首页> 外文期刊>電子情報通信学会技術研究報告. 通信方式. Communication Systems >On Tracing and Mitigating Distributed Denial of Service Attacks
【24h】

On Tracing and Mitigating Distributed Denial of Service Attacks

机译:跟踪和缓解分布式拒绝服务攻击

获取原文
获取原文并翻译 | 示例
           

摘要

The CSI/FBI surveys have been revealing that the (distributed) denial of service ((D)DoS) attacks are still a major concern leading to a significant revenue loss for many organizations. This talk will provide a brief overview on how to trace back and defend DoS/DDoS attacks, namely, IP traceback and DDoS defense. IP traceback attempts to identify attack sources, i.e., from where the attack traffic comes. We first analyze and evaluate several recently proposed schemes, such as Probabilistic Packet Marking (PPM), iTrace, Hash-based traceback, CenterTrack, and traffic pattern based traceback. We will then present our schemes, including Deterministic Packet Marking (DPM) and Autonomous System-based Edge Marking (ASEM). DPM conducts marking only at the ingress interfaces of the edge routers, thus posing little burden on routers and reducing the router involvement. It is easy and simple to implement. DPM can also address reflective DDoS attacks as long as certain "trust" relationship is maintained between adjacent domains. On the other hand, ASEM aims to improve upon PPM and exhibits three salient benefits: 1) it significantly reduces the computational burden by introducing a new marking policy and using the optimal marking probability, 2) it completely eradicates the spoofed marking intentionally inscribed by the attacker, and 3) it is capable of handling subverted routers by coupling routing and marking information. The second part of this talk discusses DDoS defense schemes, including PacketScore, SYN flood detection, pushback, Puzzle-based defense, and Honey pot. Finally, we briefly outline our proposed comprehensive DDoS defense framework, and future works.
机译:CSI / FBI调查显示,(分布式)拒绝服务((D)DoS)攻击仍然是一个主要问题,对许多组织而言,这导致了巨大的收入损失。本演讲将简要概述如何追溯和防御DoS / DDoS攻击,即IP追溯和DDoS防御。 IP追溯尝试尝试识别攻击源,即攻击流量来自何处。我们首先分析和评估几种最近提出的方案,例如概率分组标记(PPM),iTrace,基于哈希的回溯,CenterTrack和基于流量模式的回溯。然后,我们将介绍我们的方案,包括确定性数据包标记(DPM)和基于自治系统的边缘标记(ASEM)。 DPM仅在边缘路由器的入口接口上进行标记,因此对路由器的负担很小,并减少了路由器的参与。它易于实现。只要相邻域之间保持一定的“信任”关系,DPM还可解决反射性DDoS攻击。另一方面,亚欧会议旨在改善PPM,并显示出三个显着的好处:1)通过引入新的标记策略并使用最佳标记概率,显着减轻了计算负担; 2)完全消除了故意刻画的欺骗性标记。攻击者; 3)能够通过耦合路由和标记信息来处理被颠覆的路由器。演讲的第二部分讨论了DDoS防御方案,包括PacketScore,SYN泛洪检测,推回,基于拼图的防御和Honeypot。最后,我们简要概述了我们提出的全面的DDoS防御框架以及未来的工作。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号