Mitigating network denial-of-service through diversity-based traffic management

被引:0
作者
Matrawy, A [1 ]
van Orschot, PC [1 ]
Somayaji, A [1 ]
机构
[1] Carleton Univ, Ottawa, ON K1S 5B6, Canada
来源
APPLIED CRYPTOGRAPHY AND NETWORK SECURITY, PROCEEDINGS | 2005年 / 3531卷
关键词
network denial of service; flash worms; traffic shaping; network security; diversity;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper we explore the feasibility of mitigating network denial-of-service (NDoS) attacks (attacks that consume network bandwidth) by dynamically regulating learned classes of network traffic. Our classification technique clusters packets based on the similarity of their contents - both headers and payloads - using a variation of n-grams which we call (p, n)-grams. We then allocate shares of bandwidth to each of these clusters using an adaptive traffic management technique. Our design intent is that excessive bandwidth consumers (e.g. UDP worms, flash crowds) are segregated so that they cannot consume bandwidth to the exclusion of other network traffic. Because this strategy, under congestion conditions, increases the packet drop rate experienced by sets of similar flows and thus reduces the relative drop rate of other, dissimilar flows, we characterize this strategy as diversity-based traffic management. We explain the approach at a high level and report on preliminary results that indicate that network traffic can be quickly and concisely learned, and that this classification can be used to regulate the bandwidth allocated to both constant packet and polymorphic flash UDP worms.
引用
收藏
页码:104 / 121
页数:18
相关论文
共 26 条
[1]  
[Anonymous], CS20030761 UCSD
[2]  
BLAKE S, 1988, 2475 RFC
[3]  
Clark D., 1988, IEEE ACM T NETWORK, V6, P362
[4]  
ELWALID A, 1997, P IEEE INFOCOM 97
[5]   New directions in traffic measurement and accounting: Focusing on the elephants, ignoring the mice [J].
Estan, C ;
Varghese, G .
ACM TRANSACTIONS ON COMPUTER SYSTEMS, 2003, 21 (03) :270-313
[6]  
ESTAN C, 2003, P ACM SIGCOMM 03 GER, P270
[7]  
Floyd S., 1994, Computer Communication Review, V24, P8, DOI 10.1145/205511.205512
[8]   Promoting the use of end-to-end congestion control in the Internet [J].
Floyd, S ;
Fall, K .
IEEE-ACM TRANSACTIONS ON NETWORKING, 1999, 7 (04) :458-472
[9]   Random Early Detection Gateways for Congestion Avoidance [J].
Floyd, Sally ;
Jacobson, Van .
IEEE-ACM TRANSACTIONS ON NETWORKING, 1993, 1 (04) :397-413
[10]   Efficient network QoS provisioning based on per node traffic shaping [J].
Georgiadis, L ;
Guerin, R ;
Peris, V ;
Sivarajan, KN .
IEEE-ACM TRANSACTIONS ON NETWORKING, 1996, 4 (04) :482-501