A High-Speed PacketScore DDoS Defense System

نویسندگان

  • Paulo E. Ayres
  • Huizhong Sun
  • H. Jonathan Chao
چکیده

Distributed Denial of Service (DDoS) attacks pose a significant threat to the Internet while no effective defense schemes have been proposed or deployed. PacketScore has been proposed as a proactive DDoS defense scheme, which detects DDoS attacks, differentiates attacking packets from good ones with the use of packet scoring (scores are calculated per-packet based on the attribute values it possesses), and discards packets whose scores are lower than a dynamic threshold (lower scores are more likely to be the attacking ones). We extend the packet-scoring concept and devise new schemes to reduce implementation complexity and improve overall performance. More specifically, a Leaky-Bucket overflow control scheme simplifies the score computation. An Attribute-Value-Variation scoring scheme — a method based on analysis of deviations of the current traffic attribute values measured from a previously measured traffic baseline — increases the accuracy of detecting and differentiating attacks. An enhanced packet discarding method allows both schemes to be more adaptive to challenging attacks such as those that dynamically change their attacking types and intensity. The overall reduction in complexity, higher detection and differentiation accuracies, and great memory savings make the new schemes natural candidates for high-speed hardware implementations of DDoS defense systems.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

PacketScore: A Statistical Packet Filtering Scheme against Distributed Denial-of-Service Attacks

Distributed Denial-of-Service (DDoS) attacks are a critical threat to the Internet. This paper introduces a DDoS defense scheme that supports automated online attack characterizations and accurate attack packet discarding based on statistical processing. The key idea is to prioritize a packet based on a score which estimates its legitimacy given the attribute values it carries. Once the score o...

متن کامل

A Distributed Denial-of-Service Defense System Using Leaky-Bucket-Based PacketScore (preliminary work)

Distributed Denial of Service (DDoS) attacks have been a big threat to the Internet while no effective schemes have been proposed or deployed, leaving the Internet still vulnerable to such attacks. We propose a proactive DDoS defense scheme [Ki04] by having multiple routers form a defense perimeter. They collaboratively detect DDoS attacks, if exist, and differentiate attacking packets from goo...

متن کامل

Classifying DDoS packets in high-speed networks

Recently high-speed networks have been utilized by attackers as Distributed Denial of Service (DDoS) attack infrastructure. Services on high-speed networks also have been attacked by successive waves of the DDoS attacks. How to sensitively and accurately detect the attack traffic, and quickly filter out the attack packets are still the major challenges in DDoS defense. Unfortunately most curren...

متن کامل

A Gateway-based Defense System for Distributed Denial-of-Service Attacks in High-Speed Networks

We describe a defense system to contain Distributed Denial-of-Service (DDoS) flooding attacks in highspeed networks. We aim at protecting TCP friendly traffic, which forms a large portion of Internet traffic. DDoS flooding attacks tend to establish large numbers of malicious traffic flows to congest network. These flows are marked as TCP flows, and use spoofed source identifiers to hide their i...

متن کامل

Integrated Notification Architecture Based on Overlay Against DDoS Attacks on Convergence Network

The distributed denial of service (DDoS) attack that is one of the most threatening attacks in the wired network has been already extended in the wireless mobile network, owing to the appearance of DDoS attack tool against mobile phone. In the future, the latent threats for the converged form of DDoS attack should be resolved for the induction of successful convergence network. However, because...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2006