End to End Defence Against DDoS Atacks

نویسندگان

  • Anastasia Gemona
  • Ishbel Duncan
  • Colin Allison
  • Alan Miller
چکیده

Denial of Service (DoS) attacks and Distributed Denial of Service (DDoS) attacks accounted for more losses than Internet financial fraud and viruses combined (CSI/FBI 2003). The Internet has been exposed as being particularly vulnerable to Denial of Service Attacks. This has stimulated research into DDoS and the consequent development of many techniques which aim to control them. This paper aims to contribute to this literature. An holistic approach to combating DDoS is proposed, which places particular stress on the importance of locating functionality in the most appropriate location and that source, intermediate and destination network elements co-operate together. It is argued that attack traffic is best stopped before it leaves its source network, that it is best detected and analysed at the target network and intermediate routers need precise information to allow them to control economically the DDoS traffic that escapes the source network. The design of a passive monitor that is able to use measurements of attack and regular traffic to enable dynamic configuration of network elements is presented along with a detailed discussion of how such a monitor can be deployed to combat the common SYN flood attack. The extension of this approach to combat other forms of DDoS attack is also discussed.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

DDA: An Approach to Handle DDoS (Ping Flood) Attack

Distributed denial of service attack (DDoS) is an attempt by malicious hosts to overload website, network, e-mail servers, applications, network resources, bandwidth, etc. Globally DDoS attacks affected four out of ten organizations (around 41 %) over the past few years. Challenges involved in taking counter measures against DDoS attacks are network infrastructure, identifying legitimate traffi...

متن کامل

Implementing Pushback: Router-Based Defense Against DDoS Attacks

Pushback is a mechanism for defending against distributed denial-of-service (DDoS) attacks. DDoS attacks are treated as a congestion-control problem, but because most such congestion is caused by malicious hosts not obeying traditional end-to-end congestion control, the problem must be handled by the routers. Functionality is added to each router to detect and preferentially drop packets that p...

متن کامل

ISPs: Who Else Can You Trust in the Internet?

The Internet today is the main communication infrastructure for private communication and business. A protection against unsolicited traffic such as DDoS attacks is therefore in the interest of all – but, at the same time, security has to be balanced with privacy issues. This paper proposes a collaborative effort against unsolicited traffic where ISPs and end users collaborate. Users define whi...

متن کامل

Cooperative Defence Against DDoS Attacks

Distributed denial of service (DDoS) attacks on the Internet have become an immediate problem. As DDoS streams do not have common characteristics, currently available intrusion detection systems (IDS) cannot detect them accurately. As a result, defend DDoS attacks based on current available IDS will dramatically affect legitimate traffic. In this paper, we propose a distributed approach to defe...

متن کامل

Session 1B Security I ISPs: Who Else Can You Trust in the Internet?

The Internet today is the main communication infrastructure for private communication and business. A protection against unsolicited traffic such as DDoS attacks is therefore in the interest of all – but, at the same time, security has to be balanced with privacy issues. This paper proposes a collaborative effort against unsolicited traffic where ISPs and end users collaborate. Users define whi...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2004