Filtering Location Optimization for Defending Against Large-Scale BDoS Attacks

被引:0
|
作者
LU Ning [1 ,2 ,3 ]
WANG Yulong [3 ]
SHI Wenbo [1 ]
LI Guorui [1 ]
DIAO Ding [1 ]
机构
[1] Northeastern University
[2] Nanjing University of Information Science and Technology
[3] Beijing University of Posts and Telecommunications
基金
中国国家自然科学基金; 中央高校基本科研业务费专项资金资助;
关键词
BDoS attack; Filtering location problem;
D O I
暂无
中图分类号
TP393.08 [];
学科分类号
0839 ; 1402 ;
摘要
This paper focuses on selecting the appropriate filtering location to minimize the amount of filtering routers in the traceback-based packet filtering for defending against the large-scale Bandwidth denial-of-service(BDo S) attacks.The filtering location can be viewed as a resource allocation problem and further we formulate it to an integer linear programming model and design an exact and computationally efficient filtering location algorithm.The evaluation results show that our algorithm brings significant benefits in practice.
引用
收藏
页码:435 / 444
页数:10
相关论文
共 50 条
  • [1] Filtering Location Optimization for Defending Against Large-Scale BDoS Attacks
    Lu Ning
    Wang Yulong
    Shi Wenbo
    Li Guorui
    Diao Ding
    CHINESE JOURNAL OF ELECTRONICS, 2017, 26 (02) : 435 - 444
  • [2] Defending Against Large-scale and Coordinated Attacks in the Ubiquitous Environments
    Xiang, Yang
    TRUSTCOM 2011: 2011 INTERNATIONAL JOINT CONFERENCE OF IEEE TRUSTCOM-11/IEEE ICESS-11/FCST-11, 2011, : 7 - 8
  • [3] Scheme of defending against DDoS attacks in large-scale ISP networks
    Wu, Zhi-jun
    Zhang, Dong
    NETWORK AND PARALLEL COMPUTING, PROCEEDINGS, 2007, 4672 : 296 - +
  • [4] Large-Scale Distributed Kalman Filtering via an Optimization Approach
    Hudoba de Badyn, Mathias
    Mesbahi, Mehran
    IFAC PAPERSONLINE, 2017, 50 (01): : 10742 - 10747
  • [5] Adaptive Early Packet Filtering for Defending Firewalls against DoS Attacks
    El-Atawy, Adel
    Al-Shaer, Ehab
    Tran, Tung
    Boutaba, Raouf
    IEEE INFOCOM 2009 - IEEE CONFERENCE ON COMPUTER COMMUNICATIONS, VOLS 1-5, 2009, : 2437 - +
  • [6] Combinatorial Optimization of Operational (Cyber) Attacks Against Large-Scale Critical Infrastructures: The Vertex Cover Approach
    Filiol, Eric
    Gallais, Cecilia
    PROCEEDINGS OF THE 11TH INTERNATIONAL CONFERENCE ON CYBER WARFARE AND SECURITY (ICCWS 2016), 2016, : 128 - 136
  • [7] A Router Based Packet Filtering Scheme for Defending Against DoS Attacks
    Lu Ning
    Su Sen
    Jing Maohua
    Han Jian
    CHINA COMMUNICATIONS, 2014, 11 (10) : 136 - 146
  • [8] A Deep Learning Game Theoretic Model for Defending Against Large Scale Smart Grid Attacks
    Cunningham, James D.
    Aved, Alexander
    Ferris, David
    Morrone, Philip
    Tucker, Conrad S.
    IEEE TRANSACTIONS ON SMART GRID, 2023, 14 (02) : 1188 - 1197
  • [9] Location optimization for the drilling platform of large-scale cluster wells
    Li, Wenfei
    Zhu, Kuanliang
    Guang, Zhichuan
    Chen, Ming
    Liu, Yunpeng
    Shi, Yucai
    Shiyou Xuebao/Acta Petrolei Sinica, 2011, 32 (01): : 162 - 166
  • [10] Revisiting Defenses against Large-Scale Online Password Guessing Attacks
    Alsaleh, Mansour
    Mannan, Mohammad
    van Oorschot, P. C.
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2012, 9 (01) : 128 - 141