IP traceback-based intelligent packet filtering: a novel technique for defending against Internet DDoS attacks

作者: Minho Sung , Jun Xu

DOI: 10.1109/TPDS.2003.1233709

关键词: Application layer DDoS attackThroughputEdge deviceNetwork topologyDenial-of-service attackThe InternetNetwork packetComputer securityIP tracebackComputer networkComputer scienceTrinoo

摘要: … : dropping DDoS traffic with high probability while allowing most of the legitimate traffic to go … be able to statistically distinguish legitimate traffic from DDoS traffic. The proposed scheme …

参考文章(22)
Ari Juels, John G. Brainard, Client Puzzles: A Cryptographic Countermeasure Against Connection Depletion Attacks. network and distributed system security symposium. ,(1999)
John Douglas Howard, An analysis of security incidents on the Internet 1989-1995 Carnegie Mellon University. ,(1998)
P. Karn, W. Simpson, Photuris: Session-Key Management Protocol rfc2522. ,vol. 2522, pp. 1- 80 ,(1999)
D. Senie, P. Ferguson, Network Ingress Filtering: Defeating Denial of Service Attacks which employ IP Source Address Spoofing RFC 2827-BCP 38. ,vol. 2267, pp. 1- 10 ,(1998)
David KY Yau, John CS Lui, Feng Liang, Yeung Yam, Defending against distributed denial-of-service attacks with max-min fair server-centric router throttles international workshop on quality of service. pp. 35- 44 ,(2002) , 10.1109/IWQOS.2002.1006572
Frank Kargl, Joern Maier, Michael Weber, Protecting web servers from distributed denial of service attacks Proceedings of the tenth international conference on World Wide Web - WWW '01. pp. 514- 524 ,(2001) , 10.1145/371920.372148
Stefan Savage, David Wetherall, Anna Karlin, Tom Anderson, Practical network support for IP traceback acm special interest group on data communication. ,vol. 30, pp. 295- 306 ,(2000) , 10.1145/347057.347560
Drew Dean, Matt Franklin, Adam Stubblefield, An algebraic approach to IP traceback ACM Transactions on Information and System Security. ,vol. 5, pp. 119- 137 ,(2002) , 10.1145/505586.505588
Thomas W. Doeppner, Philip N. Klein, Andrew Koyfman, Using router stamping to identify the source of IP packets computer and communications security. pp. 184- 189 ,(2000) , 10.1145/352600.352627
Jun Xu, Wooyong Lee, Sustaining availability of Web services under distributed denial of service attacks IEEE Transactions on Computers. ,vol. 52, pp. 195- 208 ,(2003) , 10.1109/TC.2003.1176986