Sanctuary Trail: Refuge from Internet DDoS Entrapment
نویسندگان
چکیده
We propose STRIDE, a new Internet architecture that provides strong DDoS defense mechanisms for both public services and private end-to-end communication. This new architecture presents several novel concepts including long-term static paths, bandwidth allocation through a top-down topology discovery protocol, dynamic bandwidth allocation via network capabilities, and differentiated packet prioritization. In concert, these mechanisms provide 1) a strong staticclass bandwidth guarantee, 2) strongly guaranteed capability establishment for private end-to-end communication, and a linear waiting time guarantee in the number of malicious source domains for capability establishment for public services, and 3) globally fair bandwidth allocation for capability-protected flows. STRIDE addresses the denial-of-capability problem and defends against a Coremelt attack by preventing a botnet from crowding out other flows on bottleneck network links. We demonstrate these properties through formal analysis and simulation.
منابع مشابه
Sanctuary Trail: Refuge from Internet DDoS Entrapment (CMU-CyLab-12-013)
We propose STRIDE, a new Internet architecture that provides strong DDoS defense mechanisms for both public services and private end-to-end communication. This new architecture presents several novel concepts including long-term static paths, bandwidth allocation through a top-down topology discovery protocol, dynamic bandwidth allocation via network capabilities, and differentiated packet prio...
متن کاملThe Politics of Refuge: Sanctuary Cities, Crime, and Undocumented Immigration
This paper assesses the claim that sanctuary cities – defined as cities that expressly forbid city officials or police departments from inquiring into immigration status – are associated with post-hoc increases in crime. We employ a causal inference matching strategy to compare similarly situated cities where key variables are the same across the cities except the sanctuary status of the city. ...
متن کاملEconomic Issues in Distributed Computing
Dedication To Yuning and Kayla, for always supporting my endeavors. v Acknowledgements First and foremost, I would like to thank my advisor and dissertation chairman, Andrew B. Whinston who played an indispensable role in my intellectual development. I am truly grateful for his thoughtful insights into research as well as the invaluable constant support along the difficult trail of finishing my...
متن کاملSanctuary: The Legal Institution in England
Within the Minster of Beverley, at its liturgical center next to the high altar, sits a stone chair that once bore the inscription, "Haec sedes lapidea Freedstoll dicitur i.e. pacis cathedra, ad quam reus fugiendo perveniens omnimodam habet securitatem."1 On these words the sanctuary seeker relied as he made his desperate way to the refuge that would protect him from the penalties that the Comm...
متن کاملDiscriminating DDoS Attack traffic from Flash Crowds on Internet Threat Monitors (ITM) Using Entropy variations
Internet threat Monitoring (ITM) is a monitoring system in the internet to detect, measure, characterize and track the security attacks against attack sources. Distributed Denial of Service (DDoS) is a serious threat to the internet. Attacker uses botnets to launch DDoS attack by sending malicious traffic and the goal is to exhaust ITM network resources such as utilization of network bandwidth,...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2012