Scalable Network-Layer Defense Against Internet Bandwidth-Flooding Attacks

被引:39
作者
Argyraki, Katerina [1 ]
Cheriton, David R. [2 ]
机构
[1] Ecole Polytech Fed Lausanne, Sch Comp & Commun Sci, CH-1015 Lausanne, Switzerland
[2] Stanford Univ, Dept Comp Sci, Stanford, CA 94305 USA
关键词
Denial-of-service defenses; network-level security and protection; traffic filtering;
D O I
10.1109/TNET.2008.2007431
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
In a bandwidth-flooding attack, compromised sources send high-volume traffic to the target with the purpose of causing congestion in its tail circuit and disrupting its legitimate communications. In this paper, we present Active Internet Traffic Filtering (AITF), a network-layer defense mechanism against such attacks. AITF enables a receiver to contact misbehaving sources and ask them to stop sending it traffic; each source that has been asked to stop is policed by its own Internet service provider (ISP), which ensures its compliance. An ISP that hosts misbehaving sources either supports AITF ( and accepts to police its misbehaving clients), or risks losing all access to the complaining receiver-this is a strong incentive to cooperate, especially when the receiver is a popular public-access site. We show that AITF preserves a significant fraction of a receiver's bandwidth in the face of bandwidth flooding, and does so at a per-client cost that is already affordable for today's ISPs; this per-client cost is not expected to increase, as long as botnet-size growth does not outpace Moore's law. We also show that even the first two networks that deploy AITF can maintain their connectivity to each other in the face of bandwidth flooding. We conclude that the network-layer of the Internet can provide an effective, scalable, and incrementally deployable solution against bandwidth-flooding attacks.
引用
收藏
页码:1284 / 1297
页数:14
相关论文
empty
未找到相关数据