首页> 外文会议>2010 IEEE 30th International Conference on Distributed Computing Systems >FLoc : Dependable Link Access for Legitimate Traffic in Flooding Attacks
【24h】

FLoc : Dependable Link Access for Legitimate Traffic in Flooding Attacks

机译:FLoc:针对洪水攻击中的合法流量的可靠链接访问

获取原文

摘要

Malware-contaminated hosts organized as a ȁC;bot networkȁD; can target and flood network links (e.g., routers). Yet, none of the countermeasures to link flooding proposed to date have provided dependable link access (i.e., bandwidth guarantees) for legitimate traffic during such attacks. In this paper, we present a router subsystem called FLoc (Flow Localization) that confines attack effects and provides differential bandwidth guarantees at a congested link: (1) packet flows of uncontaminated domains (i.e., Autonomous Systems) receive better bandwidth guarantees than packet flows of contaminated ones, and (2) legitimate flows of contaminated domains are guaranteed substantially higher bandwidth than attack flows. FLoc employs new preferential packet-drop and traffic-aggregation policies that limit ȁC;collateral damageȁD; and protect legitimate flows from a wide variety of flooding attacks. We present FLocȁ9;s analytical model for dependable link access, a router design based on it, and illustrate FLocȁ9;s effectiveness using simulations of different flooding strategies and comparisons with other flooding defense schemes.
机译:受恶意软件感染的主机组织为“ C;机器人网络” D;可以定位和泛洪网络链接(例如路由器)。但是,迄今为止,还没有提出针对链路泛洪的对策来为这种攻击期间的合法流量提供可靠的链路访问(即,带宽保证)。在本文中,我们提出了一个称为FLoc(流定位)的路由器子系统,该子系统限制了攻击效果,并在拥塞的链路上提供了不同的带宽保证:(1)未受污染的域(即,自治系统)的数据包流比数据包流具有更好的带宽保证(2)确保合法的受污染域流比攻击流具有更高的带宽。 FLoc采用了新的优先数据包丢弃和流量聚合策略,这些策略限制了ȁC;附带损害ȁD;并保护合法流量免受各种洪水攻击。我们介绍了FLocȁ9的可靠链路访问分析模型,基于该模型的路由器设计,并通过模拟不同的洪泛策略并将其与其他洪泛防御方案进行比较来说明FLocȁ9的有效性。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号