Impact of Identifier-Locator Split Mechanism on DDoS Attacks

نویسندگان

  • Ying Liu
  • Jianqiang Tang
  • Meng Zhang
  • Hongke Zhang
چکیده

The semantic overload of IP address, representing not only the identifiers of nodes but also the locators of nodes, is one of the fundamental reasons for hindering the development of current Internet. Therefore, the identifier-locator split mapping network which separates the two functions has become one of the federating themes for future Internet architecture. However, DDoS attacks are still in existence in this network. In this paper, we use the attack traffic to discuss and compare the effects of DDoS attacks on the current Internet and the identifier-locator split mapping network. The numerical and simulation analyses show that the identifier-locator split mapping network alleviates DDoS attacks more effectively compared with the current Internet.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

F-STONE: A Fast Real-Time DDOS Attack Detection Method Using an Improved Historical Memory Management

Distributed Denial of Service (DDoS) is a common attack in recent years that can deplete the bandwidth of victim nodes by flooding packets. Based on the type and quantity of traffic used for the attack and the exploited vulnerability of the target, DDoS attacks are grouped into three categories as Volumetric attacks, Protocol attacks and Application attacks. The volumetric attack, which the pro...

متن کامل

Pi: A Path Identification Mechanism to Defend Against DDoS Attacks

Distributed Denial of Service (DDoS) attacks continue to plague the Internet. Defense against these attacks is complicated by spoofed source IP addresses, which make it difficult to determine a packet’s true origin. We propose Pi (short for Path Identifier), a new packet marking approach in which a path fingerprint is embedded in each packet, enabling a victim to identify packets traversing the...

متن کامل

Augmented Split –protocol; Anultimate Ddos Defender

Distributed Denials of Service (DDoS) attacks have become the daunting problem for businesses, state administrator and computer system users. Prevention and detection of a DDoS attack is a major research topic for researchers throughout the world. As new remedies are developed to prevent or mitigate DDoS attacks, invaders are continually evolving new methods to circumvent these new procedures. ...

متن کامل

Pi: A Path Identification Mechanism to Defend against DDoS Attack

Distributed Denial of Service (DDoS) attacks continue to plague the Internet. Defense against these attacks is complicated by spoofed source IP addresses, which make it difficult to determine a packet’s true origin. We propose Pi (short for Path Identifier), a new packet marking approach in which a path fingerprint is embedded in each packet, enabling a victim to identify packets traversing the...

متن کامل

Global Locator, Local Locator, and Identifier Split (GLI-Split)

GLI-Split is a new addressing and routing architecture for the Internet. It splits the functionality of current IP addresses into a global locator, a local locator, and an identifier, and encodes them in IPv6 addresses. It implements the locator/identifier split and makes routing in the core of the Internet more scalable. GLI-Split can be incrementally deployed and it is backward-compatible wit...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:
  • J. Inf. Sci. Eng.

دوره 29  شماره 

صفحات  -

تاریخ انتشار 2013