Network DDoS Layer 3/4/7 Mitigation via Dynamic Web Redirection

被引:1
作者
Booth, Todd [1 ]
Andersson, Karl [1 ]
机构
[1] Lulea Univ Technol, Div Comp Sci, S-97187 Lulea, Sweden
来源
FUTURE NETWORK SYSTEMS AND SECURITY | 2016年 / 670卷
关键词
DDoS; DRDoS; Bandwidth; Reflector; BotNet; BGP4; Flow-Spec; ANOMALY DETECTION; ATTACKS; DEFENSE; DOS;
D O I
10.1007/978-3-319-48021-3_8
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Layer 3, 4 and 7 DDoS attacks are common and very difficult to defend against. The academic community has published hundreds of well thought out algorithms, which require changes in computer networking equipment, to better detect and mitigate these attacks. The problem with these solutions, is that they require computer networking manufacturers to make changes to their hardware and/or software. On the other hand, with our solution, absolutely no hardware or software changes are required. We only require the use of BGP4 Flow-Spec, which has already been widely deployed many years ago. Further the customers' own ISP does not require Flow-Spec. Our algorithm protects groups of over sixty-five thousand different customers, via the aggregation into one very small Flow-Spec rule. In this paper, we propose our novel, low cost and efficient solution, to both detect and greatly mitigate any and all types of L347 DDoS Web attacks.
引用
收藏
页码:111 / 125
页数:15
相关论文
共 30 条
  • [1] Alwabel A., 2014, P 2014 ACM C SIGCOMM, P349
  • [2] [Anonymous], 2010, ACM SIGOPSOper. Syst. Rev., DOI DOI 10.1145/1842733.1842736
  • [3] [Anonymous], 2015, ADV COMPUT SCI
  • [4] An empirical evaluation of information metrics for low-rate and high-rate DDoS attack detection
    Bhuyan, Monowar H.
    Bhattacharyya, D. K.
    Kalita, J. K.
    [J]. PATTERN RECOGNITION LETTERS, 2015, 51 : 1 - 7
  • [5] Booth T., 2015, J INTERNET SERVICES, V5, P58
  • [6] Elimination of DoS UDP Reflection Amplification Bandwidth Attacks, Protecting TCP Services
    Booth, Todd G.
    Andersson, Karl
    [J]. FUTURE NETWORK SYSTEMS AND SECURITY, FNSS 2015, 2015, 523 : 1 - 15
  • [7] Cloud security defence to protect cloud computing against HTTP-DoS and XML-DoS attacks
    Chonka, Ashley
    Xiang, Yang
    Zhou, Wanlei
    Bonti, Alessio
    [J]. JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2011, 34 (04) : 1097 - 1107
  • [8] NICE: Network Intrusion Detection and Countermeasure Selection in Virtual Network Systems
    Chung, Chun-Jen
    Khatkar, Pankaj
    Xing, Tianyi
    Lee, Jeongkeun
    Huang, Dijiang
    [J]. IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2013, 10 (04) : 198 - 211
  • [9] CloudFlare, 400GBPS WINT WHOPP W
  • [10] Devi GU, 2015, INDIAN J SCI TECHNOL, V8, DOI 10.17485/ijst/2015/v8i20/49253