首页> 外文会议>IEEE International Parallel and Distributed Processing Symposium >Honeypot Back-propagation for Mitigating Spoofing Distributed Denial-of-Service Attacks
【24h】

Honeypot Back-propagation for Mitigating Spoofing Distributed Denial-of-Service Attacks

机译:蜜罐反向传播,用于减轻欺骗分布式拒绝服务攻击

获取原文
获取外文期刊封面目录资料

摘要

The Denial-of-Service (DoS) attack remains a challenging problem in the current Internet. In a DoS defense mechanism, a honeypot acts as a decoy within a pool of servers, whereby any packet received by the honeypot is most likely an attack packet. We have previously proposed the roaming honeypots scheme to enhance this mechanism by camouflaging the honey-pots within the server pool, thereby making their locations highly unpredictable. In roaming honeypots, each server acts as a honeypot for some periods of time, or honeypot epochs, the duration of which is determined by a pseudo-random schedule shared among servers and legitimate clients. In this paper, we propose a honeypot back-propagation scheme to trace back attack sources when attacks occur. Based on this scheme, the reception of a packet by a roaming honeypot triggers the activation of a DAG of honeypot sessions rooted at the honeypot under attack towards attack sources. The formation of this tree is achieved in a hierarchical fashion: first at the Autonomous system (AS) level and then at the router level within an AS if needed. The proposed scheme supports incremental deployment and provides deployment incentives for ISPs. Through ns-2 simulations, we show how the proposed scheme enhances the performance of a vanilla Pushback defense by obtaining accurate attack signatures and acting promptly once an attack is detected.
机译:拒绝服务(DOS)攻击仍然是当前互联网上有挑战性的问题。在DOS防御机制中,蜜罐作为服务器池中的诱饵,由此蜜罐接收的任何数据包最可能是攻击数据包。我们之前提出了漫游蜜罐方案来通过伪装服务器池内的蜂蜜盆来增强这种机制,从而使其位置非常不可预测。在漫游蜜罐中,每个服务器都是一段时间的蜜罐,或蜜剧时期,其持续时间由服务器之间共享的伪随机时间表确定。在本文中,我们提出了一种蜜罐回到传播方案来追溯攻击时追溯攻击来源。基于该方案,漫游蜜罐通过漫游蜜罐接收分组触发了根本在攻击攻击源的蜜罐头的蜜罐会话的DAG的激活。这种树的形成是以分层方式实现的:首先在自主系统(AS)级别,然后在仿佛内部的路由器级别。该方案支持增量部署,并为ISP提供部署激励措施。通过NS-2模拟,我们展示了所提出的方案如何通过获取准确的攻击签名并在检测到攻击后立即起作用,从而提高vanilla推送防御的性能。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号