Honeypot back-propagation for mitigating spoofing distributed Denial-of-Service attacks

被引:9
|
作者
Khattab, Sherif
Melhem, Rami [1 ]
Mosse, Daniel
Znati, Taieb
机构
[1] Univ Pittsburgh, Dept Comp Sci, Pittsburgh, PA 15260 USA
[2] Univ Pittsburgh, Dept Informat Sci & Telecommun, Pittsburgh, PA 15260 USA
基金
美国国家科学基金会;
关键词
network security; denial-of-service attacks; honeypots; traceback;
D O I
10.1016/j.jpdc.2006.04.016
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
The Denial-of-Service (DoS) attack is a challenging problem in the current Internet. Many schemes have been proposed to trace spoofed (forged) attack packets back to their sources. Among them, hop-by-hop schemes are less vulnerable to router compromise than packet marking schemes, but they require accurate attack signatures, high storage or bandwidth overhead, and cooperation of many ISPs. In this paper, we propose honeypot back-propagation, an efficient hop-by-hop traceback mechanism, in which accurate attack signatures are obtained by a novel leverage of the roaming honeypots scheme. The reception of attack packets by a roaming honeypot (a decoy machine camouflaged within a server pool) triggers the activation of a tree of honeypot sessions rooted at the honeypot under attack toward attack sources. The tree is formed hierarchically, first at Autonomous system (AS) level and then at router level. Honeypot back-propagation supports incremental deployment by providing incentives for ISPs even with partial deployment. Against low-rate attackers, most traceback schemes would take a long time to collect the needed number of packets. To address this problem, we also propose progressive back-propagation to handle low-rate attacks, such as on-off attacks with short bursts. Analytical and simulation results demonstrate the effectiveness of the proposed schemes under a variety of DDoS attack scenarios. (C) 2006 Elsevier Inc. All rights reserved.
引用
收藏
页码:1152 / 1164
页数:13
相关论文
共 50 条
  • [1] Design and Development of Proactive Models for Mitigating Denial-of-Service and Distributed Denial-of-Service Attacks
    Nagesh, H. R.
    Sekaran, K. Chandra
    [J]. INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2007, 7 (07): : 168 - 176
  • [2] Honeypot Scheme for Distributed Denial-of-Service Attack
    Das, Vinu V.
    [J]. INTERNATIONAL CONFERENCE ON ADVANCED COMPUTER CONTROL : ICACC 2009 - PROCEEDINGS, 2009, : 497 - 501
  • [3] Proactive server roaming for mitigating denial-of-service attacks
    Khattab, SM
    Sangpachatanaruk, C
    Melhem, R
    Mossé, D
    Znati, T
    [J]. ITRE2003: INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY: RESEARCH AND EDUCATION, 2003, : 286 - 290
  • [4] Proactive model for mitigating internet denial-of-service attacks
    Nagesh, H. R. K.
    Sekaran, Chandra
    Kordcal, Adarsh Rao
    [J]. INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY, PROCEEDINGS, 2007, : 96 - +
  • [5] Distributed defense against distributed denial-of-service attacks
    Shi, W
    Xiang, Y
    Zhou, WL
    [J]. DISTRIBUTED AND PARALLEL COMPUTING, 2005, 3719 : 357 - 362
  • [6] Sophistication in distributed denial-of-service attacks on the Internet
    Kumar, VA
    [J]. CURRENT SCIENCE, 2004, 87 (07): : 885 - 888
  • [7] On the Move: Evading Distributed Denial-of-Service Attacks
    Stavrou, Angelos
    Fleck, Daniel
    Kolias, Constantinos
    [J]. COMPUTER, 2016, 49 (03) : 104 - 107
  • [8] Roaming honeypots for mitigating service-level denial-of-service attacks
    Khattab, SM
    Sangpachatanaruk, C
    Mossé, D
    Melhem, R
    Znati, T
    [J]. 24TH INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING SYSTEMS, PROCEEDINGS, 2004, : 328 - 337
  • [9] Design and development of proactive solutions for mitigating denial-of-service attacks
    Nagesh, H. R.
    Sekaran, K. Chandra
    [J]. 2006 INTERNATIONAL CONFERENCE ON ADVANCED COMPUTING AND COMMUNICATIONS, VOLS 1 AND 2, 2007, : 152 - +
  • [10] Denial-of-service attacks
    Neumann, PG
    [J]. COMMUNICATIONS OF THE ACM, 2000, 43 (04) : 136 - 136