Elimination of DoS UDP Reflection Amplification Bandwidth Attacks, Protecting TCP Services

被引:5
作者
Booth, Todd G. [1 ]
Andersson, Karl [2 ]
机构
[1] Lulea Univ Technol, Informat Syst, Skelleftea, Sweden
[2] Lulea Univ Technol, Mobile & Pervas Comp, Skelleftea, Sweden
来源
FUTURE NETWORK SYSTEMS AND SECURITY, FNSS 2015 | 2015年 / 523卷
关键词
DoS; DDoS; Reflection; Amplification; Bandwidth; UDP; Cyber-attacks; Critical Infrastructure Protection; Design Science Research; DDOS ATTACKS; DEFENSE;
D O I
10.1007/978-3-319-19210-9_1
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper, we propose a solution to eliminate a popular type of Denial of Service (DoS) attack, which is a DoS amplification attack. Note that a DoS is a subset of DDoS. Our solution protects servers running any number of TCP services. This paper is focused on the most popular type of DoS amplification attack, which uses the UDP protocol. Via DoS UDP amplification attacks, an attacker can send a 1 Gbps traffic stream to reflectors. The reflectors will then send up 556 times that amount (amplified traffic) to the victim's server. So just ten PCs, each sending 10Mbps, can send 55 Gbps indirectly, via reflectors, to a victim's server. Very few ISP customers have 55 Gpbs provisioned. Expensive and complex solutions exist. However our elimination techniques can be implemented very quickly, easily and at an extremely low cost.
引用
收藏
页码:1 / 15
页数:15
相关论文
共 14 条
  • [1] [Anonymous], BRIT SPIES HIT ANONY, V2015
  • [2] [Anonymous], UDP BAS AMPL ATT US
  • [3] [Anonymous], INT J APPL ENG RES
  • [4] An empirical evaluation of information metrics for low-rate and high-rate DDoS attack detection
    Bhuyan, Monowar H.
    Bhattacharyya, D. K.
    Kalita, J. K.
    [J]. PATTERN RECOGNITION LETTERS, 2015, 51 : 1 - 7
  • [5] Bandwidth Distributed Denial of Service: Attacks and Defenses
    Geva, Moti
    Herzberg, Amir
    Gev, Yehoshua
    [J]. IEEE SECURITY & PRIVACY, 2014, 12 (01) : 54 - 61
  • [6] A pioneer scheme in the detection and defense of DrDoS attack involving spoofed flooding packets
    Kavisankar, L.
    Chellappan, C.
    Sivasankar, P.
    Karthi, Ashwin
    Srinivas, A.
    [J]. KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2014, 8 (05): : 1726 - 1743
  • [7] Preserving quality of service for normal users against DDoS attacks by using Double Check Priority Queues
    Lin, Chu-Hsing
    Lin, Hung-Yan
    Wu, Tang-Wei
    Chen, Ying-Hsuan
    Huang, Chien-Hua
    [J]. JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING, 2013, 4 (02) : 275 - 282
  • [8] Filtering location optimization for the reactive packet filtering
    Lu, Ning
    Wang, Yulong
    Su, Sen
    Yang, Fangchun
    Han, Rui
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2014, 7 (07) : 1150 - 1164
  • [9] Estimation of the available bandwidth ratio of a remote link or path segments
    Nam, Seung Yeob
    Kim, Seong Joon
    Lee, Sihyung
    Kim, Hyong S.
    [J]. COMPUTER NETWORKS, 2013, 57 (01) : 61 - 77
  • [10] Panja B., 2013, RECENT PAT COMPUT SC, V6, P73