2010 IEEE 30th International Conference on Distributed Computing Systems 2010
DOI: 10.1109/icdcs.2010.78
|View full text |Cite
|
Sign up to set email alerts
|

FLoc : Dependable Link Access for Legitimate Traffic in Flooding Attacks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
6
0

Year Published

2011
2011
2024
2024

Publication Types

Select...
8
1

Relationship

2
7

Authors

Journals

citations
Cited by 17 publications
(6 citation statements)
references
References 13 publications
0
6
0
Order By: Relevance
“…Capability-based mechanisms [7,19,24,30,32,44,46] aim at isolating legitimate flows from malicious DDoS attack traffic. Network capabilities are access tokens issued by onpath entities (e.g., routers and destination) to the source.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Capability-based mechanisms [7,19,24,30,32,44,46] aim at isolating legitimate flows from malicious DDoS attack traffic. Network capabilities are access tokens issued by onpath entities (e.g., routers and destination) to the source.…”
Section: Related Workmentioning
confidence: 99%
“…Network capabilities [7,24,30,44,46] are not effective against attacks such as Coremelt [38] that build on legitimate low-bandwidth flows to swamp core network links. FLoc [24] in particular considers bot-contaminated domains, but it is ineffective in case of dispersed botnets.…”
Section: Introductionmentioning
confidence: 99%
“…CoDef leverages a collaboration mechanism between Autonomous Systems (ASes) and therefore, requires a widespread deployment to be effective. FLoc [15] and PSP [16] are two bandwidth allocation mechanisms introduced to alleviate the effect of link flooding attacks. Whereas FLoc requires router support and provides fair allocation for flows within an AS, PSP leverages current Internet routers and only provides bandwidth isolation between ASes.…”
Section: Related Workmentioning
confidence: 99%
“…If we assume all TCP flows compete for a common bottleneck bandwidth (i.e., that of an attack-target link), the packet drop ratio of a path, which is denoted by γ Si , can be expresses as γ Si = 8 3Wi(Wi+2) . And, the packet drop rate (denoted by δ Si ) is δ Si = 2·nS i Wi·Rtti [27]. Since…”
Section: ) Attack Path Identificationmentioning
confidence: 99%