] Research on DDoS Filtering Algorithm based on Bloom Filter WhiteList

被引:1
|
作者
Peng, Dan [1 ,2 ]
Chang, Guiran [1 ]
Guo, Rui [3 ]
Tang, Yanjun [2 ]
机构
[1] Northeastern Univ, Coll Informat Sci & Engn, Shenyang, Peoples R China
[2] China Criminal Police Univ, Shenyang, Peoples R China
[3] Tsinghua Univ, Dept Comp Sci & Tech, Beijing, Peoples R China
关键词
DDoS attack; Genetic algorithm; Netflow; Worm;
D O I
10.1109/MMIT.2008.105
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
With the DDoS(distributed denial of service) traffic which was implemented using depleted bandwidth is filtered by routers in high speed network, it is impossible for the victim to work on the individual level of on-going traffic flows. The scheme establishes the source and destination IP address database by observing the normal traffic and storages it in a Bloom Filter table. The Netflow statistics is mainly used to allocate the weights for traffic routing by routers. A new algorithm is thus proposed to get efficiently maximum throughput by the traffic filtering, and its feasibility and validity have been verified in real network circumstances. The algorithm shows its advantages that it just occupies a small part of resources. Moreover, it can optimize the network traffic simultaneously with defending against DDoS attack, thus eliminating efficiently the global burst of traffic arising from normal traffic so as to improve greatly the efficiency of servers.
引用
收藏
页码:291 / +
页数:3
相关论文
共 50 条
  • [1] Whitelist-based SIP Flooding Attack Detection Using a Bloom Filter
    Ryu, Ki Yeol
    Kim, Ju Wan
    Roh, Byeong-hee
    ICT&A 2011/DEMSET 2011: INTERNATIONAL CONFERENCE ON INFORMATION AND COMMUNICATION TECHNOLOGIES AND APPLICATIONS / INTERNATIONAL CONFERENCE ON DESIGN AND MODELING IN SCIENCE, EDUCATION, AND TECHNOLOGY, 2011, : 191 - 195
  • [2] A whitelist-based countermeasure scheme using a Bloom filter against SIP flooding attacks
    Roh, Byeong-hee
    Kim, Ju Wan
    Ryu, Ki-Yeol
    Ryu, Jea-Tek
    COMPUTERS & SECURITY, 2013, 37 : 46 - 61
  • [3] A modified algorithm based on the Bloom Filter
    Jiang, Mai
    Zhao, Chunsheng
    Gao, Xiang
    2013 6TH INTERNATIONAL CONGRESS ON IMAGE AND SIGNAL PROCESSING (CISP), VOLS 1-3, 2013, : 1101 - 1105
  • [4] Preventing DDoS using Bloom Filter: A Survey
    Patgiri, Ripon
    Nayak, Sabuzima
    Borgohain, Samir Kumar
    EAI ENDORSED TRANSACTIONS ON SCALABLE INFORMATION SYSTEMS, 2018, 5 (19) : 1 - 9
  • [5] An Efficient DDoS Detection with Bloom Filter in SDN
    Xiao, Peng
    Li, Zhiyang
    Qi, Heng
    Qu, Wenyu
    Yu, Haisheng
    2016 IEEE TRUSTCOM/BIGDATASE/ISPA, 2016, : 1 - 6
  • [6] IP source address spoofing filtering based on Bloom filter
    Yan, Qiao
    Shenzhen Daxue Xuebao (Ligong Ban)/Journal of Shenzhen University Science and Engineering, 2009, 26 (02): : 132 - 136
  • [7] User Based Collaborative Filtering Using Bloom Filter with MapReduce
    Shinde, Anita
    Savant, Ila
    PROCEEDINGS OF INTERNATIONAL CONFERENCE ON ICT FOR SUSTAINABLE DEVELOPMENT, ICT4SD 2015, VOL 1, 2016, 408 : 115 - 123
  • [8] Research on Human Motion Data Filtering Based on Unscented Kalman Filter Algorithm
    Yang, Hiongtao
    Li, Xiaoyuan
    Li, Xiulan
    PROCEEDINGS OF THE 33RD CHINESE CONTROL AND DECISION CONFERENCE (CCDC 2021), 2021, : 3269 - 3274
  • [9] Adaptive space-code bloom filter based traceback scheme for DDoS attack
    School of Computer and Communications, Hunan University, Changsha, China
    不详
    J. Comput. Inf. Syst., 6 (1817-1825):
  • [10] Improved Negative Selection Algorithm Based on Bloom Filter
    Zhu Tieying
    Liu Shaojun
    Ma Zhixing
    Zhou Zhiguo
    2009 INTERNATIONAL CONFERENCE ON E-BUSINESS AND INFORMATION SYSTEM SECURITY, VOLS 1 AND 2, 2009, : 1175 - 1178