An efficient and practical Defense method against DDoS attack at the source-end

被引:0
|
作者
He, YX [1 ]
Chen, W [1 ]
Xiao, B [1 ]
Peng, WL [1 ]
机构
[1] Wuhan Univ, Comp Sch, State Key Lab Software Engn, Wuhan 430072, Peoples R China
关键词
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Distributed Denial-of-Service (DDoS) attack is one of the most serious threats to the internet. Detecting DDoS at the source-end has many advantages over defense at the victim-end and intermediate-network. One of the main problems for source-end methods is the performance degradation brought by these methods, which discourages Internet Service Providers(ISPs) to deploy the defense system. We propose an efficient detection approach, which only requires limited fixed-length memory and low computation overhead but provides satisfying detection results. The low cost of defense is expected to attract more ISPs to join the defense. The experiments results show our approach is efficient and feasible for defense at the source-end.
引用
收藏
页码:265 / 269
页数:5
相关论文
共 50 条
  • [1] Source-end DDoS defense
    Mirkovic, J
    Prier, G
    Reihner, P
    SECOND IEEE INTERNATIONAL SYMPOSIUM ON NETWORK COMPUTING AND APPLICATIONS, PROCEEDINGS, 2003, : 171 - 178
  • [2] Source-End DDoS Defense in IoT Environments
    Mergendahl, Samuel
    Sisodia, Devkishen
    Li, Jun
    Cam, Hasan
    PROCEEDINGS OF THE 2017 WORKSHOP ON INTERNET OF THINGS SECURITY AND PRIVACY (IOT S&P'17), 2017, : 63 - 64
  • [3] Source-end Defense against SYN flooding attacks: An adaptive detection method
    Yu, Ming
    Chen, Weidong
    Zhou, Xiyuan
    DYNAMICS OF CONTINUOUS DISCRETE AND IMPULSIVE SYSTEMS-SERIES B-APPLICATIONS & ALGORITHMS, 2006, 13E : 1674 - 1677
  • [4] Enforcing a Source-end Cooperative Multilevel Defense Mechanism to Counter Flooding Attack
    Shunmuganathan, Saraswathi
    COMPUTER SYSTEMS SCIENCE AND ENGINEERING, 2023, 44 (01): : 67 - 79
  • [5] Efficient and beneficial defense against DDoS direct attack and reflector attack
    He, YX
    Chen, W
    Peng, WL
    Yang, M
    PARALLEL AND DISTRIBUTED PROCESSING AND APPLICATIONS, 2005, 3758 : 576 - 587
  • [6] A Nonparametric Adaptive CUSUM Method and Its Application in Source-End Defense against SYN Flooding Attacks
    YU Ming School of Information and Communication Engineering
    WuhanUniversityJournalofNaturalSciences, 2011, 16 (05) : 414 - 418
  • [7] D-WARD: A source-end defense against flooding denial-of-service attacks
    Mirkovic, J
    Reiher, P
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2005, 2 (03) : 216 - 232
  • [8] A Novel Defense Scheme against DDOS Attack in VANET
    Pathre, Ayonija
    Agrawal, Chetan
    Jain, Anurag
    2013 TENTH INTERNATIONAL CONFERENCE ON WIRELESS AND OPTICAL COMMUNICATIONS NETWORKS (WOCN), 2013,
  • [9] A novel defense scheme against DDOS attack in VANET
    2013, IEEE Computer Society
  • [10] Detection and Defense Against DDoS Attack with IP Spoofing
    Mopari, I. B.
    Pukale, S. G.
    Dhore, M. L.
    ICCN: 2008 INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATION AND NETWORKING, 2008, : 204 - 208