Mitigating Distributed Denial of Service Attacks in Multiparty Applications in the Presence of Clock Drifts

被引:18
作者
Fu, Zhang [1 ]
Papatriantafilou, Marina [1 ]
Tsigas, Philippas [1 ]
机构
[1] Chalmers Univ Technol, Dept Comp Sci & Engn, SE-41296 Gothenburg, Sweden
关键词
Clock drift; data communication; denial of service attack; reliability; application;
D O I
10.1109/TDSC.2012.18
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Network-based applications commonly open some known communication port(s), making themselves easy targets for (distributed) Denial of Service (DoS) attacks. Earlier solutions for this problem are based on port-hopping between pairs of processes which are synchronous or exchange acknowledgments. However, acknowledgments, if lost, can cause a port to be open for longer time and thus be vulnerable, while time servers can become targets to DoS attack themselves. Here, we extend port-hopping to support multiparty applications, by proposing the BIGWHEEL algorithm, for each application server to communicate with multiple clients in a port-hopping manner without the need for group synchronization. Furthermore, we present an adaptive algorithm, HOPERAA, for enabling hopping in the presence of bounded asynchrony, namely, when the communicating parties have clocks with clock drifts. The solutions are simple, based on each client interacting with the server independently of the other clients, without the need of acknowledgments or time server(s). Further, they do not rely on the application having a fixed port open in the beginning, neither do they require the clients to get a "first-contact" port from a third party. We show analytically the properties of the algorithms and also study experimentally their success rates, confirm the relation with the analytical bounds.
引用
收藏
页码:401 / 413
页数:13
相关论文
共 27 条
[1]  
Andersen D.G., 2003, USITS'03: Proceedings of the 4th conference on USENIX Symposium on Internet Technologies and Systems, P3
[2]  
Anderson T., 2003, P WORKSH HOT TOP NET
[3]  
[Anonymous], 2010, CA199728 CERT
[4]  
Argyraki K., 2005, ATEC 05, P10
[5]  
Badishi G, 2007, IEEE T DEPEND SECURE, V4, P191, DOI [10.1109/TDSC.2007.70209, 10.1109/TDSC.2007.70209.]
[6]  
Dean D., 2002, ACM Transactions on Information and Systems Security, V5, P119, DOI 10.1145/505586.505588
[7]  
Fu X., 2006, P INT WORKSH NETW OP
[8]  
Fu Z., 2008, P IEEE INT S REL DIS
[9]   Optimal frequency hopping sequences: A combinatorial approach [J].
Fuji-Hara, R ;
Miao, Y ;
Mishima, M .
IEEE TRANSACTIONS ON INFORMATION THEORY, 2004, 50 (10) :2408-2420
[10]   Further combinatorial constructions for optimal frequency-hopping sequences [J].
Ge, Gennian ;
Fuji-Hara, Ryoh ;
Miao, Ying .
JOURNAL OF COMBINATORIAL THEORY SERIES A, 2006, 113 (08) :1699-1718