An Effective Approach to Counter Application Layer DDoS Attacks

被引:0
作者
Devi, S. Renuka [1 ]
Yogesh, P. [1 ]
机构
[1] Anna Univ, Coll Engn, Dept Informat Sci & Technol, Madras, Tamil Nadu, India
来源
2012 THIRD INTERNATIONAL CONFERENCE ON COMPUTING COMMUNICATION & NETWORKING TECHNOLOGIES (ICCCNT) | 2012年
关键词
DDoS; Flash Crowd; Application Layer;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Distributed Denial of Service (DDoS) attacks are posing major threat to today's essential Internet service because of its ability to create a hue volume of unwanted traffic. It is hard to detect and respond to DDoS attacks due to large and complex network environments. It becomes more serious when such attacks occur during the flash crowd. Both Flash crowds and DDoS attacks have very similar properties in terms of internet traffic; however Flash crowds are legitimate flows and DDoS attacks are illegitimate flows. This paper proposes a scheme to counter application layer DDoS attack and to schedule the flash crowd during DDoS attacks. In this scheme, an Access Matrix is defined to capture the access patterns of the legitimate clients and the normal flash crowd. Dimensionality reduction schemes are applied to reduce the multidimensional Access Matrix. A counter-mechanism consisting of a suspicion assignment mechanism and a scheduler is deployed. The suspicion mechanism assigns a score to each client session, and the scheduler decides whether to forward the session's requests or to drop the request based on the suspicion score.
引用
收藏
页数:4
相关论文
共 17 条
  • [1] Cabrera J. B. D., 2001, 2001 IEEE/IFIP International Symposium on Integrated Network Management Proceedings. Integrated Network Management VII. Integrated Management Strategies for the New Millennium (Cat. No.01EX470), P609, DOI 10.1109/INM.2001.918069
  • [2] Fodor I.K, 2002, SURVEY DIMENSION RED, DOI DOI 10.2172/15002155
  • [3] Jayashree P., 2008, UBIQUITOUS COMPUTING
  • [4] Jung J., 2002, Proc. of the International World Wide Web Conference, P252
  • [5] Keromytis A. D., 2004, SELECTED AREAS COMMU, V22
  • [6] Li K., 2009, 3 INT C NETW SYST SE
  • [7] Limwiwatkul L, 2004, IEEE INTERNATIONAL SYMPOSIUM ON COMMUNICATIONS AND INFORMATION TECHNOLOGIES 2004 (ISCIT 2004), PROCEEDINGS, VOLS 1 AND 2, P605
  • [8] Perrig A., 2003, STACKPI NEW DEFENSE
  • [9] Ranjan Supranamaya, 2009, IEEE ACM T NETWORKIN, V17
  • [10] Tanachaiwiwat S., 2003, ACM C COMP COMM SEC