Challenges and Principles of DDoS Defense
ثبت نشده
چکیده
Distributed denial-of-service (DDoS) attacks present an Internet-wide threat. Such attacks depend on large numbers of compromised machines, but solving the problem by completely securing every machine on the Internet is impossible. Solutions located near the victim are subject to congestion and are unable to differentiate between legitimate and attack traffic, while solutions at the source-end networks cannot detect all attacks and are not effective unless widely deployed. Infrastructural approaches are promising, but will face tremendous challenges in popular acceptance and deployment. We argue that solutions to the DDoS problem must be carefully designed to meet certain fundamental principles of security and system design. These principles include using distributed solutions to solve distributed problems, avoiding security solutions that harm legitimate activities, securing a defense system from external and internal threats, having a practical strategy for adoption and completeness. We show how violations of these principles lead to limitations and weaknesses in existing approaches. We then present an example DDoS defense system that adheres to these principles—the Defensive Cooperative Overlay Mesh (DefCOM).
منابع مشابه
Review on Ddos Attacks and Various Detection Mechanisms
DDoS attack is a coordinated attack on massive scale and it is a major threat in current computer networks. It is not easy to detect the attack , The seriousness of the DDoS problem and the increased frequency of DDoS attacks have led to the advent of numerous DDoS defense mechanisms. Detection mechanism is the first step to avoid the DDoS attack. Some of these mechanisms address a specific kin...
متن کاملSource-End DDoS Defense
A successful source-end DDoS defense enables early suppression of the attack and minimizes collateral damage. However, such an approach faces many challenges: (a) distributing the attack hinders detection; (b) defense systems must guarantee good service to legitimate traffic during the attack; and (c) deployment costs and false alarm levels must be sufficiently small and effectiveness must be h...
متن کاملA Taxonomy of DDoS Attacks and DDoS Defense Mechanisms
This paper proposes a taxonomy of distributed denial-ofservice attacks and a taxonomy of the defense mechanisms that strive to counter these attacks. The attack taxonomy is illustrated using both known and potential attack mechanisms. Along with this classification we discuss important features of each attack category that in turn define the challenges involved in combating these threats. The d...
متن کاملUsing Features of Cloud Computing to Defend Smart Grid against DDoS Attacks
Smart Grid (SG) poses operational and business challenges for energy suppliers and utility companies that are readily met by Cloud Computing (CC). Given the distributed nature of SG and CC it is inevitable that the two technologies will become integrated. In this paper we discuss the risks and opportunities that CC presents to energy suppliers and utility companies, and consider what inherent a...
متن کاملDetection and defense of application-layer DDoS attacks in backbone web traffic
Web servers are usually located in a well-organized data center where these servers connect with the outside Internet directly through backbones. Meanwhile, the application-layer distributed denials of service (AL-DDoS) attacks are critical threats to the Internet, particularly to those business web servers. Currently, there are somemethods designed to handle the AL-DDoS attacks, but most of th...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2003