A New DDoS Defense Method

被引:0
|
作者
Wang, Dongqi [1 ]
Lin, Luo
Chang, Guiran [1 ]
机构
[1] Northwestern Univ, Shenyang, Peoples R China
关键词
DDoS; collateral damage; nest loop algorithm; access control list;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Large scale DDoS aims to take victim down by sending large traffic. Existing work in DDoS defense tries to filter attack traffic. The filtering process causes collateral damage. A lot of researches had been done to mitigate collateral damages, such as IP traceback, finding new DDoS recognizing method, and so on. All these researches confirm attack traffic, filter it, nothing will be done after filtering. In this paper we proposed a new DDoS defense method which uses an improved nest loop algorithm to handle filtered traffic, after that, access control lists are established to reduce collateral damage. A careful experiment evaluation shows that our method can be used to defend against large scale DDoS, and it gives a new way to mitigate collateral damage.
引用
收藏
页码:526 / 529
页数:4
相关论文
共 50 条
  • [1] The New Method of DDOS Defense
    Liang, Shuang
    ADVANCES IN MULTIMEDIA, SOFTWARE ENGINEERING AND COMPUTING, VOL 1, 2011, 128 : 145 - 151
  • [2] DDoS Defense Mechanisms: A New Taxonomy
    Keshariya, Astha
    Foukia, Noria
    DATA PRIVACY MANAGEMENT AND AUTONOMOUS SPONTANEOUS SECURITY, 2010, 5939 : 222 - 236
  • [3] A novel method to defense against Web DDoS
    Wang, F. (wangfengyu@sdu.edu.cn), 1600, Advanced Institute of Convergence Information Technology, Myoungbo Bldg 3F,, Bumin-dong 1-ga, Seo-gu, Busan, 602-816, Korea, Republic of (06):
  • [4] An Outlier Detection Based DDoS Defense Method
    Wang, Dongqi
    Zhu Yufu
    Chang Guiran
    2009 INTERNATIONAL SYMPOSIUM ON COMPUTER NETWORK AND MULTIMEDIA TECHNOLOGY (CNMT 2009), VOLUMES 1 AND 2, 2009, : 511 - 514
  • [5] A New Type of DDoS Defense System Study
    Li Lei-jun
    2010 2ND IEEE INTERNATIONAL CONFERENCE ON INFORMATION AND FINANCIAL ENGINEERING (ICIFE), 2010, : 307 - 310
  • [6] A Method Based on AMHI for DDoS Attacks Detection and Defense
    Bu, Kai
    Sun, Zhixin
    PROCEEDINGS OF THE 9TH INTERNATIONAL CONFERENCE FOR YOUNG COMPUTER SCIENTISTS, VOLS 1-5, 2008, : 1571 - 1576
  • [7] A new and comprehensive taxonomy of DDoS attacks and defense mechanism
    Asosheh, Abbass
    Ramezani, Naghmeh
    PROCEEDINGS OF THE 6TH WSEAS INTERNATIONAL CONFERENCE ON INFORMATION SECURITY AND PRIVACY (ISP '07): ADVANCED TOPICS IN INFORMATION SECURITY AND PRIVACY, 2007, : 178 - 183
  • [8] DDoS Defense by Offense
    Walfish, Michael
    Vutukuru, Mythili
    Balakrishnan, Hari
    Karger, David
    Shenker, Scott
    ACM TRANSACTIONS ON COMPUTER SYSTEMS, 2010, 28 (01):
  • [9] A taxonomy of DDoS attack and DDoS Defense mechanisms
    Mirkovic, J
    Reiher, P
    ACM SIGCOMM COMPUTER COMMUNICATION REVIEW, 2004, 34 (02) : 39 - 53
  • [10] DDoS defense by offense
    Walfish, Michael
    Vutukuru, Mythili
    Balakrishnan, Hari
    Karger, David
    Shenker, Scott
    ACM SIGCOMM COMPUTER COMMUNICATION REVIEW, 2006, 36 (04) : 303 - 314