Paper Abstract and Keywords |
Presentation |
2006-12-15 14:00
Evaluations of a Network Control Scheme for Sharing DDoS Attack Mitigation System called as Scrubingbox Takeshi Yagi, Kazuhiro Okura, Masao Tanabe, Junichi Murayama, Katsuyasu Toyama (NTT) IN2006-131 |
Abstract |
(in Japanese) |
(See Japanese page) |
(in English) |
This paper evaluates dynamic traffic control methods to re-route traffic into DDoS-attack mitigation devices, namely Scrubbing-boxes. In the conventional method, a scrubbing-box collects anomaly traffic by propagating the corresponded routing information within a specific area, and scrub DDoS-attack traffic out. Then, the scrubbed traffic is return to the network, a point close to its victim user and out of the routing area. However, in the conventional method, every router in the whole routing area should handle the routing information and control anomaly traffic, even though the victim user is located near some of the scrubbing-boxes. As a result, control-latency and cost might not be optimized. To solve this problem, this paper proposes the centralized control method based on a policy routing technique. In this method, anomaly traffic is re-routed from a point close to the victim user into one of the distributed scrubbing-boxes by means of hop-by-hop policy-routing. Then, the scrubbed traffic is also returned by means of hop-by-hop policy routing. In a case where the selected scrubbing-box is located near the victim user, the proposed method works efficiently and reduces cost a lot because anomaly traffic is handled by a smaller number of routers. On the other hand, where none of the scrubbing-box is located near the victim user, the conventional method might work efficiently. Thus, depending on the condition, the appropriate selection of each method achieves the great improvement of control-latency and cost of anomaly traffic control. |
Keyword |
(in Japanese) |
(See Japanese page) |
(in English) |
security / anomaly traffic / DDoS-attack / traffic control / polocy routing / / / |
Reference Info. |
IEICE Tech. Rep., vol. 106, no. 420, IN2006-131, pp. 103-108, Dec. 2006. |
Paper # |
IN2006-131 |
Date of Issue |
2006-12-07 (IN) |
ISSN |
Print edition: ISSN 0913-5685 Online edition: ISSN 2432-6380 |
Copyright and reproduction |
All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034) |
Download PDF |
IN2006-131 |
Conference Information |
Committee |
IN |
Conference Date |
2006-12-14 - 2006-12-15 |
Place (in Japanese) |
(See Japanese page) |
Place (in English) |
|
Topics (in Japanese) |
(See Japanese page) |
Topics (in English) |
|
Paper Information |
Registration To |
IN |
Conference Code |
2006-12-IN |
Language |
Japanese |
Title (in Japanese) |
(See Japanese page) |
Sub Title (in Japanese) |
(See Japanese page) |
Title (in English) |
Evaluations of a Network Control Scheme for Sharing DDoS Attack Mitigation System called as Scrubingbox |
Sub Title (in English) |
|
Keyword(1) |
security |
Keyword(2) |
anomaly traffic |
Keyword(3) |
DDoS-attack |
Keyword(4) |
traffic control |
Keyword(5) |
polocy routing |
Keyword(6) |
|
Keyword(7) |
|
Keyword(8) |
|
1st Author's Name |
Takeshi Yagi |
1st Author's Affiliation |
NIPPON TELEGRAPH AND TELEPHONE CORPORATION (NTT) |
2nd Author's Name |
Kazuhiro Okura |
2nd Author's Affiliation |
NIPPON TELEGRAPH AND TELEPHONE CORPORATION (NTT) |
3rd Author's Name |
Masao Tanabe |
3rd Author's Affiliation |
NIPPON TELEGRAPH AND TELEPHONE CORPORATION (NTT) |
4th Author's Name |
Junichi Murayama |
4th Author's Affiliation |
NIPPON TELEGRAPH AND TELEPHONE CORPORATION (NTT) |
5th Author's Name |
Katsuyasu Toyama |
5th Author's Affiliation |
NIPPON TELEGRAPH AND TELEPHONE CORPORATION (NTT) |
6th Author's Name |
|
6th Author's Affiliation |
() |
7th Author's Name |
|
7th Author's Affiliation |
() |
8th Author's Name |
|
8th Author's Affiliation |
() |
9th Author's Name |
|
9th Author's Affiliation |
() |
10th Author's Name |
|
10th Author's Affiliation |
() |
11th Author's Name |
|
11th Author's Affiliation |
() |
12th Author's Name |
|
12th Author's Affiliation |
() |
13th Author's Name |
|
13th Author's Affiliation |
() |
14th Author's Name |
|
14th Author's Affiliation |
() |
15th Author's Name |
|
15th Author's Affiliation |
() |
16th Author's Name |
|
16th Author's Affiliation |
() |
17th Author's Name |
|
17th Author's Affiliation |
() |
18th Author's Name |
|
18th Author's Affiliation |
() |
19th Author's Name |
|
19th Author's Affiliation |
() |
20th Author's Name |
|
20th Author's Affiliation |
() |
Speaker |
Author-1 |
Date Time |
2006-12-15 14:00:00 |
Presentation Time |
25 minutes |
Registration for |
IN |
Paper # |
IN2006-131 |
Volume (vol) |
vol.106 |
Number (no) |
no.420 |
Page |
pp.103-108 |
#Pages |
6 |
Date of Issue |
2006-12-07 (IN) |
|