A new perspective in defending against DDoS

被引:0
|
作者
Chen, SG [1 ]
Chow, R [1 ]
机构
[1] Univ Florida, Dept Comp & Informat Sci & Engn, Gainesville, FL 32611 USA
来源
10TH IEEE INTERNATIONAL WORKSHOP ON FUTURE TRENDS OF DISTRIBUTED COMPUTING SYSTEMS, PROCEEDINGS | 2004年
关键词
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Distributed denial of service (DDoS) is a major threat to the availability of Internet services. The anonymity allowed by IP networking, together with the distributed, large scale nature of the Internet, makes DDoS attacks stealthy and difficult to counter As various attack tools become widely available and require minimum knowledge to operate, automated anti-DDoS systems are increasingly important. This paper studies the problem of providing an anti-DoS service (called AID) for general-purpose TCP-based public servers. We design a random peer-to-peer (RP2P) network that connects the registered client networks with the registered servers. RP2P is easy to manage and its longest path length is just three hops. The AID service ensures that the registered client networks can always access the registered servers even when they are under DoS attacks. It creates the financial incentive for commercial companies to provide the service, and meets the need for enterprises without the expertise to outsource their anti-DoS operations.
引用
收藏
页码:186 / 190
页数:5
相关论文
共 50 条
  • [41] Defending application DDoS with constraint random request attacks
    Yen, W
    Lee, MF
    2005 ASIA-PACIFIC CONFERENCE ON COMMUNICATIONS (APCC), VOLS 1& 2, 2005, : 620 - 624
  • [42] Defending against SARS-CoV-2: The T cell perspective
    Almendro-Vazquez, Patricia
    Laguna-Goya, Rocio
    Paz-Artal, Estela
    FRONTIERS IN IMMUNOLOGY, 2023, 14
  • [43] DCAL: A New Method for Defending Against Adversarial Examples
    Lin, Xiaoyu
    Cao, Chunjie
    Wang, Longjuan
    Liu, Zhiyuan
    Li, Mengqian
    Ma, Haiying
    ARTIFICIAL INTELLIGENCE AND SECURITY, ICAIS 2022, PT II, 2022, 13339 : 38 - 50
  • [44] The new cold war: Defending against criminal EMI
    Anon
    Compliance Engineering, 2001, 18 (04): : 12 - 19
  • [45] IP traceback-based intelligent packet filtering: A novel technique for defending against Internet DDoS attacks
    Sung, MH
    Xu, J
    10TH IEEE INTERNATIONAL CONFERENCE ON NETWORK PROTOCOLS, PROCEEDINGS, 2002, : 302 - 311
  • [46] IP traceback-based intelligent packet filtering: A novel technique for defending against internet DDoS attacks
    Sung, MH
    Xu, J
    IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2003, 14 (09) : 861 - 872
  • [47] Defending Application Layer DDoS Attacks via Multidimensional Parallelotope
    Zhao, Xiaolin
    Peng, Hui
    Li, Xiang
    Li, Yue
    Xue, Jingfeng
    Liang, Yaoyuan
    Pei, Mingzhe
    SECURITY AND COMMUNICATION NETWORKS, 2020, 2020
  • [48] A Novel DDoS Attack Defending Framework with Minimized Bilateral Damages
    Chen, Yu
    Ku, Wei-Shinn
    Sakai, Kazuya
    DeCruze, Christopher
    2010 7TH IEEE CONSUMER COMMUNICATIONS AND NETWORKING CONFERENCE-CCNC 2010, 2010, : 1 - +
  • [49] SAV-D: Defending DDoS with Incremental Deployment of SAV
    Hui, Linbo
    Zhang, Lei
    Hu, Yannan
    Wu, Jianping
    Cui, Yong
    IEEE INTERNET COMPUTING, 2023, 27 (03) : 44 - 49
  • [50] Defending HTTP Web Servers against DDoS Attacks through Busy Period-based Attack Flow Detection
    Nam, Seung Yeob
    Djuraev, Sirojiddin
    KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2014, 8 (07): : 2512 - 2531