Joint application and network defense against DDoS flooding attacks in the future Internet

被引:0
|
作者
Karrer, Roger P. [1 ]
Kuehn, Ulrich [2 ]
Huehn, Thomas [1 ]
机构
[1] TU Berlin, Deutsch Telekom Labs, Berlin, Germany
[2] Sirrix AG, Bochum, Germany
来源
FGCN: PROCEEDINGS OF THE 2008 SECOND INTERNATIONAL CONFERENCE ON FUTURE GENERATION COMMUNICATION AND NETWORKING, VOLS 1 AND 2 | 2008年
关键词
D O I
暂无
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
The threat of Denial of Service flooding attacks in the Internet is rapidly increasing. Especially the use of techniques that allow attackers to hide their attack traffic. raises concerns: attack distribution and rotation in botnets to obfuscate senders, low-rate bandwidth attacks, and attacks that mimic realistic patterns such as flash crowds. The defense against such attacks is limited due to a deadlock: the attacks must. be stopped inside the network, but the network is unable to distinguish legitimate and unsolicited traffic. In contrast, end systems may distinguish legitimate users from bots, but are unable to stop the attacks inside the network. This paper advocates for a joint end system-network defense to address such attacks in the future. Edge-based Capabilities (EC) is a novel framework that combines end-to-end authentication with network-based control. Applications authenticate legitimate senders and issue capabilities to tag their packets, and the network filters out untagged packets. This paper describes the mechanisms that make EC a secure, efficient, and scalable solution. Moreover, we argue that EC is an attractive solution because it can be incrementally deployed and because it provides the right incentives to users, servers, and ISPs.
引用
收藏
页码:9 / +
页数:2
相关论文
共 50 条
  • [1] TDFA: Traceback-based Defense against DDoS Flooding Attacks
    Foroushani, Vahid Aghaei
    Zincir-Heywood, A. Nur
    2014 IEEE 28TH INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS (AINA), 2014, : 597 - 604
  • [2] Preventing DDoS Flooding Attacks With Cryptographic Path Identifiers in Future Internet
    Luo, Hongbin
    Liu, Zhoubiao
    Zhang, Shan
    IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT, 2022, 19 (02): : 1690 - 1704
  • [3] Scalable Network-Layer Defense Against Internet Bandwidth-Flooding Attacks
    Argyraki, Katerina
    Cheriton, David R.
    IEEE-ACM TRANSACTIONS ON NETWORKING, 2009, 17 (04) : 1284 - 1297
  • [4] Simulation of Internet DDoS attacks and defense
    Kotenko, Igor
    Ulanov, Alexander
    INFORMATION SECURITY, PROCEEDINGS, 2006, 4176 : 327 - 342
  • [5] A Survey of Defense Mechanisms Against Distributed Denial of Service (DDoS) Flooding Attacks
    Zargar, Saman Taghavi
    Joshi, James
    Tipper, David
    IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2013, 15 (04): : 2046 - 2069
  • [6] Unified defense against DDoS attacks
    Muthuprasanna, M.
    Manimaran, C.
    Wang, Z.
    NETWORKING 2007: AD HOC AND SENSOR NETWORKS, WIRELESS NETWORKS, NEXT GENERATION INTERNET, PROCEEDINGS, 2007, 4479 : 1047 - +
  • [7] Neighbor Stranger Discrimination: A New Defense Mechanism Against Internet DDoS Attacks
    Itani, Sleiman
    Aaraj, Najwa
    Abdelahad, Darine
    Kayssi, Ayman
    3RD ACS/IEEE INTERNATIONAL CONFERENCE ON COMPUTER SYSTEMS AND APPLICATIONS, 2005, 2005,
  • [8] A Distributed Collaborative Entrance Defense Framework Against DDoS Attacks on Satellite Internet
    Guo, Wei
    Xu, Jin
    Pei, Yukui
    Yin, Liuguo
    Jiang, Chunxiao
    Ge, Ning
    IEEE INTERNET OF THINGS JOURNAL, 2022, 9 (17) : 15497 - 15510
  • [9] A collaborative defense mechanism against DDoS attacks for network service continuity
    Park, PyungKoo
    Yoo, Seongmin
    Ryu, Hoyong
    Park, Jaehyung
    Chung, Kyung-Ho
    Ryou, Jaecheol
    ASIA LIFE SCIENCES, 2015, : 93 - 107
  • [10] A distributed defense framework for flooding-based DDoS attacks
    You, Yonghua
    Zulkernine, Mohammad
    Haque, Anwar
    ARES 2008: PROCEEDINGS OF THE THIRD INTERNATIONAL CONFERENCE ON AVAILABILITY, SECURITY AND RELIABILITY, 2008, : 245 - +