An improved solution against DoS attacks using active network technology

被引:0
|
作者
Wei, H [1 ]
Xu, WG [1 ]
An, G [1 ]
Shi, LJ [1 ]
Fang, ZY [1 ]
机构
[1] Jilin Univ, Coll Comp Sci & Technol, Changchun 130012, Peoples R China
关键词
active networks; DoS/DDoS; cluster;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Network Security is a key problem that is ignored by people or is difficult to solve, especially some network attack plotted by illegal users, such as DoS and DDoS attacks. Although DoS and DDoS attacks can be treated as a congestion-control problem, most congestions are caused by those illegal users who do not obey end-end congestion control. So this problem must be solved through cooperation of IDSs and middle nodes (router, switch and so on). Appearance of active network architecture provides a beneficial condition for solving the problem. In active network, some computation functionality can be added into each middle node, so these middle nodes can identify and drop those flow-packets belonging to DoS/DDoS attacks. Those upstream nodes can also be notified by downstream node to drop these packets in order to make ordinary flow get more upstream bandwidth. This paper presents an architecture of identifying and controlling these attack clusters and an algorithm for implementing this architecture. The architecture includes both a mechanism of identifying and controlling a cluster by using technology of active network and a notify mechanism between routers under the control of administration controller.
引用
收藏
页码:115 / 119
页数:5
相关论文
共 50 条
  • [31] Securing Distributed SDN Controllers Against DoS Attacks
    Etaiwi, Wael
    Biltawi, Mariam
    Almajali, Sufyan
    2017 INTERNATIONAL CONFERENCE ON NEW TRENDS IN COMPUTING SCIENCES (ICTCS), 2017, : 203 - 206
  • [32] Secure SCTP against DoS attacks in wireless Internet
    Joe, Inwhee
    Network Control and Engineering for QoS, Security and Mobility, V, 2006, 213 : 65 - 74
  • [33] Use of spectral analysis in defense against DoS attacks
    Cheng, CM
    Kung, HT
    Tan, KS
    GLOBECOM'02: IEEE GLOBAL TELECOMMUNICATIONS CONFERENCE, VOLS 1-3, CONFERENCE RECORDS: THE WORLD CONVERGES, 2002, : 2143 - 2148
  • [34] Defending RFID authentication protocols against DoS attacks
    Dang Nguyen Duc
    Kim, Kwangjo
    COMPUTER COMMUNICATIONS, 2011, 34 (03) : 384 - 390
  • [35] A survey of the mitigation methods against DoS attacks on MANETs
    Alsumayt, Albandari
    Haggerty, John
    2014 SCIENCE AND INFORMATION CONFERENCE (SAI), 2014, : 538 - 544
  • [36] "Roto-Rooting" your Router: Solution against New Potential DoS Attacks on Modern Routers
    Chasaki, Danai
    ACM SIGCOMM COMPUTER COMMUNICATION REVIEW, 2011, 41 (04) : 396 - 397
  • [37] Credibility-Based Countermeasure Against Slow HTTP DoS Attacks by Using SDN
    Wang, You-Chiun
    Ye, Ren-Xuan
    2021 IEEE 11TH ANNUAL COMPUTING AND COMMUNICATION WORKSHOP AND CONFERENCE (CCWC), 2021, : 890 - 895
  • [38] Testing of Network Security Systems Through DoS Attacks
    Maraj, Arianit
    Jakupi, Genc
    Rogova, Ermir
    Grajqevci, Xheladin
    2017 6TH MEDITERRANEAN CONFERENCE ON EMBEDDED COMPUTING (MECO), 2017, : 368 - 373
  • [39] Reliability Analysis of a Network Server System with DoS Attacks
    Imaizumi, Mitsuhiro
    Kimura, Mitsutaka
    Yasui, Kazumi
    QUALITY TECHNOLOGY AND QUANTITATIVE MANAGEMENT, 2009, 6 (01): : 33 - 42
  • [40] Downscaling network scenarios with Denial of service (DoS) attacks
    Yao, Wei-Min
    Fahmy, Sonia
    2008 IEEE SARNOFF SYMPOSIUM, 2008, : 305 - 310