Sanctuary Trail: Refuge from Internet DDoS Entrapment

نویسندگان

  • Hsu-Chun Hsiao
  • Tiffany Hyun-Jin Kim
  • Sangjae Yoo
  • Xin Zhang
  • Soo Bum Lee
  • Adrian Perrig
  • Virgil Gligor
چکیده

We propose STRIDE, a new Internet architecture that provides strong DDoS defense mechanisms for both public services and private end-to-end communication. This new architecture presents several novel concepts including long-term static paths, bandwidth allocation through a top-down topology discovery protocol, dynamic bandwidth allocation via network capabilities, and differentiated packet prioritization. In concert, these mechanisms provide 1) a strong staticclass bandwidth guarantee, 2) strongly guaranteed capability establishment for private end-to-end communication, and a linear waiting time guarantee in the number of malicious source domains for capability establishment for public services, and 3) globally fair bandwidth allocation for capability-protected flows. STRIDE addresses the denial-of-capability problem and defends against a Coremelt attack by preventing a botnet from crowding out other flows on bottleneck network links. We demonstrate these properties through formal analysis and simulation.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Sanctuary Trail: Refuge from Internet DDoS Entrapment (CMU-CyLab-12-013)

We propose STRIDE, a new Internet architecture that provides strong DDoS defense mechanisms for both public services and private end-to-end communication. This new architecture presents several novel concepts including long-term static paths, bandwidth allocation through a top-down topology discovery protocol, dynamic bandwidth allocation via network capabilities, and differentiated packet prio...

متن کامل

The Politics of Refuge: Sanctuary Cities, Crime, and Undocumented Immigration

This paper assesses the claim that sanctuary cities – defined as cities that expressly forbid city officials or police departments from inquiring into immigration status – are associated with post-hoc increases in crime. We employ a causal inference matching strategy to compare similarly situated cities where key variables are the same across the cities except the sanctuary status of the city. ...

متن کامل

Economic Issues in Distributed Computing

Dedication To Yuning and Kayla, for always supporting my endeavors. v Acknowledgements First and foremost, I would like to thank my advisor and dissertation chairman, Andrew B. Whinston who played an indispensable role in my intellectual development. I am truly grateful for his thoughtful insights into research as well as the invaluable constant support along the difficult trail of finishing my...

متن کامل

Sanctuary: The Legal Institution in England

Within the Minster of Beverley, at its liturgical center next to the high altar, sits a stone chair that once bore the inscription, "Haec sedes lapidea Freedstoll dicitur i.e. pacis cathedra, ad quam reus fugiendo perveniens omnimodam habet securitatem."1 On these words the sanctuary seeker relied as he made his desperate way to the refuge that would protect him from the penalties that the Comm...

متن کامل

Discriminating DDoS Attack traffic from Flash Crowds on Internet Threat Monitors (ITM) Using Entropy variations

Internet threat Monitoring (ITM) is a monitoring system in the internet to detect, measure, characterize and track the security attacks against attack sources. Distributed Denial of Service (DDoS) is a serious threat to the internet. Attacker uses botnets to launch DDoS attack by sending malicious traffic and the goal is to exhaust ITM network resources such as utilization of network bandwidth,...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2012