2019
DOI: 10.48550/arxiv.1901.00955
|View full text |Cite
Preprint
|
Sign up to set email alerts
|

Practical Verifiable In-network Filtering for DDoS defense

Abstract: In light of ever-increasing scale and sophistication of modern DDoS attacks, it is time to revisit in-network filtering or the idea of empowering DDoS victims to install in-network traffic filters in the upstream transit networks. Recent proposals show that filtering DDoS traffic at a handful of large transit networks can handle volumetric DDoS attacks effectively. However, the innetwork filtering primitive can also be misused. Transit networks can use the in-network filtering service as an excuse for any arbi… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2020
2020
2020
2020

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(1 citation statement)
references
References 49 publications
0
1
0
Order By: Relevance
“…Other research (e.g., [16,17]) focused on identifying the scan sources behind amplification DDoS attacks. In addition to many approaches (e.g., [14,26,12]) for filtering of DDoS attack tra c. With the increased interest in Information Centric Networking in recent years and the potential threat of DDoS attacks in these networks, several mechanisms have been proposed to address this important issue. The following subsections reviews main research in the area of DDoS attacks in ICN networks considering two main types: (i) Interest flooding attacks in NDN and (ii) Data flooding attacks in path identifier-based ICN.…”
Section: Previous Work On Ddos Attacks In Icnmentioning
confidence: 99%
“…Other research (e.g., [16,17]) focused on identifying the scan sources behind amplification DDoS attacks. In addition to many approaches (e.g., [14,26,12]) for filtering of DDoS attack tra c. With the increased interest in Information Centric Networking in recent years and the potential threat of DDoS attacks in these networks, several mechanisms have been proposed to address this important issue. The following subsections reviews main research in the area of DDoS attacks in ICN networks considering two main types: (i) Interest flooding attacks in NDN and (ii) Data flooding attacks in path identifier-based ICN.…”
Section: Previous Work On Ddos Attacks In Icnmentioning
confidence: 99%