A countermeasure against DDOS attacks using active networks technologies

被引:0
|
作者
Kashiwa, D
Chen, EY
Fuji, H
机构
[1] NTT Corp, Informat Sharing Platform Labs, Yokosuka, Kanagawa 2390847, Japan
[2] Keio Univ, Fac Sci & Technol, Tokyo 108, Japan
[3] Univ Tokyo, Tokyo, Japan
关键词
computer security; Internet; congestion control; active telecommunication network; distributed system; adaptive method; automatic classification;
D O I
暂无
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
A Distributed Denial of Service (DDOS) attack consumes the resources of a remote host or network by sending a massive amount of IP packets from many distributed hosts. It is a pressing problem on the Internet as demonstrated by recent attacks on major e-commerce servers and ISPS. Since the attack is distributed and the attack tools evolve at a rapid and alarming rate, an effective solution must be formulated using a distributed and adaptive approach. In this paper we propose a countermeasure against DDOS attacks using a method we call Active Shaping. Our method employs the Active Networks technologies, which incorporates programmability into network nodes. The Active Networks technology enables us to deter congestion and bandwidth consumption of the backbone network caused by DDOS attacks, and to prevent our system from dropping packets of legitimate users mistakenly. This paper introduces the concept of our method, system design and evaluates the effectiveness of our method using a prototype..
引用
收藏
页码:605 / 629
页数:25
相关论文
共 50 条
  • [1] Active shaping: A countermeasure against DDoS attacks
    Kashiwa, D
    Chen, EY
    Fuji, H
    ECUMN'2002: 2ND EUROPEAN CONFERENCE ON UNIVERSAL MULTISERVICE NETWORKS, CONFERENCE PROCEEDINGS, 2002, : 171 - 179
  • [2] Active countermeasure platform against DDoS attacks
    Kashiwa, D
    Chen, EY
    Fuji, H
    Machida, S
    Shigeno, H
    Okada, K
    Matsushita, Y
    IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2002, E85D (12) : 1918 - 1928
  • [3] DDoS attacks defense based on active networks
    Chen, Jui-Ming
    Wang, Kai-Ping
    Chou, Li-Der
    Journal of Internet Technology, 2006, 7 (02): : 205 - 213
  • [4] Protection of Corporate Networks against DDoS Attacks Using the Arbor Technology
    Jovanovic, Marko Lj
    Koprivica, Mladen
    Neskovic, Natasa
    2018 26TH TELECOMMUNICATIONS FORUM (TELFOR), 2018, : 120 - 123
  • [5] Defense mechanism using overlay against DDoS attacks on converged networks
    Kim, Mihui
    Doh, Inshil
    Chae, Kijoon
    9TH INTERNATIONAL CONFERENCE ON ADVANCED COMMUNICATION TECHNOLOGY: TOWARD NETWORK INNOVATION BEYOND EVOLUTION, VOLS 1-3, 2007, : 1539 - +
  • [6] Real-time protection against DDoS attacks using active gateways
    Demir, O
    Ghose, K
    25TH IEEE INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING SYSTEMS WORKSHOPS, PROCEEDINGS, 2005, : 224 - 231
  • [7] A Countermeasure to Defend Against Relay Attacks in Wireless Networks
    Tang, Caimu
    Wu, Dapeng Oliver
    GLOBECOM 2006 - 2006 IEEE GLOBAL TELECOMMUNICATIONS CONFERENCE, 2006,
  • [8] Detection and Reaction against DDoS Attacks in Cellular Networks
    Rekhis, Slim
    Chouchane, Alaaedine
    Boudriga, Noureddine
    2008 3RD INTERNATIONAL CONFERENCE ON INFORMATION AND COMMUNICATION TECHNOLOGIES: FROM THEORY TO APPLICATIONS, VOLS 1-5, 2008, : 2520 - 2525
  • [9] PETRAK: A solution against DDoS attacks in vehicular networks
    Verma, Amandeep
    Saha, Rahul
    Kumar, Gulshan
    Conti, Mauro
    COMPUTER COMMUNICATIONS, 2024, 221 : 142 - 154
  • [10] An Intrusion Detection System Against DDoS Attacks in IoT Networks
    Roopak, Monika
    Tian, Gui Yun
    Chambers, Jonathon
    2020 10TH ANNUAL COMPUTING AND COMMUNICATION WORKSHOP AND CONFERENCE (CCWC), 2020, : 562 - 567