A Novel DDoS Attack Defending Framework with Minimized Bilateral Damages

被引:0
作者
Chen, Yu [1 ]
Ku, Wei-Shinn [2 ]
Sakai, Kazuya [2 ]
DeCruze, Christopher [1 ]
机构
[1] SUNY Binghamton, Dept Elect & Comp Engn, Binghamton, NY 13902 USA
[2] Auburn Univ, Dept Comp Sci & Software Engn, Auburn, AL 36849 USA
来源
2010 7TH IEEE CONSUMER COMMUNICATIONS AND NETWORKING CONFERENCE-CCNC 2010 | 2010年
关键词
Network security; DDoS Attacks; Traffic verification; Proof-of-work system;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Distributed Denial of Service (DDoS) attacks are one of the most damaging threats against Internet based applications. Many of the DDoS defense mechanisms may unintentionally deny a certain portion of legitimate user accesses by mistaking them as attackers or may simply not block enough traffic to adequately protect the victim. Other better performing systems have not yet to reach adoption because of designs that require a substantial investment into the Internet infrastructure before offering much effectiveness. This paper proposes Heimdall, a novel traffic verification based framework to protect legitimate traffic from bilateral damages. Based on a proof-of-work technique and application of distributed hash ID, aside from protecting established connections, our system can validate new initial request for communication and open valid channels between users and the protected server. Through intensive simulation experiments on the ns-2 network simulator, we verified that Heimdall scheme can effectively protect legitimate communications and filter out malicious flows with very high accuracy.
引用
收藏
页码:1 / +
页数:2
相关论文
共 14 条
  • [1] BENCSATH B, 2004, W SIM MULT JAN
  • [2] Challita A., 2004, FEA STUD C
  • [3] Chen Y, 2005, 25th IEEE International Conference on Distributed Computing Systems Workshops, Proceedings, P123
  • [4] Chen Y., 2007, IEEE T PARALLEL DIST, V18
  • [5] Cook D., 2003, P 11 IEEE INT C NETW, P455
  • [6] IOANNIDIS J, 2002, NETW DISTR SYST SEC, P100
  • [7] JIN G, 2003, P 10 ACM C COMP COMM
  • [8] Controlling high bandwidth aggregates in the network
    Mahajan, R
    Bellovin, SM
    Floyd, S
    Ioannidis, J
    Paxson, V
    Shenker, S
    [J]. ACM SIGCOMM COMPUTER COMMUNICATION REVIEW, 2002, 32 (03) : 62 - 73
  • [9] A taxonomy of DDoS attack and DDoS Defense mechanisms
    Mirkovic, J
    Reiher, P
    [J]. ACM SIGCOMM COMPUTER COMMUNICATION REVIEW, 2004, 34 (02) : 39 - 53
  • [10] Mirkovic J., 2002, IEEE INT C NETW PROT