A new perspective in defending against DDoS

被引:0
|
作者
Chen, SG [1 ]
Chow, R [1 ]
机构
[1] Univ Florida, Dept Comp & Informat Sci & Engn, Gainesville, FL 32611 USA
来源
10TH IEEE INTERNATIONAL WORKSHOP ON FUTURE TRENDS OF DISTRIBUTED COMPUTING SYSTEMS, PROCEEDINGS | 2004年
关键词
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Distributed denial of service (DDoS) is a major threat to the availability of Internet services. The anonymity allowed by IP networking, together with the distributed, large scale nature of the Internet, makes DDoS attacks stealthy and difficult to counter As various attack tools become widely available and require minimum knowledge to operate, automated anti-DDoS systems are increasingly important. This paper studies the problem of providing an anti-DoS service (called AID) for general-purpose TCP-based public servers. We design a random peer-to-peer (RP2P) network that connects the registered client networks with the registered servers. RP2P is easy to manage and its longest path length is just three hops. The AID service ensures that the registered client networks can always access the registered servers even when they are under DoS attacks. It creates the financial incentive for commercial companies to provide the service, and meets the need for enterprises without the expertise to outsource their anti-DoS operations.
引用
收藏
页码:186 / 190
页数:5
相关论文
共 50 条
  • [11] An SDN-based Approach For Defending Against Reflective DDoS Attacks
    Lukaseder, Thomas
    StOlzle, Kevin
    Kleber, Stephan
    Erb, Benjamin
    Kargl, Frank
    PROCEEDINGS OF THE 2018 IEEE 43RD CONFERENCE ON LOCAL COMPUTER NETWORKS (LCN), 2018, : 299 - 302
  • [12] Defending Dos/DDOS attacks using network new technology
    Lu, N
    Chen, HX
    Xiao, J
    ICCC2004: Proceedings of the 16th International Conference on Computer Communication Vol 1and 2, 2004, : 1612 - 1617
  • [13] Scheme of defending against DDoS attacks in large-scale ISP networks
    Wu, Zhi-jun
    Zhang, Dong
    NETWORK AND PARALLEL COMPUTING, PROCEEDINGS, 2007, 4672 : 296 - +
  • [14] Defending Root DNS Servers against DDoS Using Layered Defenses (Extended)
    Rizvi, A. S. M.
    Mirkovic, Jelena
    Heidemann, John
    Hardaker, Wesley
    Story, Robert
    AD HOC NETWORKS, 2023, 151
  • [15] Filtering spoofed traffic at source end for defending against DoS/DDoS attacks
    Malliga, S.
    Tamilarasi, A.
    Janani, M.
    ICCN: 2008 INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATION AND NETWORKING, 2008, : 216 - 220
  • [16] A novel architecture for detecting and defending against flooding-based DDoS attacks
    Shi, Y
    Yang, XY
    COMPUTATIONAL INTELLIGENCE AND SECURITY, PT 2, PROCEEDINGS, 2005, 3802 : 364 - 374
  • [17] A multilevel thrust filtration defending mechanism against DDoS attacks in cloud computing environment
    Iyengar, N. Ch. Sriman Narayana
    Ganapathy, Gopinath
    Kumar, P. C. Mogan
    Abraham, Ajith
    INTERNATIONAL JOURNAL OF GRID AND UTILITY COMPUTING, 2014, 5 (04) : 236 - 248
  • [18] Defending against DDoS Attacks under IP Spoofing Using Image Processing Approach
    Kim, Tae Hwan
    Kim, Dong Seong
    Jung, Hee Young
    IEICE TRANSACTIONS ON COMMUNICATIONS, 2016, E99B (07) : 1511 - 1522
  • [19] Defending Against Evolving DDoS Attacks: A Case Study Using Link Flooding Incidents
    Kang, Min Suk
    Gligor, Virgil D.
    Sekar, Vyas
    SECURITY PROTOCOLS XXIV, 2017, 10368 : 47 - 57
  • [20] Defending Against Meek DDoS Attacks By IP Traceback-based Rate Limiting
    Jing, Yinan
    Wang, Xueping
    Xiao, Xiaochun
    Zhang, Gendu
    GLOBECOM 2006 - 2006 IEEE GLOBAL TELECOMMUNICATIONS CONFERENCE, 2006,