Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/1456223.1456240acmotherconferencesArticle/Chapter ViewAbstractPublication PagescststConference Proceedingsconference-collections
research-article

A novel approach in securing DDoS attack

Published: 28 October 2008 Publication History

Abstract

The DDoS attack is one of the existing security problems of online service. The current defense mechanism is very weak, because of the inherent TCP/IP protocol problems. This paper focuses on the overload protection mechanism for Router. We use the physical topology to do the simulation and propose the Bypass Guardian System (BGS) that can prevent the Distributed Denial of Service (DDoS) attack. This system can detect attack traffic and then redirect the traffic to the system itself. At the same time, the BGS can also monitor the traffic, filtering redirection, and proxy server.

References

[1]
CERT, 1997, 1999, "Denial of Service Attacks", Computer Emergency Response Team http://www.cert.org/tech_tips/denial_of_service.html, (Access Date: 4th September 2008).
[2]
Xiang Y., Zhou W., Chowdhury M., "A Survey of Active and Passive Defence Mechanisms against DDoS Attacks", School of Information Technology, Deakin University, http://www.fbi.cqu.edu.au/FCWViewer/getFile.do?id=17921, (Access Date: 6th September 2008).
[3]
Mirkovic J., Prier G., Reiher P., "Attacking DDoS at the Source", In Proceedings of 10th IEEE International Conference on Network Protocols (ICNP 2002), Los Angeles, CA 90095, USA, 12--15 November 2002.
[4]
Mirkovic J., Reiher P., "D-WARD: a source-end defense against flooding denial-of-service attacks", In IEEE Transactions on Dependable and Secure Computing, July-September 2005
[5]
Sheng-Hsuan W., Dr. Shiuh-pyng S., "A Defense Scheme against Spoofed DDoS Attacks at the Source", Computer Science and Information Engineering, National Chiao Tung University, Taiwan, June 2004.
[6]
Wang J., Lu L., Chien A. A., "Tolerating Denial-of-Service Attacks Using Overlay Networks---Impact of Topology", In Proceeding of the 2003 ACM workshop on Survivable and self-regenerative systems (SSRS 2003): in association with 10th ACM Conference on Computer and Communications Security, University of California, San Diego, USA, 2003.
[7]
Cook D. L., Morein W. G., Keromytis A. D., Misra V., Rubenstein D., "WebSOS: Protecting Web Servers From DDoS Attacks", In Proceedings of 11th IEEE International Conference on Networks (ICON 2003), Columbia University, USA, 28th September -1st October 2003.
[8]
Keromytis A. D., Misra V., Rubenstein D., "SOS: An Architecture for Mitigating DDoS Attacks", In IEEE Journal on Selected Areas in Communications, New York, USA, January 2004.
[9]
Stavrou A., Keromytis A. D., Nieh J., Misra V., Rubenstein D., "MOVE: An End-to-End Solution To Network Denial of Service", The 12th Annual Network and Distributed System Security (NDSS'05) Symposium, San Diego, California, USA, 3--4 February 2005.
[10]
Osman S., Subhraveti D., Su G., Nieh J., "The Design and Implementation of Zap: A System for Migrating Computing Environment", Appears in Proceedings of the 5th Symposium on Operating System Design and Implementation (OSDI 2002), Boston, USA, December 2002.

Cited By

View all
  • (2021)Multiple Linear Regression Prediction Model for DDOS Attack Detection in Cloud ELBThe 7th International Conference on Engineering & MIS 202110.1145/3492547.3492567(1-9)Online publication date: 11-Oct-2021
  1. A novel approach in securing DDoS attack

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image ACM Other conferences
    CSTST '08: Proceedings of the 5th international conference on Soft computing as transdisciplinary science and technology
    October 2008
    733 pages
    ISBN:9781605580463
    DOI:10.1145/1456223
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Sponsors

    • The French Chapter of ACM Special Interest Group on Applied Computing
    • Ministère des Affaires Etrangères et Européennes
    • Région Ile de France
    • Communauté d'Agglomération de Cergy-Pontoise
    • Institute of Electrical and Electronics Engineers Systems, Man and Cybernetics Society
    • The European Society For Fuzzy And technology
    • Institute of Electrical and Electronics Engineers France Section
    • Laboratoire des Equipes Traitement des Images et du Signal
    • AFIHM: Ass. Francophone d'Interaction Homme-Machine
    • The International Fuzzy System Association
    • Laboratoire Innovation Développement
    • University of Cergy-Pontoise
    • The World Federation of Soft Computing
    • Agence de Développement Economique de Cergy-Pontoise
    • The European Neural Network Society
    • Comité d'Expansion Economique du Val d'Oise

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 28 October 2008

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. bypass guardian system (BGS)
    2. congestion
    3. distributed denial of service (DDoS) attack
    4. overload protection
    5. router

    Qualifiers

    • Research-article

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)7
    • Downloads (Last 6 weeks)1
    Reflects downloads up to 01 Sep 2024

    Other Metrics

    Citations

    Cited By

    View all
    • (2021)Multiple Linear Regression Prediction Model for DDOS Attack Detection in Cloud ELBThe 7th International Conference on Engineering & MIS 202110.1145/3492547.3492567(1-9)Online publication date: 11-Oct-2021

    View Options

    Get Access

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media