DocumentCode
1098303
Title
TVA: A DoS-Limiting Network Architecture
Author
Yang, Xiaowei ; Wetherall, David ; Ande, Thomas
Author_Institution
Univ. of California, Irvine, CA
Volume
16
Issue
6
fYear
2008
Firstpage
1267
Lastpage
1280
Abstract
We motivate the capability approach to network denial-of-service (DoS) attacks, and evaluate the traffic validation architecture (TVA) architecture which builds on capabilities. With our approach, rather than send packets to any destination at any time, senders must first obtain ldquopermission to sendrdquo from the receiver, which provides the permission in the form of capabilities to those senders whose traffic it agrees to accept. The senders then include these capabilities in packets. This enables verification points distributed around the network to check that traffic has been authorized by the receiver and the path in between, and hence to cleanly discard unauthorized traffic. To evaluate this approach, and to understand the detailed operation of capabilities, we developed a network architecture called TVA. TVA addresses a wide range of possible attacks against communication between pairs of hosts, including spoofed packet floods, network and host bottlenecks, and router state exhaustion. We use simulations to show the effectiveness of TVA at limiting DoS floods, and an implementation on Click router to evaluate the computational costs of TVA. We also discuss how to incrementally deploy TVA into practice.
Keywords
Internet; authorisation; telecommunication network routing; telecommunication security; telecommunication traffic; Click router; DoS-limiting network architecture; Internet; TVA architecture; authorization; capability approach; host bottlenecks; network bottlenecks; network denial-of-service attack; router state exhaustion; spoofed packet floods; traffic validation architecture;
fLanguage
English
Journal_Title
Networking, IEEE/ACM Transactions on
Publisher
ieee
ISSN
1063-6692
Type
jour
DOI
10.1109/TNET.2007.914506
Filename
4470205
Link To Document