PathFinder: Capturing DDoS Traffic Footprints on the Internet

被引:0
|
作者
Shi, Lumin [1 ]
Zhang, Mingwei [1 ]
Li, Jun [1 ]
Reiher, Peter [2 ]
机构
[1] Univ Oregon, Eugene, OR 97403 USA
[2] Univ Calif Los Angeles, Los Angeles, CA USA
来源
2018 IFIP NETWORKING CONFERENCE (IFIP NETWORKING) AND WORKSHOPS | 2018年
关键词
distributed denial-of-service; DDoS; traffic foot-print; autonomous system (AS); PFTrie; IP TRACEBACK;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
While distributed denial-of-service (DDoS) attacks are easy to launch and are becoming more damaging, the defense against DDoS attacks often suffers from the lack of relevant knowledge of the DDoS traffic, including the paths the DDoS traffic has used, the source addresses (spoofed or not) that appear along each path, and the amount of traffic per path or per source. Though IP traceback and path inference approaches could be considered, they are either expensive and hard to deploy or inaccurate. We propose PathFinder, a service that a DDoS defense system can use to obtain the footprints of the DDoS traffic to the victim as is. It introduces a PFTrie data structure with multiple design features to log traffic at line rate, and is easy to implement and deploy on today's Internet. We show that PathFinder can significantly improve the efficacy of a DDoS defense system, while PathFinder itself is fast and has a manageable overhead.
引用
收藏
页码:10 / 18
页数:9
相关论文
共 50 条
  • [1] On Capturing DDoS Traffic Footprints on the Internet
    Shi, Lumin
    Li, Jun
    Zhang, Mingwei
    Reiher, Peter
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2022, 19 (04) : 2755 - 2770
  • [2] Effect of DDoS Attacks on Traffic Features
    Erhan, Derya
    Anarim, Emin
    Kurt, Gunes Karabulut
    Kosar, Rabun
    2013 21ST SIGNAL PROCESSING AND COMMUNICATIONS APPLICATIONS CONFERENCE (SIU), 2013,
  • [3] Backtracking Performance Analysis of Internet Protocol for DDoS Flooding Detection
    Thenmozhi, R.
    Karthikeyan, P.
    Vijayakumar, V.
    Keerthana, M.
    Amudhavel, J.
    2015 INTERNATIONAL CONFERENCED ON CIRCUITS, POWER AND COMPUTING TECHNOLOGIES (ICCPCT-2015), 2015,
  • [4] Simulation of Internet DDoS attacks and defense
    Kotenko, Igor
    Ulanov, Alexander
    INFORMATION SECURITY, PROCEEDINGS, 2006, 4176 : 327 - 342
  • [5] DDoS Attacks With Randomized Traffic Innovation: Botnet Identification Challenges and Strategies
    Matta, Vincenzo
    Di Mauro, Mario
    Longo, Maurizio
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2017, 12 (08) : 1844 - 1859
  • [6] An Approach to Secure Internet of Things Against DDoS
    Sonar, Krushang
    Upadhyay, Hardik
    PROCEEDINGS OF INTERNATIONAL CONFERENCE ON ICT FOR SUSTAINABLE DEVELOPMENT ICT4SD 2015, VOL 2, 2016, 409 : 367 - 376
  • [7] Defending DDoS in the Insecure Internet of Things: A Survey
    Malik, Manisha
    Kamaldeep
    Dutta, Maitreyee
    ARTIFICIAL INTELLIGENCE AND EVOLUTIONARY COMPUTATIONS IN ENGINEERING SYSTEMS, ICAIECES 2017, 2018, 668 : 223 - 233
  • [8] Traffic Anomaly Detection in DDos Flooding Attack
    Purwanto, Yudha
    Hendrawan, Kuspriyanto
    Rahardjo, Budi
    2014 8TH INTERNATIONAL CONFERENCE ON TELECOMMUNICATION SYSTEMS SERVICES AND APPLICATIONS (TSSA), 2014,
  • [9] A DDOS defence scheme based on two- stage traffic flow control
    Li, Qingxia
    Wei, Wenhong
    Tao, Ming
    Chen, Qian
    INTERNATIONAL JOURNAL OF COMMUNICATION NETWORKS AND DISTRIBUTED SYSTEMS, 2014, 13 (3-4) : 290 - 300
  • [10] Re-Traffic Pricing for fighting against DDoS
    Shen, Yue-Yun
    Fan, Feng-Qin
    Xie, Wen-Xiu
    Mo, Lu-Feng
    2008 ISECS INTERNATIONAL COLLOQUIUM ON COMPUTING, COMMUNICATION, CONTROL, AND MANAGEMENT, VOL 2, PROCEEDINGS, 2008, : 332 - 336