The packet marking and the filtering protocol to counter against the DDoS attacks

被引:0
|
作者
Park, J [1 ]
Choi, JH [1 ]
Seo, DW [1 ]
机构
[1] Kyungpook Natl Univ, Sch Elect Engn & Comp Sci, Taegu, South Korea
关键词
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
In this paper, we propose Node Status Feedback Protocol (NSFP) as a countermeasure for the distributed denial of service (DDoS) attacks. The aggregation-based traffic control can result in the loss of the legitimate packets under the distributed denial of service attacks. Therefore we propose the filtering method based on the deterministic packet marking to distribute the filtering points of the flow-based traffic control.
引用
收藏
页码:624 / 627
页数:4
相关论文
共 50 条
  • [31] Protecting against distributed denial of service (DDoS) attacks using distributed filtering
    Trostle, Jonathan
    2006 SECURECOMM AND WORKSHOPS, 2006, : 201 - 211
  • [32] Statistical-based filtering system against DDOS Attacks in Cloud Computing
    Shamsolmoali, Pourya
    Zareapoor, Masoumeh
    2014 INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTING, COMMUNICATIONS AND INFORMATICS (ICACCI), 2014, : 1234 - 1239
  • [33] Filtering spoofed traffic at source end for defending against DoS/DDoS attacks
    Malliga, S.
    Tamilarasi, A.
    Janani, M.
    ICCN: 2008 INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATION AND NETWORKING, 2008, : 216 - 220
  • [34] On Improving an Algebraic Marking Scheme for Detecting DDoS Attacks
    Lee, Moon-Chuen
    He, Yi-Jun
    Chen, Zhaole
    JOURNAL OF INFORMATION ASSURANCE AND SECURITY, 2008, 3 (04): : 279 - 288
  • [35] Adaptive Early Packet Filtering for Defending Firewalls against DoS Attacks
    El-Atawy, Adel
    Al-Shaer, Ehab
    Tran, Tung
    Boutaba, Raouf
    IEEE INFOCOM 2009 - IEEE CONFERENCE ON COMPUTER COMMUNICATIONS, VOLS 1-5, 2009, : 2437 - +
  • [36] A Router Based Packet Filtering Scheme for Defending Against DoS Attacks
    Lu Ning
    Su Sen
    Jing Maohua
    Han Jian
    CHINA COMMUNICATIONS, 2014, 11 (10) : 136 - 146
  • [37] Filtering of shrew DDoS attacks in frequency domain
    Chen, Y
    Hwang, K
    Kwok, YK
    LCN 2005: 30th Conference on Local Computer Networks, Proceedings, 2005, : 786 - 793
  • [38] Design of Secure Network Protocol to Defend against Fragmented Packet Attacks
    Lee, Daesung
    Kim, Kuinam J.
    Kim, Ki Chang
    INFORMATION-AN INTERNATIONAL INTERDISCIPLINARY JOURNAL, 2011, 14 (11): : 3759 - 3771
  • [39] On the (in)effectiveness of probabilistic marking for IP traceback under DDoS attacks
    Paruchuri, Vamsi
    Durresi, Arjan
    Jain, Raj
    GLOBECOM 2007: 2007 IEEE GLOBAL TELECOMMUNICATIONS CONFERENCE, VOLS 1-11, 2007, : 1965 - +
  • [40] Investigating Unique Flow Marking for Tracing Back DDoS Attacks
    Aghaei-Foroushani, Vahid
    Zincir-Heywood, A. Nur
    PROCEEDINGS OF THE 2015 IFIP/IEEE INTERNATIONAL SYMPOSIUM ON INTEGRATED NETWORK MANAGEMENT (IM), 2015, : 762 - 765