A new perspective in defending against DDoS

被引:0
|
作者
Chen, SG [1 ]
Chow, R [1 ]
机构
[1] Univ Florida, Dept Comp & Informat Sci & Engn, Gainesville, FL 32611 USA
来源
10TH IEEE INTERNATIONAL WORKSHOP ON FUTURE TRENDS OF DISTRIBUTED COMPUTING SYSTEMS, PROCEEDINGS | 2004年
关键词
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Distributed denial of service (DDoS) is a major threat to the availability of Internet services. The anonymity allowed by IP networking, together with the distributed, large scale nature of the Internet, makes DDoS attacks stealthy and difficult to counter As various attack tools become widely available and require minimum knowledge to operate, automated anti-DDoS systems are increasingly important. This paper studies the problem of providing an anti-DoS service (called AID) for general-purpose TCP-based public servers. We design a random peer-to-peer (RP2P) network that connects the registered client networks with the registered servers. RP2P is easy to manage and its longest path length is just three hops. The AID service ensures that the registered client networks can always access the registered servers even when they are under DoS attacks. It creates the financial incentive for commercial companies to provide the service, and meets the need for enterprises without the expertise to outsource their anti-DoS operations.
引用
收藏
页码:186 / 190
页数:5
相关论文
共 50 条
  • [21] A multilevel thrust filtration defending mechanism against DDoS attacks in cloud computing environment
    Iyengar, N. Ch. Sriman Narayana, 1600, Inderscience Enterprises Ltd., 29, route de Pre-Bois, Case Postale 856, CH-1215 Geneva 15, CH-1215, Switzerland (05):
  • [22] Mempool Optimization for Defending Against DDoS Attacks in PoW-based Blockchain Systems
    Saad, Muhammad
    Njilla, Laurent
    Kamhoua, Charles
    Kim, Joongheon
    Nyang, DaeHun
    Mohaisen, Aziz
    2019 IEEE INTERNATIONAL CONFERENCE ON BLOCKCHAIN AND CRYPTOCURRENCY (ICBC), 2019, : 285 - 292
  • [23] Isolation of DDoS Attack in IoT: A New Perspective
    Upendra Kumar
    Shreyshi Navaneet
    Neeraj Kumar
    Subhash Chandra Pandey
    Wireless Personal Communications, 2020, 114 : 2493 - 2510
  • [24] Defending Against Ddos Attacks in Rpl Using Subjective Logic Based Trust Approach For IOT
    Kiran, Vidhu
    Sardana, Anita
    Kaur, Puninder
    2022 2nd International Conference on Advance Computing and Innovative Technologies in Engineering, ICACITE 2022, 2022, : 1656 - 1660
  • [25] VHSAP-based approach of defending against DDoS attacks for cloud computing routing platforms
    Wu, Zhi-Jun
    Cui, Yi
    Yue, Meng
    Tongxin Xuebao/Journal on Communications, 2015, 36 (01):
  • [26] Isolation of DDoS Attack in IoT: A New Perspective
    Kumar, Upendra
    Navaneet, Shreyshi
    Kumar, Neeraj
    Pandey, Subhash Chandra
    WIRELESS PERSONAL COMMUNICATIONS, 2020, 114 (03) : 2493 - 2510
  • [27] Defending Cloud Computing Environment Against the Challenge of DDoS Attacks Based on Software Defined Network
    Tsai, Shuen-Chih
    Liu, I-Hsien
    Lu, Chien-Tung
    Chang, Chan-Hua
    Li, Jung-Shian
    ADVANCES IN INTELLIGENT INFORMATION HIDING AND MULTIMEDIA SIGNAL PROCESSING, VOL 1, 2017, 63 : 285 - 292
  • [28] IDR: An intrusion detection router for defending against Distributed Denial-of-Service (DDoS) attacks
    Chan, EYK
    Chan, HW
    Chan, KM
    Chan, VPS
    Chanson, ST
    Cheung, MMH
    Chong, CF
    Chow, KP
    Hui, AKT
    Hui, LCK
    Lam, LCK
    Lau, WC
    Pun, KKH
    Tsang, AYF
    Tsang, WW
    Tso, SCW
    Yeung, DY
    Yu, KY
    I-SPAN 2004: 7TH INTERNATIONAL SYMPOSIUM ON PARALLEL ARCHITECTURES, ALGORITHMS AND NETWORKS, PROCEEDINGS, 2004, : 581 - 586
  • [29] An Adversarial DBN-LSTM Method for Detecting and Defending against DDoS Attacks in SDN Environments
    Chen, Lei
    Wang, Zhihao
    Huo, Ru
    Huang, Tao
    ALGORITHMS, 2023, 16 (04)
  • [30] Defending Against DDOS Attacks on IoT Network Throughput: A Trust-Stackelberg Game Model
    Qi, Chunyang
    Huang, Jie
    Huang, Cheng
    Wu, Huaqing
    Shen, Xuemin
    2022 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM 2022), 2022, : 6259 - 6264