A novel architecture for detecting and defending against flooding-based DDoS attacks

被引:0
作者
Shi, Y [1 ]
Yang, XY [1 ]
机构
[1] Xi An Jiao Tong Univ, Dept Comp Sci & Technol, Xian 710049, Peoples R China
来源
COMPUTATIONAL INTELLIGENCE AND SECURITY, PT 2, PROCEEDINGS | 2005年 / 3802卷
关键词
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Flooding-based distributed denial-of-service (DDoS) attack presents a very serious threat to the stability of the Internet. In this paper, we propose a novel global defense architecture to protect the entire Internet from DDoS attacks. This architecture includes all the three parts of defense during the DDoS attack: detection, filtering and traceback, and we use different agents distributed in routers or hosts to fulfill these tasks. The superiority of the architecture that makes it more effective includes: (i) the attack detection algorithm as well as attack filtering and traceback algorithm are both network traffic-based algorithms; (ii) our traceback algorithm itself also can mitigate the effects of the attacks. Our proposed scheme is implemented through simulations of detecting and defending SYN Flooding attack, which is an example of DDoS attack. The results show that such architecture is much effective because the performance of detection algorithm and traceback algorithm are both better.
引用
收藏
页码:364 / 374
页数:11
相关论文
共 15 条
  • [1] Bellovin S.M., 2000, Icmp traceback messages
  • [2] Statistical traffic modeling for network intrusion detection
    Cabrera, JBD
    Ravichandran, B
    Mehra, RK
    [J]. 8TH INTERNATIONAL SYMPOSIUM ON MODELING, ANALYSIS AND SIMULATION OF COMPUTER AND TELECOMMUNICATION SYSTEMS, PROCEEDINGS, 2000, : 466 - 473
  • [3] *COMP EM RESP TEAM, 1999, RES DISTR SYST INTR
  • [4] Ferguson P., 1998, 2267 RFC
  • [5] GARCIA RC, 2002, P IEEE MWSCAS 02, V3, P688
  • [6] HAINING W, 2002, P IEEE INFOCOM, V3, P1530
  • [7] JOHN ED, 2001, IFSA WORLD C 20 NAFI, V3, P1506
  • [8] Jonckheere E, 2002, P AMER CONTR CONF, V1-6, P2436, DOI 10.1109/ACC.2002.1024008
  • [9] Simulation of self-similarity in network utilization patterns as a precursor to automated testing of intrusion detection systems
    Nash, DA
    Ragsdale, DJ
    [J]. IEEE TRANSACTIONS ON SYSTEMS MAN AND CYBERNETICS PART A-SYSTEMS AND HUMANS, 2001, 31 (04): : 327 - 331
  • [10] Park K., 2001, PROC ACM C APPL TECH, P15