Understanding Internet DDoS Mitigation from Academic and Industrial Perspectives

被引:24
作者
Cao, Yuan [1 ]
Gao, Yuan [1 ]
Tan, Rongjun [1 ]
Han, Qingbang [1 ]
Liu, Zhuotao [2 ]
机构
[1] Hohai Univ, Coll Internet Things Engn, Changzhou 213022, Peoples R China
[2] Univ Illinois, Elect & Comp Engn Dept, Urbana, IL 61801 USA
基金
中国国家自然科学基金;
关键词
DDoS attacks; defense; deployability; ATTACKS; FILTER;
D O I
10.1109/ACCESS.2018.2877710
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Defending against distributed denial of service (DDoS) attacks in the Internet is a fundamental problem. One practical approach to addressing DDoS attacks is to redirect all destination (e.g., via DNS or BGP) to a third-party, DDoS protection-as-a-service provider (e.g., Cloudflare and Akamai), which is well provisioned and equipped with proprietary filtering mechanisms to remove attack traffic before passing the remaining traffic to the destination. Although such an approach is appealing, as it requires no modification to the existing Internet infrastructure and can scale to handle very large attacks, recent industrial interviews with more than 100 interviewees from over 10 industry segments reveal that this approach alone is not sufficient, especially for large organizations (e.g., Web hosting companies and government) that cannot afford to allow third-parity security-service providers to terminate their network connections. Instead, these organizations have to rely on their ISPs to filter attack traffic. In this paper, we discuss the challenges faced by the ISPs in order to disrupt the Internet security-service market and sketch our solutions, powered by smart contracts.
引用
收藏
页码:66641 / 66648
页数:8
相关论文
共 45 条
[1]  
Afanasyev A., 2013, P IFIP NETW C, P1
[2]   Accountable Internet Protocol (AIP) [J].
Andersen, David G. ;
Balakrishnan, Hari ;
Feamster, Nick ;
Koponen, Teemu ;
Moon, Daekyeong ;
Shenker, Scott .
ACM SIGCOMM COMPUTER COMMUNICATION REVIEW, 2008, 38 (04) :339-350
[3]  
Andersen DG, 2003, USENIX ASSOCIATION PROCEEDINGS OF THE 4TH USENIX SYMPOSIUM ON INTERNET TECHNOLOGIES AND SYSTEMS (USITS'03), P31
[4]  
[Anonymous], 2002, PROC NETW DISTRIB SY
[5]  
[Anonymous], 2011, EVERYONE SHOULD BE D
[6]  
[Anonymous], 2016, QUEUE
[7]  
Antonakakis M, 2017, PROCEEDINGS OF THE 26TH USENIX SECURITY SYMPOSIUM (USENIX SECURITY '17), P1093
[8]  
Argyraki K, 2005, USENIX ASSOCIATION PROCEEDINGS OF THE GENERAL TRACK: 2005 UNENIX ANNUAL TECHNICAL CONFERENCE, P135
[9]  
Argyraki K., 2005, P HOTN, P140
[10]  
Basescu C., 2016, P NDSS, P1