z-logo
open-access-imgOpen Access
A Four-StepTechnique forTackling DDoS Attacks
Author(s) -
Hakem Beitollahi,
Geert Deconinck
Publication year - 2012
Publication title -
procedia computer science
Language(s) - English
Resource type - Journals
SCImago Journal Rank - 0.334
H-Index - 76
ISSN - 1877-0509
DOI - 10.1016/j.procs.2012.06.065
Subject(s) - computer science , denial of service attack , application layer ddos attack , computer security , world wide web , the internet
This paper proposes a novel feedback-based control technique that tackles distributed denial of service (DDoS) attacks in four consecutive phases. While protection routers close to the server control inbound traffc rate andkeeps the server alive (phase 1), the server negotiate with upstream routers close to traffc sources to install leaky-buckets for its IP address. The negotiation continues until a defense router on each traffc link accepts the request (phase 2). Next, the server through a feedback-control process adjusts size of leaky-buckets until inbound traffc locates in a desired range (phase 3). Then through a ngerprint test, the server detects which port interfaces of defense routers purely carry good traffc and subsequently asks corresponding defense routers to remove the leaky-bucket limitations for those port interfaces. Additionally, the server amends size of leaky-buckets for the defense routers proportional to amount of good traffc that each one carries (phase 4). Simulation-based results shows that our technique effectively, defenses a victim server against various DDoS attacks such that in most cases more than 90% of good inbound traffc reaches the server while the DDoS attack has been controlled as well

The content you want is available to Zendy users.

Already have an account? Click here to sign in.
Having issues? You can contact us here
Accelerating Research

Address

John Eccles House
Robert Robinson Avenue,
Oxford Science Park, Oxford
OX4 4GP, United Kingdom