Paper Abstract and Keywords |
Presentation |
2006-09-14 13:30
[Invited Talk]
On Tracing and Mitigating Distributed Denial of Service Attacks Nirwan Ansari (New Jersey Inst. of Tech.) NS2006-76 IN2006-56 CS2006-22 |
Abstract |
(in Japanese) |
(See Japanese page) |
(in English) |
The CSI/FBI surveys have been revealing that the (distributed) denial of service ((D)DoS) attacks are still a major concern leading to a significant revenue loss for many organizations. This talk will provide a brief overview on how to trace back and defend DoS/DDoS attacks, namely, IP traceback and DDoS defense. IP traceback attempts to identify attack sources, i.e., from where the attack traffic comes. We first analyze and evaluate several recently proposed schemes, such as Probabilistic Packet Marking (PPM), iTrace, Hash-based traceback, CenterTrack, and traffic pattern based traceback. We will then present our schemes, including Deterministic Packet Marking (DPM) and Autonomous System-based Edge Marking (ASEM). DPM conducts marking only at the ingress interfaces of the edge routers, thus posing little burden on routers and reducing the router involvement. It is easy and simple to implement. DPM can also address reflective DDoS attacks as long as certain “trust” relationship is maintained between adjacent domains. On the other hand, ASEM aims to improve upon PPM and exhibits three salient benefits: 1) it significantly reduces the computational burden by introducing a new marking policy and using the optimal marking probability, 2) it completely eradicates the spoofed marking intentionally inscribed by the attacker, and 3) it is capable of handling subverted routers by coupling routing and marking information. The second part of this talk discusses DDoS defense schemes, including PacketScore, SYN flood detection, pushback, Puzzle-based defense, and Honey pot. Finally, we briefly outline our proposed comprehensive DDoS defense framework, and future works. |
Keyword |
(in Japanese) |
(See Japanese page) |
(in English) |
Denial of Service (DoS) / Distributed DoS (DDoS) / IP Traceback / DDoS defense / / / / |
Reference Info. |
IEICE Tech. Rep., vol. 106, no. 236, NS2006-76, pp. 33-43, Sept. 2006. |
Paper # |
NS2006-76 |
Date of Issue |
2006-09-07 (NS, IN, CS) |
ISSN |
Print edition: ISSN 0913-5685 Online edition: ISSN 2432-6380 |
Copyright and reproduction |
All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034) |
Download PDF |
NS2006-76 IN2006-56 CS2006-22 |
Conference Information |
Committee |
IN NS CS |
Conference Date |
2006-09-14 - 2006-09-15 |
Place (in Japanese) |
(See Japanese page) |
Place (in English) |
|
Topics (in Japanese) |
(See Japanese page) |
Topics (in English) |
VPN, NAT, Network security, DDos, P2P, etc. |
Paper Information |
Registration To |
NS |
Conference Code |
2006-09-IN-NS-CS |
Language |
English |
Title (in Japanese) |
(See Japanese page) |
Sub Title (in Japanese) |
(See Japanese page) |
Title (in English) |
On Tracing and Mitigating Distributed Denial of Service Attacks |
Sub Title (in English) |
|
Keyword(1) |
Denial of Service (DoS) |
Keyword(2) |
Distributed DoS (DDoS) |
Keyword(3) |
IP Traceback |
Keyword(4) |
DDoS defense |
Keyword(5) |
|
Keyword(6) |
|
Keyword(7) |
|
Keyword(8) |
|
1st Author's Name |
Nirwan Ansari |
1st Author's Affiliation |
New Jersey Institute of Technology (New Jersey Inst. of Tech.) |
2nd Author's Name |
|
2nd Author's Affiliation |
() |
3rd Author's Name |
|
3rd Author's Affiliation |
() |
4th Author's Name |
|
4th Author's Affiliation |
() |
5th Author's Name |
|
5th Author's Affiliation |
() |
6th Author's Name |
|
6th Author's Affiliation |
() |
7th Author's Name |
|
7th Author's Affiliation |
() |
8th Author's Name |
|
8th Author's Affiliation |
() |
9th Author's Name |
|
9th Author's Affiliation |
() |
10th Author's Name |
|
10th Author's Affiliation |
() |
11th Author's Name |
|
11th Author's Affiliation |
() |
12th Author's Name |
|
12th Author's Affiliation |
() |
13th Author's Name |
|
13th Author's Affiliation |
() |
14th Author's Name |
|
14th Author's Affiliation |
() |
15th Author's Name |
|
15th Author's Affiliation |
() |
16th Author's Name |
|
16th Author's Affiliation |
() |
17th Author's Name |
|
17th Author's Affiliation |
() |
18th Author's Name |
|
18th Author's Affiliation |
() |
19th Author's Name |
|
19th Author's Affiliation |
() |
20th Author's Name |
|
20th Author's Affiliation |
() |
Speaker |
Author-1 |
Date Time |
2006-09-14 13:30:00 |
Presentation Time |
45 minutes |
Registration for |
NS |
Paper # |
NS2006-76, IN2006-56, CS2006-22 |
Volume (vol) |
vol.106 |
Number (no) |
no.236(NS), no.237(IN), no.238(CS) |
Page |
pp.33-43(NS), pp.43-53(IN), pp.1-11(CS) |
#Pages |
11 |
Date of Issue |
2006-09-07 (NS, IN, CS) |
|