The 2011 International Conference on Advanced Technologies for Communications (ATC 2011) 2011
DOI: 10.1109/atc.2011.6027461
|View full text |Cite
|
Sign up to set email alerts
|

Distributed defense of distributed DoS using pushback and communicate mechanism

Abstract: DDoS is one of the most dangerous methods to attack victim network because it uses a vast quantity of distributed agents to make victim paralyze. This paper gives a DDoS defense method which is based on "pushback and communicate" idea (PaC method). When the gateway of victim detects DDoS attack, it has to listen on interfaces to define the neighbors from which DDoS packets come. Those neighbors will receive DDoS information and do same things the victim's gateway does. By repeating that work, PaC can find the … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
4
0
2

Year Published

2012
2012
2018
2018

Publication Types

Select...
4
2

Relationship

0
6

Authors

Journals

citations
Cited by 6 publications
(6 citation statements)
references
References 2 publications
0
4
0
2
Order By: Relevance
“…Sachdeva et al [2011] also identified challenges when defending from the victim network, including the computational expense of filtering traffic, the possibility of the defence tools themselves being vulnerable to DDoS, and incorrectly dropping legitimate traffic. While a variety of other approaches have been suggested (e.g., Nguyen et al [2011], Khattab et al [2003], Long et al [2004], Pandey and Pandu Rangan [2011], Wu and Yao [2007]), the current state of the art does not fully mitigate DoS attacks [Jain et al 2011;Modi et al 2013]. …”
Section: Dos Attacks and Existing Mitigation Approachesmentioning
confidence: 99%
“…Sachdeva et al [2011] also identified challenges when defending from the victim network, including the computational expense of filtering traffic, the possibility of the defence tools themselves being vulnerable to DDoS, and incorrectly dropping legitimate traffic. While a variety of other approaches have been suggested (e.g., Nguyen et al [2011], Khattab et al [2003], Long et al [2004], Pandey and Pandu Rangan [2011], Wu and Yao [2007]), the current state of the art does not fully mitigate DoS attacks [Jain et al 2011;Modi et al 2013]. …”
Section: Dos Attacks and Existing Mitigation Approachesmentioning
confidence: 99%
“…This traffic deflection can further be utilized for traffic distribution. Nguyen et al proposed a distributed DDoS defense scheme PaC [10], which is based on "pushback and communicate" idea. PaC uses proprietary messages to inform routers closer to the attack source to filter attacks, thus distributing the attack amongst many routers and not just the edge router to the server.…”
Section: Related Workmentioning
confidence: 99%
“…DoS: Denial of Service). Najbardziej rozpowszechnionymi sposobami realizacji ataków DoS są ataki rozproszone Distributed Denial of Service (DDoS: [8], [4], [3], [10], liczne opisy można znaleźć w [12]).…”
Section: Domeny I Odpieranie Ataku Ddosunclassified