A new perspective in defending against DDoS

被引:0
|
作者
Chen, SG [1 ]
Chow, R [1 ]
机构
[1] Univ Florida, Dept Comp & Informat Sci & Engn, Gainesville, FL 32611 USA
来源
10TH IEEE INTERNATIONAL WORKSHOP ON FUTURE TRENDS OF DISTRIBUTED COMPUTING SYSTEMS, PROCEEDINGS | 2004年
关键词
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Distributed denial of service (DDoS) is a major threat to the availability of Internet services. The anonymity allowed by IP networking, together with the distributed, large scale nature of the Internet, makes DDoS attacks stealthy and difficult to counter As various attack tools become widely available and require minimum knowledge to operate, automated anti-DDoS systems are increasingly important. This paper studies the problem of providing an anti-DoS service (called AID) for general-purpose TCP-based public servers. We design a random peer-to-peer (RP2P) network that connects the registered client networks with the registered servers. RP2P is easy to manage and its longest path length is just three hops. The AID service ensures that the registered client networks can always access the registered servers even when they are under DoS attacks. It creates the financial incentive for commercial companies to provide the service, and meets the need for enterprises without the expertise to outsource their anti-DoS operations.
引用
收藏
页码:186 / 190
页数:5
相关论文
共 50 条
  • [1] AN APPROACH OF DEFENDING AGAINST DDOS ATTACK
    Wu Zhijun Duan Haixin Li Xing (Network Research Center
    Journal of Electronics(China), 2006, (01) : 148 - 153
  • [2] AN APPROACH OF DEFENDING AGAINST DDOS ATTACK
    Wu Zhijun Duan Haixin Li Xing Network Research Center Tsinghua University Beijing China Tianjin Key Lab for Advanced Signal Processing Civil Aviation University of China Tianjin China
    Journal of Electronics, 2006, (01) : 148 - 153
  • [3] An Adaptive Approach for Defending against DDoS Attacks
    Li, Muhai
    Li, Ming
    MATHEMATICAL PROBLEMS IN ENGINEERING, 2010, 2010
  • [4] Practical Techniques for Defending against DDoS Attacks
    Chen, Eric Y.
    Yonezawa, Akinori
    3RD ACS/IEEE INTERNATIONAL CONFERENCE ON COMPUTER SYSTEMS AND APPLICATIONS, 2005, 2005,
  • [5] Defending against spoofed DDoS attacks with path fingerprint
    Lee, FY
    Shieh, S
    COMPUTERS & SECURITY, 2005, 24 (07) : 571 - 586
  • [6] Defending wireless infrastructure against the challenge of DDoS attacks
    Geng, XJ
    Huang, Y
    Whinston, AB
    MOBILE NETWORKS & APPLICATIONS, 2002, 7 (03): : 213 - 223
  • [7] Two Layer Defending Mechanism against DDoS Attacks
    Subramanian, Kiruthika
    Gunasekaran, Preetha
    Selvaraj, Mercy
    INTERNATIONAL ARAB JOURNAL OF INFORMATION TECHNOLOGY, 2015, 12 (04) : 317 - 324
  • [8] Defending Wireless Infrastructure Against the Challenge of DDoS Attacks
    Xianjun Geng
    Yun Huang
    Andrew B. Whinston
    Mobile Networks and Applications, 2002, 7 : 213 - 223
  • [9] A Defending Mechanism against DDoS Based on Registration and Authentication
    Zhang, Wei
    Guo, Shize
    Zheng, Kangfeng
    Yang, Yixian
    PROCEEDINGS OF THE 9TH INTERNATIONAL CONFERENCE FOR YOUNG COMPUTER SCIENTISTS, VOLS 1-5, 2008, : 2192 - 2197
  • [10] Defending Root DNS Servers Against DDoS Using Layered Defenses
    Rizvi, A. S. M.
    Mirkovic, Jelena
    Heidemann, John
    Hardaker, Wesley
    Story, Robert
    2023 15TH INTERNATIONAL CONFERENCE ON COMMUNICATION SYSTEMS & NETWORKS, COMSNETS, 2023,