Mitigation and traceback countermeasures for DDoS attacks

نویسندگان

  • Ahmed E. Kamal
  • Douglas W. Jacobson
  • Wallapak Tavanapong
چکیده

. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xv CHAPTER 1. DENIAL OF SERVICE ATTACKS . . . . . . . . . . . . . . . 1 1.1 The Increasing Threat of DoS Attacks . . . . . . . . . . . . . . . . . . . . . . . 1 1.2 Roots of the DoS Problem . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2 1.3 Classification of DoS Attacks . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4 1.3.1 Attribute-based Characterization of DoS Attacks . . . . . . . . . . . . . 5 1.3.2 Means-based Classification of DoS Attacks . . . . . . . . . . . . . . . . 10 1.3.3 Impact-based Classification of DoS Attacks . . . . . . . . . . . . . . . . 17 1.4 Research Challenges in Countering DoS Attacks . . . . . . . . . . . . . . . . . . 18 1.5 Dissertation Organization . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20 CHAPTER 2. STATE OF THE ART IN DoS COUNTERMEASURES . . 21 2.1 DoS Prevention Schemes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 25 2.1.1 Source-based DoS Prevention Schemes . . . . . . . . . . . . . . . . . . . 25 2.1.2 Network-based DoS Prevention Schemes . . . . . . . . . . . . . . . . . . 26 2.1.3 Victim-based DoS Prevention Schemes . . . . . . . . . . . . . . . . . . . 27 2.2 DoS Mitigation Schemes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 28 2.2.1 Rate Limiting-based DoS Mitigation Schemes . . . . . . . . . . . . . . . 28

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

DoS and DDoS Attacks: Defense, Detection and TracebackMechanisms -A Survey

Denial of Service (DoS) or Distributed Denial of Service (DDoS) attacks are typically explicit attempts to exhaust victim’s bandwidth or disrupt legitimate users’ access to services. Traditional architecture of internet is vulnerable to DDoS attacks and it provides an opportunity to an attacker to gain access to a large number of compromised computers by exploiting their vulnerabilities to set ...

متن کامل

Unified Defense Against DDoS Attacks

With DoS/DDoS attacks emerging as one of the primary security threats in today’s Internet, the search is on for an efficient DDoS defense mechanism that would provide attack prevention, mitigation and traceback features, in as few packets as possible and with no collateral damage. Although several techniques have been proposed to tackle this growing menace, there exists no effective solution to...

متن کامل

Traceback of Ddos Attacks Using Entropy Variations

Distributed Denial-of-Service (DDoS) attacks are a critical threat to the Internet which deny normal service and degrade quality of service. However, the Network security mechanisms does not have effective and efficient methods to trace back the source of these attacks. In this paper, I propose a novel traceback method for DDoS attacks that is based on entropy variations between normal and DDoS...

متن کامل

E-LDAT: a lightweight system for DDoS flooding attack detection and IP traceback using extended entropy metric

Distributed denial-of-service (DDoS) attacks cause havoc by exploiting threats to Internet services. In this paper, we propose E-LDAT, a lightweight extended-entropy metric-based system for both DDoS flooding attack detection and IP (Internet Protocol) traceback. It aims to identify DDoS attacks effectively by measuring the metric difference between legitimate traffic and attack traffic. IP tra...

متن کامل

Analysis of traceback techniques

Today’s Internet is extremely vulnerable to Distributed Denial of service (DDoS) attacks. There is tremendous pressure on the sites performing online business and ISP’s to protect their networks from DDoS attacks. Recently, several novel traceback techniques have been proposed to trace the approximate spoofed source of attack. Each proposed traceback technique has some unique advantages and dis...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2005