Tolerating Denial-of-Service Attacks Using Overlay Networks - Impact of Overlay Network Topology

نویسندگان

  • Ju Wang
  • Linyuan Lu
  • Andrew A. Chien
چکیده

Proxy-network based overlays have been proposed to protect Internet Applications against Denial-of-Service (DoS) attacks by hiding an application’s location. We study how a proxy network’s topology influences the effectiveness of location-hiding. We provide a general analysis of system dynamics under attack, and study how the speed of attack, speed of defense, and proxy network topology affect these dynamics. Our analysis characterizes when proxy networks are robust against attacks (attackers’ impact can be quickly and completely removed), and when they are vulnerable to attacks (attackers’ impact cannot be completely removed). We present a general set of metrics for proxy network topologies which can be applied to evaluate them with respect to robustness and vulnerability. We apply these metrics and analysis to a range of popular overlay network topologies, showing that the Chord [18] used for location-hiding in [27, 19], is not a good choice, and that topologies such as CAN [20] are a much better topology for DoS resistance and location-hiding. In general proxy networks with lower vertex degrees and balanced distribution of connectivity have better properties. Our results provide a set of sound design principles for proxy network topologies for location-hiding and DoS-resistance.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

An Analysis of Using Overlay Networks to Resist Distributed Denial-of-Service Attacks

Proxy networks based on overlays have been proposed as an architecture to protect Internet applications against denial-of-service attacks, however we know of no formal analysis of such schemes' effectiveness. We describe a framework to analyze a class of these proxy network architectures. Based on an attack model and a system model, we analytically characterize how attacks affect two key factor...

متن کامل

Using Overlay Networks to Resist Denial-of-Service Attacks

Proxy-network based overlays have been proposed to protect Internet applications against Denial-of-Service (DoS) attacks by hiding an application’s location. We develop a formal framework which models attacks, defensive mechanisms, and proxy networks. We use the framework to analyze the general effectiveness of proxy network schemes to protect applications. Using our formal model, we analytical...

متن کامل

Using Overlay Networks to Resist Denial-of-Service Attacks

Proxy-network based overlays have been proposed to protect Internet applications against Denial-of-Service (DoS) attacks by hiding an application’s location. We develop a formal framework which models attacks, defensive mechanisms, and proxy networks. We use the framework to analyze the general effectiveness of proxy network schemes to protect applications. Using our formal model, we analytical...

متن کامل

Towards Scalable and Robust Overlay Networks

Every peer-to-peer system is based on some overlay network connecting its peers. Many of the overlay network concepts proposed in the scientific community are based on the concept of virtual space. These designs are usually highly scalable, but they do not guarantee robustness against adversarial attacks, especially when considering open peer-to-peer systems. In these systems, determined advers...

متن کامل

Pushback for Overlay Networks: Protecting Against Malicious Insiders

Peer-to-Peer (P2P) overlay networks are a flexible way of creating decentralized services. Although resilient to external Denial of Service attacks, overlay networks can be rendered inoperable by simple flooding attacks generated from insider nodes. In this paper, we study detection and containment mechanisms against insider Denial of Service (DoS) attacks for overlay networks. To counter such ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2003