Proceedings of the Ninth ACM Conference on Emerging Networking Experiments and Technologies 2013
DOI: 10.1145/2535372.2535398
|View full text |Cite
|
Sign up to set email alerts
|

CoDef

Abstract: Large-scale botnet attacks against Internet links using low-rate flows cannot be effectively countered by any of the traditional rate-limiting and flow-filtering mechanisms deployed in individual routers. In this paper, we present a collaborative defense mechanism, called CoDef, which enables routers to distinguish low-rate attack flows from legitimate flows, and protect legitimate traffic during botnet attacks. CoDef enables autonomous domains that are uncontaminated by bots to collaborate during link floodin… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2018
2018
2021
2021

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 70 publications
(2 citation statements)
references
References 27 publications
0
2
0
Order By: Relevance
“…In [42], the authors proposed a traffic-engineering model to track traffic source rate change but requires major changes in the SDN switches and detects only link flooding. Lee et al [43] proposed a collaborative traffic-engineering model to differentiate between low-rate attacks and legitimate traffic. In [44], the authors presented a traffic-engineering based analytical framework for defending link-flooding attacks.…”
Section: Reinforcing Anti-ddos Actions In Realtime (Radar)mentioning
confidence: 99%
“…In [42], the authors proposed a traffic-engineering model to track traffic source rate change but requires major changes in the SDN switches and detects only link flooding. Lee et al [43] proposed a collaborative traffic-engineering model to differentiate between low-rate attacks and legitimate traffic. In [44], the authors presented a traffic-engineering based analytical framework for defending link-flooding attacks.…”
Section: Reinforcing Anti-ddos Actions In Realtime (Radar)mentioning
confidence: 99%
“…In order to detect TLFA, several schemes have been proposed [3,4,5]. However, these schemes work after link congestion occurs.…”
Section: Introductionmentioning
confidence: 99%