROL (CDC), 2013, : 5444 - 5449