Stopping Unwanted Traffic using Lightweight Permits ⋆

نویسندگان

  • Yingfei Dong
  • Changho Choi
  • Zhi-Li Zhang
چکیده

One of key security issues on the current Internet is unwanted traffic, the forerunner of unauthorized accesses, intrusions, Denial of Service (DoS) attacks, port scanning, and other attacks. Since stopping unwanted traffic is vitally important but extremely challenging, we need a series of defensive schemes to identify unwanted packets, filter them out, and further defeat their associated attacks. In this paper, we propose a lightweight, scalable packet authentication mechanism, named Lightweight Internet Permit System (LIPS), as a first line of defense to stop unwanted traffic. LIPS is a simple extension of IP, in which each packet carries an access permit issued by its destination host or gateway, and the destination verifies the access permit to determine to accept or drop the packet. LIPS provides preliminary trafficorigin accountability that supports two salient features to stop unwanted traffic. First, it helps us stop common unwanted traffic such as IP-spoofed packets and associated attacks. Second, it helps us identify compromised hosts/domains such that we can build automatic defense schemes to deal with various attacks through real-time inter-domain collaboration. In addition, as a domain-to-domain approach, LIPS is incrementally deployable since it does not require changes in backbone networks as many other approaches; it gives ISPs strong deployment incentives since it can greatly improve their ability to identify unwanted traffic and take proactive responses; it also largely reduces the load of Intrusion Detection Systems (IDSs) by filtering out most unwanted packets such that IDSs can focus on serious threats. In this paper, we first present the design and prototype implementation of LIPS on Linux 2.4 kernel, and then use analysis, simulations, and experiments to demonstrate the efficacy of LIPS in protecting critical resources with negligible overheads.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Effectively Fighting Common Spoofed and Unsolicited Packets via Lightweight Permits ?

One of key security issues on the current Internet is unwanted traffic, the forerunner of unauthorized accesses, scans, and attacks. It is vitally important but extremely challenging to fight such unwanted traffic. We need a series of defensive mechanisms to identify unwanted packets, filter them out, and further defeat their associated attacks. In this paper, we propose a lightweight, scalable...

متن کامل

LIPS: Lightweight Internet Permit System for Stopping Unwanted Packets

In this paper, we propose a Lightweight Internet Permit System (LIPS) that provides a lightweight, scalable packet authentication mechanism for ensuring traffic-origin accountability. LIPS is a simple extension of IP, in which each packet carries an access permit issued by its destination host or gateway, and the destination verifies the access permit to determine if a packet is accepted or dro...

متن کامل

ShutUp: End-to-End Containment of Unwanted Traffic

While the majority of Denial-of-Service (DoS) defense proposals assume a purely infrastructure-based architecture, some recent proposals suggest that the attacking endhost may be enlisted as part of the solution, through tamper-proof software, network-imposed incentives, or user altruism. While intriguing, these proposals ultimately raise the deployment bar by requiring both the infrastructure ...

متن کامل

An Incentive-Aware Lightweight Secure Data Sharing Scheme for D2D Communication in 5G Cellular Networks

Due to the explosion of smart devices, data traffic over cellular networks has seen an exponential rise in recent years. This increase in mobile data traffic has caused an immediate need for offloading traffic from operators. Device-to-Device(D2D) communication is a promising solution to boost the capacity of cellular networks and alleviate the heavy burden on backhaul links. However, dir...

متن کامل

Quantum mechanical proton range in human body

Introduction: Proton therapy delivers radiation to tumor tissue in a much more confined way than conventional photon therapy thus allowing the radiation oncologist to use a greater dose while still minimizing side.   Materials and Methods: protons release most of their energy within the tumor region. As a result, the treating physician can potentially give an...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2005