Integrated Notification Architecture Based on Overlay Against DDoS Attacks on Convergence Network

نویسندگان

  • Mihui Kim
  • Jaewon Seo
  • Kijoon Chae
چکیده

The distributed denial of service (DDoS) attack that is one of the most threatening attacks in the wired network has been already extended in the wireless mobile network, owing to the appearance of DDoS attack tool against mobile phone. In the future, the latent threats for the converged form of DDoS attack should be resolved for the induction of successful convergence network. However, because of the current problems in defending against converged DDoS attacks on convergence network, such as the absence of a converged defense, research on cooperation architecture between defense processes is critical. In this paper, we analyze possible converged attacks, thus we propose a scalable and dynamic notification architecture based on overlay routing against DDoS attacks in consideration of the capacity of each node. A main feature of this architecture is the speedy notification of attack detection to each highest defense system in the network of the attack agents as well as in the victims. Thus it makes it possible not only to fast defense at the network of victims but also to identify attack agents. We analyzed the overhead for constructing our hierarchical overlay, simulated the transmission rate and speed of detection notification, and found a marked improvement using our defense compared to general routes.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Neural Network Based Protection of Software Defined Network Controller against Distributed Denial of Service Attacks

Software Defined Network (SDN) is a new architecture for network management and its main concept is centralizing network management in the network control level that has an overview of the network and determines the forwarding rules for switches and routers (the data level). Although this centralized control is the main advantage of SDN, it is also a single point of failure. If this main contro...

متن کامل

Scheme of Defending Against DDoS Attacks in Large-Scale ISP Networks

A scheme that defending against distributed denial of service (DDoS) attacks adopts the mechanism of Distribution-based Secure Overlay Nodes (DSON) to a large-scale ISP (Internet Service Provider) network is presented. The scheme uses local BPG announcement to divert traffic to the overlay network when experiencing high load, then filtering algorithm based on the technology of signal processing...

متن کامل

Cooperative Defence Against DDoS Attacks

Distributed denial of service (DDoS) attacks on the Internet have become an immediate problem. As DDoS streams do not have common characteristics, currently available intrusion detection systems (IDS) cannot detect them accurately. As a result, defend DDoS attacks based on current available IDS will dramatically affect legitimate traffic. In this paper, we propose a distributed approach to defe...

متن کامل

Cooperative Defense against Network Attacks

Distributed denial of service (DDoS) attacks on the Internet have become an immediate problem. As DDoS streams do not have common characteristics, currently available intrusion detection systems (IDS) can not detect them accurately. As a result, defend DDoS attacks based on current available IDS will dramatically affect legitimate traffic. In this paper, we propose a distributed approach to def...

متن کامل

A Proactive Distributed Denial of Service Protection Framework

Securing communication networks against distributed denial of service attacks (DDoS) is still one of the most challenging network security issues. We propose a framework to protect network routers and hosts against resource starvation caused by DDoS attacks. We pro-actively build overlay groups of neighboring enhanced routers according to current traffic patterns. During ongoing attacks, the fr...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2007