A Four-Step Technique for Tackling DDoS Attacks

被引:4
作者
Beitollahi, Hakem [1 ]
Deconinck, Geert [1 ]
机构
[1] Katholieke Univ Leuven, Dept Elect Engn, Louvain, Belgium
来源
ANT 2012 AND MOBIWIS 2012 | 2012年 / 10卷
关键词
Denial of service attacks; Network security; Rate limiting; OF-SERVICE ATTACKS; NETWORK;
D O I
10.1016/j.procs.2012.06.065
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
This paper proposes a novel feedback-based control technique that tackles distributed denial of service (DDoS) attacks in four consecutive phases. While protection routers close to the server control inbound traffic rate and keeps the server alive (phase 1), the server negotiate with upstream routers close to traffic sources to install leaky-buckets for its IP address. The negotiation continues until a defense router on each traffic link accepts the request (phase 2). Next, the server through a feedback-control process adjusts size of leaky-buckets until inbound traffic locates in a desired range (phase 3). Then through a fingerprint test, the server detects which port interfaces of defense routers purely carry good traffic and subsequently asks corresponding defense routers to remove the leaky-bucket limitations for those port interfaces. Additionally, the server amends size of leaky-buckets for the defense routers proportional to amount of good traffic that each one carries (phase 4). Simulation-based results shows that our technique effectively, defenses a victim server against various DDoS attacks such that in most cases more than 90% of good inbound traffic reaches the server while the DDoS attack has been controlled as well. (C) 2011 Published by Elsevier Ltd.
引用
收藏
页码:507 / 516
页数:10
相关论文
共 14 条
  • [1] Topology based packet marking
    Al-Duwairi, B
    Daniels, TE
    [J]. ICCCN 2004: 13TH INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATIONS AND NETWORKS, PROCEEDINGS, 2004, : 146 - 151
  • [2] Internet traffic characterization using packet-pair probing
    Cheng, Yu
    Ravindran, Vikrarn
    Leon-Garcia, Alberto
    [J]. INFOCOM 2007, VOLS 1-5, 2007, : 1766 - +
  • [3] CLAFFY K, 2000, COMMUNICATION
  • [4] Dean D., ACM T INFORM SYSTEM, V5
  • [5] Goodrich M.T., 2002, Proceedings of the 9th ACM conference on Computer and communications security, P117
  • [6] Denial of service attacks on network-based control systems: Impact and mitigation
    Long, Men
    Wu, Chwan-Hwa
    Hung, John Y.
    [J]. IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2005, 1 (02) : 85 - 96
  • [7] Mah B. A., 1997, P INF 97 KOB JAP
  • [8] Controlling high bandwidth aggregates in the network
    Mahajan, R
    Bellovin, SM
    Floyd, S
    Ioannidis, J
    Paxson, V
    Shenker, S
    [J]. ACM SIGCOMM COMPUTER COMMUNICATION REVIEW, 2002, 32 (03) : 62 - 73
  • [9] D-WARD: A source-end defense against flooding denial-of-service attacks
    Mirkovic, J
    Reiher, P
    [J]. IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2005, 2 (03) : 216 - 232
  • [10] Mirkovic J., 2003, P NEW SEC PAR WORKSH