Unified defense against DDoS attacks

被引:0
|
作者
Muthuprasanna, M. [1 ]
Manimaran, C. [1 ]
Wang, Z. [1 ]
机构
[1] Iowa State Univ, Ames, IA 50011 USA
关键词
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
With DoS/DDoS attacks emerging as one of the primary security threats in today's Internet, the search is on for an efficient DDoS defense mechanism that would provide attack prevention, mitigation and traceback features, in as few packets as possible and with no collateral damage. Although several techniques have been proposed to tackle this growing menace, there exists no effective solution to date, due to the growing sophistication of the attacks and also the increasingly complex Internet architecture. In this paper, we propose an unified framework that integrates traceback and mitigation capabilities for an effective attack defense. Some significant aspects of our approach include: (1) a novel data cube model to represent the traceback information, and its slicing along the lines of path signatures rather than router signatures, (2) characterizing traceback as a transmission scheduling problem on the data cube representation, and achieving scheduling optimality using a novel metric called utility, (3) and finally an information delivery architecture employing both packet marking and data logging in a distributed manner to achieve faster response times. The proposed scheme can thus provide both per-packet mitigation and multi-packet traceback capabilities due to effective data slicing of the cube, and can attain higher detection speeds due to novel utility rate analysis. We also contrast this unified scheme with other well-known schemes in literature to understand the performance tradeoffs, while providing an experimental evaluation of the proposed scheme on real data sets.
引用
收藏
页码:1047 / +
页数:3
相关论文
共 50 条
  • [31] An elastic and resiliency defense against DDoS attacks on the critical DNS authoritative infrastructure
    Wang, Zheng
    JOURNAL OF COMPUTER AND SYSTEM SCIENCES, 2019, 99 : 1 - 26
  • [32] Secure Double-layered Defense against HTTP-DDoS Attacks
    Samir, Mohamad
    Aida, Hitoshi
    2017 IEEE 41ST ANNUAL COMPUTER SOFTWARE AND APPLICATIONS CONFERENCE (COMPSAC), VOL 2, 2017, : 572 - 577
  • [33] Collaborative defense mechanism using statistical detection method against DDoS attacks
    Song, ByungHak
    Heo, Joon
    Hong, Choong Seon
    IEICE TRANSACTIONS ON COMMUNICATIONS, 2007, E90B (10) : 2655 - 2664
  • [34] A Survey of Defense Mechanisms Against Distributed Denial of Service (DDoS) Flooding Attacks
    Zargar, Saman Taghavi
    Joshi, James
    Tipper, David
    IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2013, 15 (04): : 2046 - 2069
  • [35] Research on the detection and defense systems against DDoS attacks in ad hoc networks
    Jing, Huang
    Wen, Wushao
    INFORMATION SCIENCE AND MANAGEMENT ENGINEERING, VOLS 1-3, 2014, 46 : 1161 - 1167
  • [36] DDoS attacks defense based on active networks
    Chen, Jui-Ming
    Wang, Kai-Ping
    Chou, Li-Der
    Journal of Internet Technology, 2006, 7 (02): : 205 - 213
  • [37] A Recent Survey on DDoS Attacks and Defense Mechanisms
    Srivastava, A.
    Gupta, B. B.
    Tyagi, A.
    Sharma, Anupama
    Mishra, Anupama
    ADVANCES IN PARALLEL, DISTRIBUTED COMPUTING, 2011, 203 : 570 - 580
  • [38] Engineering of a global defense infrastructure for DDoS attacks
    Wan, KKK
    Chang, RKC
    10TH IEEE INTERNATIONAL CONFERENCE ON NETWORKS (ICON 2002), PROCEEDINGS, 2002, : 419 - 427
  • [39] A Selective Defense for Application Layer DDoS Attacks
    Dantas, Yuri G.
    Nigam, Vivek
    Fonseca, Iguatemi E.
    2014 IEEE JOINT INTELLIGENCE AND SECURITY INFORMATICS CONFERENCE (JISIC), 2014, : 75 - 82
  • [40] Trilateral Trust Based Defense Mechanism against DDoS Attacks in Cloud Computing Environment
    Iyengar, N. Ch. S. N.
    Ganapathy, Gopinath
    CYBERNETICS AND INFORMATION TECHNOLOGIES, 2015, 15 (02) : 119 - 140