Resisting network DDoS attacks by packet asymmetry path marking

被引:0
作者
Jin, Guang [1 ]
Yang, Jiangang [1 ]
Wei, Wei [1 ]
Dong, Yabo [1 ]
机构
[1] Zhejiang Univ, Coll Comp Sci & Technol, Hangzhou 310027, Peoples R China
来源
2007 SECOND INTERNATIONAL CONFERENCE IN COMMUNICATIONS AND NETWORKING IN CHINA, VOLS 1 AND 2 | 2007年
关键词
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
A novel packet marking scheme is proposed to defend against network or bandwidth DDoS attacks, especially where malicious packets do not target the victim directly. A recent study shows that packet-level symmetry exists in legitimate Internet traffic while malicious flooding traffic often exhibits packet asymmetry. Our scheme utilizes the packet asymmetry to differentiate malicious and legitimate traffic. When a packet to a destination host is transmitted from a router, a packet asymmetry score, the ratio of transmitted to received packets of the destination host over the last interval, is calculated and recorded into the packet's header additively. Malicious packets should carry higher scores because of the absence of reverse packets. When packets with packet asymmetry scores arrive at a downstream router, where some packets are dropped because of congestion, the router should drop packets with higher scores preferentially. Simulation results show the scheme is effective to defend against DDoS attacks targeting network resources.
引用
收藏
页码:363 / 367
页数:5
相关论文
共 15 条
[1]  
[Anonymous], 2000, P 2000 ACM SIGCOMM C
[2]   DDoS attacks and defense mechanisms: classification and state-of-the-art [J].
Douligeris, C ;
Mitrokotsa, A .
COMPUTER NETWORKS, 2004, 44 (05) :643-666
[3]   Random Early Detection Gateways for Congestion Avoidance [J].
Floyd, Sally ;
Jacobson, Van .
IEEE-ACM TRANSACTIONS ON NETWORKING, 1993, 1 (04) :397-413
[4]   A practical and robust inter-domain marking scheme for IP traceback [J].
Gao, Zhiqiang ;
Ansari, Nirwan .
COMPUTER NETWORKS, 2007, 51 (03) :732-750
[5]  
HE Y, 2005, P IEEE GLOBECOM
[6]   Deterministic packet marking based on redundant decomposition for IP traceback [J].
Jin, Guang ;
Yang, Jiangang .
IEEE COMMUNICATIONS LETTERS, 2006, 10 (03) :204-206
[7]   Defeating distributed denial-of-service attack with deterministic bit marking [J].
Kim, Y ;
Jo, JY ;
Merat, FL .
GLOBECOM'03: IEEE GLOBAL TELECOMMUNICATIONS CONFERENCE, VOLS 1-7, 2003, :1363-1367
[8]  
KIM Y, 2006, P IEEE ICC JUN
[9]  
KREIBICH C, 2005, P ACM HOTNETS, V4
[10]   Defending against spoofed DDoS attacks with path fingerprint [J].
Lee, FY ;
Shieh, S .
COMPUTERS & SECURITY, 2005, 24 (07) :571-586