An improved solution against DoS attacks using active network technology

被引:0
|
作者
Wei, H [1 ]
Xu, WG [1 ]
An, G [1 ]
Shi, LJ [1 ]
Fang, ZY [1 ]
机构
[1] Jilin Univ, Coll Comp Sci & Technol, Changchun 130012, Peoples R China
关键词
active networks; DoS/DDoS; cluster;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Network Security is a key problem that is ignored by people or is difficult to solve, especially some network attack plotted by illegal users, such as DoS and DDoS attacks. Although DoS and DDoS attacks can be treated as a congestion-control problem, most congestions are caused by those illegal users who do not obey end-end congestion control. So this problem must be solved through cooperation of IDSs and middle nodes (router, switch and so on). Appearance of active network architecture provides a beneficial condition for solving the problem. In active network, some computation functionality can be added into each middle node, so these middle nodes can identify and drop those flow-packets belonging to DoS/DDoS attacks. Those upstream nodes can also be notified by downstream node to drop these packets in order to make ordinary flow get more upstream bandwidth. This paper presents an architecture of identifying and controlling these attack clusters and an algorithm for implementing this architecture. The architecture includes both a mechanism of identifying and controlling a cluster by using technology of active network and a notify mechanism between routers under the control of administration controller.
引用
收藏
页码:115 / 119
页数:5
相关论文
共 50 条
  • [21] An Overview of Defense Techniques Against DoS Attacks
    Afzaal, Muhammad
    2022 9TH INTERNATIONAL CONFERENCE ON INTERNET OF THINGS: SYSTEMS, MANAGEMENT AND SECURITY, IOTSMS, 2022, : 101 - 108
  • [22] On securing Wireless Sensor Network-Novel authentication scheme against DOS attacks
    K. Nirmal Raja
    M. Marsaline Beno
    Journal of Medical Systems, 2014, 38
  • [23] On securing Wireless Sensor Network-Novel authentication scheme against DOS attacks
    Raja, K. Nirmal
    Beno, M. Marsaline
    JOURNAL OF MEDICAL SYSTEMS, 2014, 38 (10)
  • [24] Analyzing the Effect of DoS Attacks on Network Performance
    Kumar, Gaurav
    Abdelfattah, Eman
    Holbrooks, Johnathon
    Perez, Alexander
    2017 IEEE 8TH ANNUAL UBIQUITOUS COMPUTING, ELECTRONICS AND MOBILE COMMUNICATION CONFERENCE (UEMCON), 2017, : 372 - 376
  • [25] State prediction using LSTM with optimized PMU deployment against DoS attacks
    Wang, Chunye
    Sun, Jian
    Xu, Xiaoxin
    Zou, Bin
    Zhang, Min
    Tang, Yang
    Zeng, Min
    JOURNAL OF INTELLIGENT & FUZZY SYSTEMS, 2022, 42 (06) : 5957 - 5971
  • [26] Toward an Artificial Immune Server against Cyber Attacks: Enhancement of Protection against DoS attacks
    Tarao, Mitsunobu
    Okamoto, Takeshi
    KNOWLEDGE-BASED AND INTELLIGENT INFORMATION & ENGINEERING SYSTEMS: PROCEEDINGS OF THE 20TH INTERNATIONAL CONFERENCE KES-2016, 2016, 96 : 1137 - 1146
  • [27] A New Approach for Improvement Security against DoS Attacks in Vehicular Ad-hoc Network
    Fotohi, Reza
    Ebazadeh, Yaser
    Geshlag, Mohammad Seyyar
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2016, 7 (07) : 10 - 16
  • [28] Analysis of an Ethereum Private Blockchain Network Hosted by Virtual Machines Against Internal DoS Attacks
    Battisti, Joao H. F.
    Koslovski, Guilherme P.
    Pillon, Mauricio A.
    Miers, Charles C.
    Gonzalez, Nelson M.
    ADVANCED INFORMATION NETWORKING AND APPLICATIONS, AINA-2022, VOL 1, 2022, 449 : 479 - 490
  • [29] DeMi: A Solution to Detect and Mitigate DoS Attacks in SDN
    Eliyan, Lubna Fayez
    Di Pietro, Roberto
    IEEE ACCESS, 2023, 11 : 82477 - 82495
  • [30] Resilence of Network Stateful Firewalls against Emerging DoS Attacks: A Case Study of the BlackNurse Attack
    Trabelsi, Zouheir
    Zeidan, Safaa
    2019 IEEE/ACS 16TH INTERNATIONAL CONFERENCE ON COMPUTER SYSTEMS AND APPLICATIONS (AICCSA 2019), 2019,