] Research on DDoS Filtering Algorithm based on Bloom Filter WhiteList

被引:1
|
作者
Peng, Dan [1 ,2 ]
Chang, Guiran [1 ]
Guo, Rui [3 ]
Tang, Yanjun [2 ]
机构
[1] Northeastern Univ, Coll Informat Sci & Engn, Shenyang, Peoples R China
[2] China Criminal Police Univ, Shenyang, Peoples R China
[3] Tsinghua Univ, Dept Comp Sci & Tech, Beijing, Peoples R China
关键词
DDoS attack; Genetic algorithm; Netflow; Worm;
D O I
10.1109/MMIT.2008.105
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
With the DDoS(distributed denial of service) traffic which was implemented using depleted bandwidth is filtered by routers in high speed network, it is impossible for the victim to work on the individual level of on-going traffic flows. The scheme establishes the source and destination IP address database by observing the normal traffic and storages it in a Bloom Filter table. The Netflow statistics is mainly used to allocate the weights for traffic routing by routers. A new algorithm is thus proposed to get efficiently maximum throughput by the traffic filtering, and its feasibility and validity have been verified in real network circumstances. The algorithm shows its advantages that it just occupies a small part of resources. Moreover, it can optimize the network traffic simultaneously with defending against DDoS attack, thus eliminating efficiently the global burst of traffic arising from normal traffic so as to improve greatly the efficiency of servers.
引用
收藏
页码:291 / +
页数:3
相关论文
共 50 条
  • [21] Synflood Spoofed Source DDoS Attack Defense Based on Packet ID Anomaly Detection with Bloom Filter
    Tran Manh Thang
    Nguyen, Chi Q.
    Nguyen, Van K.
    PROCEEDINGS OF THE 2018 5TH ASIAN CONFERENCE ON DEFENSE TECHNOLOGY (ACDT 2018), 2018, : 75 - 80
  • [22] The Research of DDoS Attack Detecting Algorithm Based on the Feature of the Traffic
    Feng, Jiang
    Liu, Yuan
    2009 5TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-8, 2009, : 4619 - +
  • [23] Algorithm based on double counter bloom filter for large flows identification
    Wu H.
    Gong J.
    Yang W.
    Ruan Jian Xue Bao/Journal of Software, 2010, 21 (05): : 1115 - 1126
  • [24] Bloom Filter based Data Collection Algorithm for Wireless Sensor Networks
    Talpur, Anum
    Newe, Thomas
    Shaikh, Faisal K.
    Sheikh, Adil A.
    Felemban, Emad
    Khelil, Abdelmajid
    2017 31ST INTERNATIONAL CONFERENCE ON INFORMATION NETWORKING (ICOIN), 2017, : 354 - 359
  • [25] Effective algorithm for counting active flows based on loop Bloom Filter
    Sun, Yong
    Zhang, Zhibin
    Guo, Li
    Bai, Shuo
    Tan, Jianlong
    PROCEEDINGS OF THE 2008 IEEE INTERNATIONAL CONFERENCE ON NETWORKING, ARCHITECTURE, AND STORAGE, 2008, : 104 - +
  • [26] A PARALLELED PACKET CLASSIFICATION ALGORITHM BASED ON PLUS BITS AND BLOOM FILTER
    Li, Wenjie
    Liu, Yun
    Huang, Xiaohong
    Sun, Qiong
    Ma, Yan
    2009 IEEE INTERNATIONAL CONFERENCE ON NETWORK INFRASTRUCTURE AND DIGITAL CONTENT, PROCEEDINGS, 2009, : 79 - 84
  • [27] Traffic measurement algorithm based on least recent used and Bloom filter
    Zhang, Z., 2013, Editorial Board of Journal on Communications (34):
  • [28] Bloom filter-based efficient broadcast algorithm for the Internet of things
    Talpur, Anum
    Shaikh, Faisal K.
    Newe, Thomas
    Sheikh, Adil A.
    Felemban, Emad
    Khelil, Abdelmajid
    INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2017, 13 (12)
  • [29] UOFilter: a Whitelist-based Filter for Unintended Objects in Web Pages
    Tang, Yi
    Luo, Zhaokai
    Zhang, Ji
    COMPUTER AND INFORMATION TECHNOLOGY, 2014, 519-520 : 373 - +
  • [30] Research on RAIM Algorithm Based on Temporal Filtering
    Peng, Liu
    2014 IEEE INTERNATIONAL CONFERENCE ON CONTROL SCIENCE AND SYSTEMS ENGINEERING, 2014, : 32 - 35