A Defending Mechanism against DDoS Based on Registration and Authentication

被引:0
|
作者
Zhang, Wei [1 ]
Guo, Shize [1 ]
Zheng, Kangfeng [1 ]
Yang, Yixian [1 ]
机构
[1] Beijing Univ Posts & Telecommun, State Key Lab Networking & Switching Technol, Informat Secur Ctr, Beijing 100088, Peoples R China
关键词
DDoS; protecting mechanism; registration; authentication; routing algorithm;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Because DDoS attacks destination servers from computers distributed all over network, it is very hard to locate attacking sources and resist DDoS. In this paper, a new defending mechanism based on registration and authentication against DDoS is proposed By bidirectional warning messages, it can help locate attacking sources quickly and resist DDoS more exactly. According to the mechanism, all servers and routers applying for protecting from DDoS are required to register firstly, so that they can translate warning messages encrypted in public-key algorithm to prevent from spoofing. A flexible defending can be achieved by distributing filtering features and policies dynamically.
引用
收藏
页码:2192 / 2197
页数:6
相关论文
共 50 条
  • [31] Defending Root DNS Servers against DDoS Using Layered Defenses (Extended)
    Rizvi, A. S. M.
    Mirkovic, Jelena
    Heidemann, John
    Hardaker, Wesley
    Story, Robert
    AD HOC NETWORKS, 2023, 151
  • [32] Multi-Defense Mechanism against DDoS in SDN based CDNi
    Nishat-I-Mowla
    Doh, Inshil
    Chae, Kijoon
    2014 Eighth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing (IMIS), 2014, : 447 - 451
  • [33] Filtering spoofed traffic at source end for defending against DoS/DDoS attacks
    Malliga, S.
    Tamilarasi, A.
    Janani, M.
    ICCN: 2008 INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATION AND NETWORKING, 2008, : 216 - 220
  • [34] Cloud Password Shield: A Secure Cloud-based Firewall against DDoS on Authentication Servers
    Fu, Yue
    Au, Man Ho
    Du, Rong
    Hu, Haibo
    Li, Dagang
    2020 IEEE 40TH INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING SYSTEMS (ICDCS), 2020, : 1209 - 1210
  • [35] Defending Secret-Key Based Authentication Protocols against the Stolen-Secret Attack
    Sun, Hung-Min
    Wang, King-Hang
    PROCEEDINGS OF THE INTERNATIONAL SYMPOSIUM ON ELECTRONIC COMMERCE AND SECURITY, 2008, : 385 - 389
  • [36] IP traceback-based intelligent packet filtering: A novel technique for defending against Internet DDoS attacks
    Sung, MH
    Xu, J
    10TH IEEE INTERNATIONAL CONFERENCE ON NETWORK PROTOCOLS, PROCEEDINGS, 2002, : 302 - 311
  • [37] IP traceback-based intelligent packet filtering: A novel technique for defending against internet DDoS attacks
    Sung, MH
    Xu, J
    IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2003, 14 (09) : 861 - 872
  • [38] A Responsive Defense Mechanism Against DDoS Attacks
    Mosharraf, Negar
    Jayasumana, Anura P.
    Ray, Indrakshi
    FOUNDATIONS AND PRACTICE OF SECURITY (FPS 2014), 2015, 8930 : 347 - 355
  • [39] A Distributed Mechanism to Protect Against DDoS Attacks
    Mosharraf, Negar
    Jayasumana, Anura P.
    Ray, Indrakshi
    DATA AND APPLICATIONS SECURITY AND PRIVACY XXXI, DBSEC 2017, 2017, 10359 : 529 - 540
  • [40] Analysis of Attacks on Continuous Authentication Methods and Ways of Defending Against Them
    Matiushin, Iurii
    Korkhov, Vladimir
    Busko, Ilya
    COMPUTATIONAL SCIENCE AND ITS APPLICATIONS-ICCSA 2024 WORKSHOPS, PT VII, 2024, 14821 : 369 - 385