A DDoS attack defending scheme based on network processor

被引:0
|
作者
Li Xinlei [1 ]
Zheng Kangfeng [1 ]
Yang Yixian [1 ]
机构
[1] Beijing Univ Posts & Telecommun, State Key Lab Networking & Switching Technol, Informat Secur Ctr, Beijing 100876, Peoples R China
关键词
distributed denial of service attacks; QoS; network processor; defending;
D O I
10.1109/ICIE.2009.107
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The distributed denial of service attacks have become more and more frequent and caused some fatal problems. Many researches have been done to detect and defend such attacks, however, many solutions are still in the phase of theoretical studies. Some of them may have certain practical value, but they have to reconstruct the existing network and the routing instruments with great cost. This paper proposes a DDoS attack defending scheme based on network processor. The scheme takes advantage of network processor's powerful process ability to divide the network flow into different types firstly, and then uses a QoS mechanism to ensure essential communications as well as to eliminate the attack flow to the greatest extent. Experiment results show that the scheme can provide enough bandwidth for high priority flow, and effectively weaken the attack flow.
引用
收藏
页码:238 / 241
页数:4
相关论文
共 50 条
  • [1] A simulation platform of DDoS attack based on network processor
    Li Xin-Le
    Zheng Kang-feng
    Yang Yi-xian
    2008 INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY, VOLS 1 AND 2, PROCEEDINGS, 2008, : 421 - 426
  • [2] AN APPROACH OF DEFENDING AGAINST DDOS ATTACK
    Wu Zhijun Duan Haixin Li Xing (Network Research Center
    Journal of Electronics(China), 2006, (01) : 148 - 153
  • [3] AN APPROACH OF DEFENDING AGAINST DDOS ATTACK
    Wu Zhijun Duan Haixin Li Xing Network Research Center Tsinghua University Beijing China Tianjin Key Lab for Advanced Signal Processing Civil Aviation University of China Tianjin China
    JournalofElectronics, 2006, (01) : 148 - 153
  • [4] Impact of Defending Strategy Decision on DDoS Attack
    Zhang, Chunming
    COMPLEXITY, 2021, 2021
  • [5] Defending Blind DDoS Attack on SDN Based on Moving Target Defense
    Ma, Duohe
    Xu, Zhen
    Lin, Dongdai
    INTERNATIONAL CONFERENCE ON SECURITY AND PRIVACY IN COMMUNICATION NETWORKS, SECURECOMM 2014, PT I, 2015, 152 : 463 - 480
  • [6] Defending DDoS Attack using Stochastic Model based Puzzle Controller
    Santhosh, K. M.
    Isaac, Elizabeth
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2013, 13 (04): : 100 - 105
  • [7] Profile based Scheme against DDoS Attack in WSN
    Nigam, Varsha
    Jain, Saurabh
    Burse, Kavita
    2014 FOURTH INTERNATIONAL CONFERENCE ON COMMUNICATION SYSTEMS AND NETWORK TECHNOLOGIES (CSNT), 2014, : 112 - 116
  • [8] Research on defending DDoS attack - An expert system approach
    Zhang, GY
    Li, J
    Gu, GC
    2004 IEEE INTERNATIONAL CONFERENCE ON SYSTEMS, MAN & CYBERNETICS, VOLS 1-7, 2004, : 3554 - 3558
  • [9] DDoS Attack Detection Scheme Based on Entropy and PSO-BP Neural Network in SDN
    Zhenpeng Liu
    Yupeng He
    Wensheng Wang
    Bin Zhang
    中国通信, 2019, 16 (07) : 144 - 155
  • [10] DDoS Attack Detection Scheme Based on Entropy and PSO-BP Neural Network in SDN
    Liu, Zhenpeng
    He, Yupeng
    Wang, Wensheng
    Zhang, Bin
    CHINA COMMUNICATIONS, 2019, 16 (07) : 144 - 155