Using Overlay Networks to Resist Denial-of-Service Attacks

نویسندگان

  • Ju Wang
  • Andrew A. Chien
چکیده

Proxy-network based overlays have been proposed to protect Internet applications against Denial-of-Service (DoS) attacks by hiding an application’s location. We develop a formal framework which models attacks, defensive mechanisms, and proxy networks. We use the framework to analyze the general effectiveness of proxy network schemes to protect applications. Using our formal model, we analytically characterize how attacks, defensive schemes, and proxy network topology affect the secrecy of application location and general resource availability. Our results provide guidelines for the design of proxy networks; the formal framework provides a tool to study problems in this area. Our analysis shows that proxy networks are a feasible approach to prevent infrastructure-level DoS attacks. Proxy network depth and system reconfiguration are the keys to achieving location hiding. Proxy network topology also has an important impact -rich connectivity in the proxy network, a virtue in other circumstances, reduces effectiveness in location hiding. Finally, to avoid resource depletion, reactive resource recoveries are insufficient; proactive schemes are needed.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

An Analysis of Using Overlay Networks to Resist Distributed Denial-of-Service Attacks

Proxy networks based on overlays have been proposed as an architecture to protect Internet applications against denial-of-service attacks, however we know of no formal analysis of such schemes' effectiveness. We describe a framework to analyze a class of these proxy network architectures. Based on an attack model and a system model, we analytically characterize how attacks affect two key factor...

متن کامل

HF-Blocker: Detection of Distributed Denial of Service Attacks Based On Botnets

Abstract—Today, botnets have become a serious threat to enterprise networks. By creation of network of bots, they launch several attacks, distributed denial of service attacks (DDoS) on networks is a sample of such attacks. Such attacks with the occupation of system resources, have proven to be an effective method of denying network services. Botnets that launch HTTP packet flood attacks agains...

متن کامل

Using Overlay Networks to Resist Denial-of-Service Attacks

Proxy-network based overlays have been proposed to protect Internet applications against Denial-of-Service (DoS) attacks by hiding an application’s location. We develop a formal framework which models attacks, defensive mechanisms, and proxy networks. We use the framework to analyze the general effectiveness of proxy network schemes to protect applications. Using our formal model, we analytical...

متن کامل

Pushback for Overlay Networks: Protecting Against Malicious Insiders

Peer-to-Peer (P2P) overlay networks are a flexible way of creating decentralized services. Although resilient to external Denial of Service attacks, overlay networks can be rendered inoperable by simple flooding attacks generated from insider nodes. In this paper, we study detection and containment mechanisms against insider Denial of Service (DoS) attacks for overlay networks. To counter such ...

متن کامل

Towards Scalable and Robust Overlay Networks

Every peer-to-peer system is based on some overlay network connecting its peers. Many of the overlay network concepts proposed in the scientific community are based on the concept of virtual space. These designs are usually highly scalable, but they do not guarantee robustness against adversarial attacks, especially when considering open peer-to-peer systems. In these systems, determined advers...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2003