DefAT: Dependable Connection Setup for Network Capabilities

نویسندگان

  • Soo Bum Lee
  • Virgil D. Gligor
  • Adrian Perrig
چکیده

Network-layer capabilities offer strong protection against link flooding by authorizing individual flows with unforgeable credentials (i.e., capabilities). However, the capabilitysetup channel is vulnerable to flooding attacks that prevent legitimate clients from acquiring capabilities; i.e., in Denial of Capability (DoC) attacks. Based on the observation that the distribution of attack sources in the current Internet is highly non-uniform, we provide a router-level scheme, named DefAT (Defense via Aggregating Traffic), that confines the effects of DoC attacks to specified locales or neighborhoods (e.g., one or more administrative domains of the Internet). DefAT provides precise access guarantees for capability schemes, even in the face of flooding attacks. The effectiveness of DefAT is shown in two ways. First, we illstrate the precise link-access guarantees provided by DefAT via ns2 simulations. Second, we show the effectiveness of DefAT in the current Internet via Interent-scale simulations using real Internet topologies and attack distribution.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

DefAT: Dependable Connection Setup for Network Capabilities (CMU-CyLab-11-018)

Network-layer capabilities offer strong protection against link flooding by authorizing individual flows with unforgeable credentials (i.e., capabilities). However, the capabilitysetup channel is vulnerable to flooding attacks that prevent legitimate clients from acquiring capabilities; i.e., in Denial of Capability (DoC) attacks. Based on the observation that the distribution of attack sources...

متن کامل

Localizing the Effects of Link

Title of dissertation: Localizing the Effects of Link Flooding Attacks in the Internet Soo Bum Lee Doctor of Philosophy, 2009 Dissertation directed by: Professor Virgil D. Gligor Department of Electrical and Computer Engineering Malware-contaminated hosts organized as a “bot network” can target and flood network links (e.g., routers). Yet, none of the countermeasures to link flooding proposed t...

متن کامل

A Novel Event-Driven QoS-Aware Connection Setup Management Scheme for Optical Networks

This paper proposes a QoS-Aware Optical Connection Setup Management scheme that uses the Earliest Deadline First (EDF) queueing discipline to schedule the setup of the optical connections. The benefits of this EDF-based scheme are twofold: a) it reduces the blocking probability since blocked connection requests due to resource unavailability are queued for possible future setup opportunities an...

متن کامل

Design and Evaluation of Routing Schemes for Dependable Real-Time Connections

Dependability-of-Service (DoS) has become an important requirement for real-time applications, such as remote medical services, business-critical network meetings, and command & control applications. The Dependable Real-Time Protocol (DRTP) [5, 6, 7] in which each dependable real-time connection is realized with one primary and one or more backup channels, has been shown to be an e ective way o...

متن کامل

Deadline-based connection setup in wavelength-routed WDM networks

This article addresses the ubiquitous topic of Quality of Service (QoS) aware connection provisioning in wavelength routed WDM optical networks. The impact of the connection setup time of an optical connection has not been adequately addressed in the open literature. As such, this paper presents a novel approach that uses the optical connection setup time as a service differentiator during conn...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2011