Challenges and Principles of DDoS Defense

ثبت نشده
چکیده

Distributed denial-of-service (DDoS) attacks present an Internet-wide threat. Such attacks depend on large numbers of compromised machines, but solving the problem by completely securing every machine on the Internet is impossible. Solutions located near the victim are subject to congestion and are unable to differentiate between legitimate and attack traffic, while solutions at the source-end networks cannot detect all attacks and are not effective unless widely deployed. Infrastructural approaches are promising, but will face tremendous challenges in popular acceptance and deployment. We argue that solutions to the DDoS problem must be carefully designed to meet certain fundamental principles of security and system design. These principles include using distributed solutions to solve distributed problems, avoiding security solutions that harm legitimate activities, securing a defense system from external and internal threats, having a practical strategy for adoption and completeness. We show how violations of these principles lead to limitations and weaknesses in existing approaches. We then present an example DDoS defense system that adheres to these principles—the Defensive Cooperative Overlay Mesh (DefCOM).

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Review on Ddos Attacks and Various Detection Mechanisms

DDoS attack is a coordinated attack on massive scale and it is a major threat in current computer networks. It is not easy to detect the attack , The seriousness of the DDoS problem and the increased frequency of DDoS attacks have led to the advent of numerous DDoS defense mechanisms. Detection mechanism is the first step to avoid the DDoS attack. Some of these mechanisms address a specific kin...

متن کامل

Source-End DDoS Defense

A successful source-end DDoS defense enables early suppression of the attack and minimizes collateral damage. However, such an approach faces many challenges: (a) distributing the attack hinders detection; (b) defense systems must guarantee good service to legitimate traffic during the attack; and (c) deployment costs and false alarm levels must be sufficiently small and effectiveness must be h...

متن کامل

A Taxonomy of DDoS Attacks and DDoS Defense Mechanisms

This paper proposes a taxonomy of distributed denial-ofservice attacks and a taxonomy of the defense mechanisms that strive to counter these attacks. The attack taxonomy is illustrated using both known and potential attack mechanisms. Along with this classification we discuss important features of each attack category that in turn define the challenges involved in combating these threats. The d...

متن کامل

Using Features of Cloud Computing to Defend Smart Grid against DDoS Attacks

Smart Grid (SG) poses operational and business challenges for energy suppliers and utility companies that are readily met by Cloud Computing (CC). Given the distributed nature of SG and CC it is inevitable that the two technologies will become integrated. In this paper we discuss the risks and opportunities that CC presents to energy suppliers and utility companies, and consider what inherent a...

متن کامل

Detection and defense of application-layer DDoS attacks in backbone web traffic

Web servers are usually located in a well-organized data center where these servers connect with the outside Internet directly through backbones. Meanwhile, the application-layer distributed denials of service (AL-DDoS) attacks are critical threats to the Internet, particularly to those business web servers. Currently, there are somemethods designed to handle the AL-DDoS attacks, but most of th...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2003