An improved solution against DoS attacks using active network technology

被引:0
|
作者
Wei, H [1 ]
Xu, WG [1 ]
An, G [1 ]
Shi, LJ [1 ]
Fang, ZY [1 ]
机构
[1] Jilin Univ, Coll Comp Sci & Technol, Changchun 130012, Peoples R China
关键词
active networks; DoS/DDoS; cluster;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Network Security is a key problem that is ignored by people or is difficult to solve, especially some network attack plotted by illegal users, such as DoS and DDoS attacks. Although DoS and DDoS attacks can be treated as a congestion-control problem, most congestions are caused by those illegal users who do not obey end-end congestion control. So this problem must be solved through cooperation of IDSs and middle nodes (router, switch and so on). Appearance of active network architecture provides a beneficial condition for solving the problem. In active network, some computation functionality can be added into each middle node, so these middle nodes can identify and drop those flow-packets belonging to DoS/DDoS attacks. Those upstream nodes can also be notified by downstream node to drop these packets in order to make ordinary flow get more upstream bandwidth. This paper presents an architecture of identifying and controlling these attack clusters and an algorithm for implementing this architecture. The architecture includes both a mechanism of identifying and controlling a cluster by using technology of active network and a notify mechanism between routers under the control of administration controller.
引用
收藏
页码:115 / 119
页数:5
相关论文
共 50 条
  • [41] Defending Network System against IP Spoofing based Distributed DoS attacks using DPHCF-RTT Packet Filtering Technique
    Maheshwari, Ritu
    Krishna, C. Rama
    Brahma, M. Sridhar
    PROCEEDINGS OF THE 2014 INTERNATIONAL CONFERENCE ON ISSUES AND CHALLENGES IN INTELLIGENT COMPUTING TECHNIQUES (ICICT), 2014, : 206 - 209
  • [42] Providing QoS as a Means for Defending DoS Attacks in Active Networks
    Jayashree, P.
    Easwarakumar, K. S.
    Gokul, B.
    Harishankar, S.
    ADCOM: 2008 16TH INTERNATIONAL CONFERENCE ON ADVANCED COMPUTING AND COMMUNICATIONS, 2008, : 406 - +
  • [43] A countermeasure against DDOS attacks using active networks technologies
    Kashiwa, D
    Chen, EY
    Fuji, H
    ANNALS OF TELECOMMUNICATIONS, 2003, 58 (3-4) : 605 - 629
  • [44] Classification of DOS Attacks Using Visualization Technique
    Cheikh, Mohamed
    Hacini, Salima
    Boufaida, Zizette
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY AND PRIVACY, 2014, 8 (02) : 19 - 32
  • [45] Defeating DoS attacks using wavelet aanalysis
    Heo, YJ
    Jang, JS
    SAM'03: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON SECURITY AND MANAGEMENT, VOLS 1 AND 2, 2003, : 248 - 252
  • [46] A Distributed Mitigation Strategy against DoS attacks in Edge Computing
    Potrino, Giuseppe
    De Rango, Floriano
    Fazio, Peppino
    2019 WIRELESS TELECOMMUNICATIONS SYMPOSIUM (WTS), 2019,
  • [47] Defending Cyber-Physical Systems against DoS Attacks
    Nur, Abdullah Yasin
    Tozal, Mehmet Engin
    2016 IEEE INTERNATIONAL CONFERENCE ON SMART COMPUTING (SMARTCOMP), 2016, : 334 - 336
  • [48] A Resilient Data-Driven Controller Against DoS Attacks
    Liu, Wenjie
    Sun, Jian
    Wang, Gang
    Chen, Jie
    2022 41ST CHINESE CONTROL CONFERENCE (CCC), 2022, : 4305 - 4310
  • [49] A detection and recovery architecture against DoS and worm attacks in NGMN
    Hashim, Fazirulhisyam
    Kibria, M. Rubaiyat
    Jamalipour, Abbas
    2008 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS, PROCEEDINGS, VOLS 1-13, 2008, : 1675 - 1679
  • [50] CPU-based DoS attacks against SIP servers
    Luo, Ming
    Peng, Tao
    Leckie, Christopher
    2008 IEEE NETWORK OPERATIONS AND MANAGEMENT SYMPOSIUM, VOLS 1 AND 2, 2008, : 41 - 48