Mitigation of DoS attacks through QoS regulation

نویسندگان

  • Aman Garg
  • A. L. Narasimha Reddy
چکیده

As more and more critical services are provided over the Internet, the risk to these services from malicious users is also increasing. Several networks have witnessed Denial of Service (DoS) attacks over the recent past. This paper reports on our experience in building a Linux-based prototype to mitigate the effect of such attacks. Our prototype provides an efficient way to keep track of server and network resources at the network layer and allows aggregate resource regulation. Our scheme provides a general, and not attack-specific, mechanism to provide graceful server degradation in the face of such an attack. We report on the rationale of our approach, the experience in building the prototype, and the results from real experiments. We show that traditional rate-based regulation combined with proposed window-based regulation of resources at the aggregate level at the network layer is a feasible vehicle for mitigating the impact of DoS attacks on end servers. q 2004 Published by Elsevier B.V.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Mitigation and traceback countermeasures for DDoS attacks

. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xv CHAPTER 1. DENIAL OF SERVICE ATTACKS . . . . . . . . . . . . . . . 1 1.1 The Increasing Threat of DoS Attacks . . . . . . . . . . . . . . . . . . . . . . . 1 1.2 Roots of the DoS Problem . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2 1.3 Classification of DoS Attacks . . . . . . . . . . . . . . . . . ....

متن کامل

Cross-domain DoS link-flooding attack detection and mitigation using SDN prin- ciples

The Denial of Service (DoS) attacks pose a major threat to Internet users and services. Since the network security ecosystem is expanding over the years, new types of DoS attacks emerge. The DoS link-flooding attacks target to severely congest certain network links disrupting Internet accessibility to certain geographical areas and services passing through these links. Since crucial services li...

متن کامل

Vulnerability Bandwidth Depletion Attack on Distributed Cloud Computing Network: A QoS Perspective

A previous work on Airport Information Resource Management System (AIRMS) established that sophisticated attacks in the form of Denial of Service (DoS), Distributed DoS (DDoS), and related attacks are becoming the most effective schemes used by cyber terrorists on such enterprise systems. Similarly, a novel Smart Green Energy Management Distributed Cloud Computing Network (SGEM-DCCN) was develo...

متن کامل

Denial-of-service detection and mitigation for SIP communication networks

The Session Initiation Protocol (SIP) is the multimedia communication protocol of the future. Used for Voice-over-IP (VoIP), Internet Multimedia Subsystem (IMS) and Internet Protocol Television (IPTV), its concepts are based on mature and open standards and its use is increasing rapidly within recent years. However, with its acceptance as a mainstream communication platform, security concerns b...

متن کامل

Detecting Service Violations and DoS Attacks

Denial of Service (DoS) attacks are a serious threat for the Internet. DoS attacks can consume memory, CPU, and network resources and damage or shut down the operation of the resource under attack (victim). The quality of service (QoS) enabled networks, which offer different levels of service, are vulnerable to QoS attacks as well as DoS attacks. The aim of a QoS attack is to steal network reso...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:
  • Microprocessors and Microsystems

دوره 28  شماره 

صفحات  -

تاریخ انتشار 2004