An efficient and practical Defense method against DDoS attack at the source-end

被引:0
|
作者
He, YX [1 ]
Chen, W [1 ]
Xiao, B [1 ]
Peng, WL [1 ]
机构
[1] Wuhan Univ, Comp Sch, State Key Lab Software Engn, Wuhan 430072, Peoples R China
来源
11TH INTERNATIONAL CONFERENCE ON PARALLEL AND DISTRIBUTED SYSTEMS WORKSHOPS, VOL II, PROCEEDINGS, | 2005年
关键词
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Distributed Denial-of-Service (DDoS) attack is one of the most serious threats to the internet. Detecting DDoS at the source-end has many advantages over defense at the victim-end and intermediate-network. One of the main problems for source-end methods is the performance degradation brought by these methods, which discourages Internet Service Providers(ISPs) to deploy the defense system. We propose an efficient detection approach, which only requires limited fixed-length memory and low computation overhead but provides satisfying detection results. The low cost of defense is expected to attract more ISPs to join the defense. The experiments results show our approach is efficient and feasible for defense at the source-end.
引用
收藏
页码:265 / 269
页数:5
相关论文
共 50 条
  • [41] RootkitDet: Practical End-to-End Defense against Kernel Rootkits in a Cloud Environment
    Zhang, Lingchen
    Shetty, Sachin
    Liu, Peng
    Jing, Jiwu
    COMPUTER SECURITY - ESORICS 2014, PT II, 2014, 8713 : 475 - 493
  • [42] A practical method to detect spoofed DDoS traffic and its source on the enterprise network
    Lee, Seung Il
    Jun, Eun Hyun
    Lee, Jin Taek
    WMSCI 2006: 10TH WORLD MULTI-CONFERENCE ON SYSTEMICS, CYBERNETICS AND INFORMATICS, VOL II, PROCEEDINGS, 2006, : 291 - +
  • [43] A Blind Detection Method for Tracing the Real Source of DDoS Attack Packets by Cluster Matching
    Chen, Yonghong
    Chen, Xin
    Tian, Hui
    Wang, Tian
    Cai, Yiqiao
    PROCEEDINGS OF 2016 8TH IEEE INTERNATIONAL CONFERENCE ON COMMUNICATION SOFTWARE AND NETWORKS (ICCSN 2016), 2016, : 551 - 555
  • [44] Collaborative Defense Method Against DDoS Attacks on SDN-Architected Cloud Servers
    Zhang, Yiying
    Xu, Yao
    Han, Longzhe
    Liang, Kun
    Li, Wenjing
    ADVANCED INTELLIGENT COMPUTING TECHNOLOGY AND APPLICATIONS, PT IV, ICIC 2024, 2024, 14865 : 362 - 370
  • [45] Enhanced Mixup Training: a Defense Method Against Membership Inference Attack
    Chen, Zongqi
    Li, Hongwei
    Hao, Meng
    Xu, Guowen
    INFORMATION SECURITY PRACTICE AND EXPERIENCE, ISPEC 2021, 2021, 13107 : 32 - 45
  • [46] Intrusion Detection System-An Efficient way to Thwart against Dos/DDos Attack in the Cloud Environment
    Aishwarya, R.
    Malliga, S.
    2014 INTERNATIONAL CONFERENCE ON RECENT TRENDS IN INFORMATION TECHNOLOGY (ICRTIT), 2014,
  • [47] A Dynamic Evolutionary Game-based Defense Method for Mining Pools against DDoS Attacks
    Huang, Zhao
    Gao, Xin
    Liu, Xiao
    Fan, Lu
    Wang, Junjun
    Wang, Quan
    2024 INTERNATIONAL CONFERENCE ON NETWORKING AND NETWORK APPLICATIONS, NANA 2024, 2024, : 299 - 304
  • [48] Efficient Based on Improved Random Forest Defense System Against Application-Layer DDoS Attacks
    He, Junjiang
    Fang, Wenbo
    Lan, Xiaolong
    Yang, Geying
    Chen, Ziyu
    Chen, Yang
    Li, Tao
    Chen, Jiangchuan
    INTERNATIONAL JOURNAL OF INTELLIGENT SYSTEMS, 2024, 2024
  • [49] A Cost-effective Shuffling Method against DDoS Attacks using Moving Target Defense
    Zhou, Yuyang
    Cheng, Guang
    Jiang, Shanqing
    Hu, Ying
    Zhao, Yuyu
    Chen, Zihan
    PROCEEDINGS OF THE 6TH ACM WORKSHOP ON MOVING TARGET DEFENSE, MTD 2019, 2019, : 57 - 66
  • [50] An Efficient Defense Scheme Against SIP DoS Attack in SDN Using Cloud SFW
    Liu, ZengGuang
    Yin, XiaoChun
    Lee, Hoon Jae
    2014 NINTH ASIA JOINT CONFERENCE ON INFORMATION SECURITY (ASIA JCIS), 2014, : 52 - 55