A New DDoS Defense Method

被引:0
|
作者
Wang, Dongqi [1 ]
Lin, Luo
Chang, Guiran [1 ]
机构
[1] Northwestern Univ, Shenyang, Peoples R China
关键词
DDoS; collateral damage; nest loop algorithm; access control list;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Large scale DDoS aims to take victim down by sending large traffic. Existing work in DDoS defense tries to filter attack traffic. The filtering process causes collateral damage. A lot of researches had been done to mitigate collateral damages, such as IP traceback, finding new DDoS recognizing method, and so on. All these researches confirm attack traffic, filter it, nothing will be done after filtering. In this paper we proposed a new DDoS defense method which uses an improved nest loop algorithm to handle filtered traffic, after that, access control lists are established to reduce collateral damage. A careful experiment evaluation shows that our method can be used to defend against large scale DDoS, and it gives a new way to mitigate collateral damage.
引用
收藏
页码:526 / 529
页数:4
相关论文
共 50 条
  • [21] Benchmarks for DDOS defense evaluation
    Mirkovic, Jelena
    Arikan, Erinc
    Wei, Songjie
    Thomas, Roshan
    Fahmy, Sonia
    Reiher, Peter
    MILCOM 2006, VOLS 1-7, 2006, : 713 - +
  • [22] DDoS Defense as a Network Service
    Du, Ping
    Nakao, Akihiro
    PROCEEDINGS OF THE 2010 IEEE-IFIP NETWORK OPERATIONS AND MANAGEMENT SYMPOSIUM, 2010, : 894 - 897
  • [23] A framework for a collaborative DDoS defense
    Oikonomou, George
    Mirkovic, Jelena
    Reiher, Peter
    Robinson, Max
    22ND ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE, PROCEEDINGS, 2006, : 33 - +
  • [24] A New Private Security Policy Approach for DDoS Attack Defense in NGNs
    Dac-Nhuong Le
    Vo Nhan Van
    Trinh Thi Thuy Giang
    INFORMATION SYSTEMS DESIGN AND INTELLIGENT APPLICATIONS, VOL 3, INDIA 2016, 2016, 435 : 1 - 10
  • [25] A confidence-based filtering method for DDoS attack defense in cloud environment
    Dou, Wanchun
    Chen, Qi
    Chen, Jinjun
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2013, 29 (07): : 1838 - 1850
  • [26] An efficient and practical Defense method against DDoS attack at the source-end
    He, YX
    Chen, W
    Xiao, B
    Peng, WL
    11TH INTERNATIONAL CONFERENCE ON PARALLEL AND DISTRIBUTED SYSTEMS WORKSHOPS, VOL II, PROCEEDINGS,, 2005, : 265 - 269
  • [27] DDoS Attack Identification and Defense using SDN based on Machine Learning Method
    Yang Lingfeng
    Zhao Hui
    2018 15TH INTERNATIONAL SYMPOSIUM ON PERVASIVE SYSTEMS, ALGORITHMS AND NETWORKS (I-SPAN 2018), 2018, : 166 - 170
  • [28] Collaborative defense mechanism using statistical detection method against DDoS attacks
    Song, ByungHak
    Heo, Joon
    Hong, Choong Seon
    IEICE TRANSACTIONS ON COMMUNICATIONS, 2007, E90B (10) : 2655 - 2664
  • [29] DDoS Defense Mechanism by applying stamps
    Krishnan, S. S. Nagamuthu
    Saravanan, V.
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2009, 9 (08): : 195 - 199
  • [30] STONE: A streaming DDoS defense framework
    Gulisano, Vincenzo
    Callau-Zori, Mar
    Fu, Zhang
    Jimenez-Peris, Ricardo
    Papatriantafilou, Marina
    Patino-Martinez, Marta
    EXPERT SYSTEMS WITH APPLICATIONS, 2015, 42 (24) : 9620 - 9633