On the effectiveness of route-based packet filtering for distributed DoS attack prevention in power-law internets

Author:

Park Kihong1,Lee Heejo2

Affiliation:

1. Network Systems Lab, Department of Computer Sciences, Purdue University, West Lafayette, IN

2. Ahnlab, Inc., 8F V-Valley Bldg., 724 Suseo-Dong, Kangnam-Ku Seoul 135-744, Korea and Network Systems Lab, Department of Computer Sciences, Purdue University, West Lafayette, IN

Abstract

Denial of service (DoS) attack on the Internet has become a pressing problem. In this paper, we describe and evaluate route-based distributed packet filtering (DPF), a novel approach to distributed DoS (DDoS) attack prevention. We show that DPF achieves proactiveness and scalability, and we show that there is an intimate relationship between the effectiveness of DPF at mitigating DDoS attack and power-law network topology.The salient features of this work are two-fold. First, we show that DPF is able to proactively filter out a significant fraction of spoofed packet flows and prevent attack packets from reaching their targets in the first place. The IP flows that cannot be proactively curtailed are extremely sparse so that their origin can be localized---i.e., IP traceback---to within a small, constant number of candidate sites. We show that the two proactive and reactive performance effects can be achieved by implementing route-based filtering on less than 20% of Internet autonomous system (AS) sites. Second, we show that the two complementary performance measures are dependent on the properties of the underlying AS graph. In particular, we show that the power-law structure of Internet AS topology leads to connectivity properties which are crucial in facilitating the observed performance effects.

Publisher

Association for Computing Machinery (ACM)

Subject

Computer Networks and Communications,Software

Reference31 articles.

1. G.Banga P.Druschel and J.Mogul.Resource containers:A new facility for resource management in server systems.In Proc.of the third USENIX/ACM Symp.on Operating Systems Design and Implementation (OSDI '99) pages 45-58 Feb.1999. G.Banga P.Druschel and J.Mogul.Resource containers:A new facility for resource management in server systems.In Proc.of the third USENIX/ACM Symp.on Operating Systems Design and Implementation (OSDI '99) pages 45-58 Feb.1999.

2. S.Bellovin.ICMPtraceback messages Mar.2000. Internet Draft:draft-bellovin-itrace-00.txt (expires September 2000). S.Bellovin.ICMPtraceback messages Mar.2000. Internet Draft:draft-bellovin-itrace-00.txt (expires September 2000).

3. H.Burch and B.Cheswick.Tracing anonymous packets to their approximate source.In 14th Systems Administration Conference (LISA 2000) pages 319-327 2000. H.Burch and B.Cheswick.Tracing anonymous packets to their approximate source.In 14th Systems Administration Conference (LISA 2000) pages 319-327 2000.

4. C.E.R.T.(CERT).CERT Advisory CA-2000-01 Denial-of-service developments Jan.2000. http://www.cert.org/advisories/CA-2000-01.html. C.E.R.T.(CERT).CERT Advisory CA-2000-01 Denial-of-service developments Jan.2000. http://www.cert.org/advisories/CA-2000-01.html.

5. CERT/CC S.Institute and CERIAS.Consensus roadmap for defeating distributed denial of service attacks Feb.2000.A Project of the Partnership for Critical Infrastructure Security http://www.sans.org/ddos roadmap.htm. CERT/CC S.Institute and CERIAS.Consensus roadmap for defeating distributed denial of service attacks Feb.2000.A Project of the Partnership for Critical Infrastructure Security http://www.sans.org/ddos roadmap.htm.

Cited by 123 articles. 订阅此论文施引文献 订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献

1. Toward Practical Inter-Domain Source Address Validation;IEEE/ACM Transactions on Networking;2024-08

2. WavingSketch: an unbiased and generic sketch for finding top-k items in data streams;The VLDB Journal;2024-07-29

3. DDD: A DNS-based DDoS Defense Scheme Using Puzzles;2024 33rd International Conference on Computer Communications and Networks (ICCCN);2024-07-29

4. A New Mitigation Method against DRDoS Attacks Using a Snort UDP Module in Low-Specification Fog Computing Environments;Electronics;2024-07-24

5. Prevention of DDoS attacks: a comprehensive review and future directions;Information Security Journal: A Global Perspective;2024-05-15

同舟云学术

1.学者识别学者识别

2.学术分析学术分析

3.人才评估人才评估

"同舟云学术"是以全球学者为主线,采集、加工和组织学术论文而形成的新型学术文献查询和分析系统,可以对全球学者进行文献检索和人才价值评估。用户可以通过关注某些学科领域的顶尖人物而持续追踪该领域的学科进展和研究前沿。经过近期的数据扩容,当前同舟云学术共收录了国内外主流学术期刊6万余种,收集的期刊论文及会议论文总量共计约1.5亿篇,并以每天添加12000余篇中外论文的速度递增。我们也可以为用户提供个性化、定制化的学者数据。欢迎来电咨询!咨询电话:010-8811{复制后删除}0370

www.globalauthorid.com

TOP

Copyright © 2019-2024 北京同舟云网络信息技术有限公司
京公网安备11010802033243号  京ICP备18003416号-3