Traffic redirection attack protection system (TRAPS)

被引:0
作者
Thing, VLL [1 ]
Lee, HCJ [1 ]
Sloman, M [1 ]
机构
[1] Univ London Imperial Coll Sci Technol & Med, Dept Comp, London SW7 2AZ, England
来源
Security and Privacy in the Age of Ubiquitous Computing | 2005年 / 181卷
关键词
distributed denial of service; attack response system; adaptive security;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Distributed Denial of Service (DDoS) attackers typically use spoofed IP addresses to prevent exposing their identities and easy filtering of attack traffic. This paper introduces a novel mitigation scheme, TRAPS, whereby the victim verifies source address authenticity by performing reconfiguration for traffic redirection and informing high ongoing-traffic correspondents. The spoofed sources are not informed and will continue to use the old configuration to send packets, which can then be easily filtered off. Adaptive rate-limiting can be used on the remaining traffic, which may be attack packets with randomly-generated spoofed IP addresses. We compare our various approaches for achieving TRAPS functionality. The end-host approach is based on standard Mobile IP protocol and does not require any new protocols, changes to Internet routers, nor prior traffic flow characterizations. It supports adaptive, real-time and automatic responses to DDoS attacks. Experiments are conducted to provide proof of concept.
引用
收藏
页码:309 / 325
页数:17
相关论文
共 24 条
[1]  
[Anonymous], 2000, IETF
[2]  
Aurobindo S., 1996, Crossroads, V2, P3
[3]  
BELLOVIN S, 2003, IN PRESS ICMP TRACEB
[4]  
Darmohray T., HOT SPARES DDOS ATTA
[5]  
DEAN D, 2001, NETW DISTR SYST SEC
[6]   Denial-of-service attacks rip the Internet [J].
Garber, L .
COMPUTER, 2000, 33 (04) :12-17
[7]  
Henry C. J. Lee, 2003, INT C INF COMM SEC O
[8]  
Houle Kevin J., 2001, Trends in denial of service attack technology
[9]  
Johnson D. B., 2004, 3775 IETF RFC
[10]  
Kent S., 1998, RFC 2401