DocumentCode :
160639
Title :
TDFA: Traceback-Based Defense against DDoS Flooding Attacks
Author :
Foroushani, Vahid Aghaei ; Zincir-Heywood, A. Nur
Author_Institution :
Fac. of Comput. Sci., Dalhousie Univ., Halifax, NS, Canada
fYear :
2014
fDate :
13-16 May 2014
Firstpage :
597
Lastpage :
604
Abstract :
Distributed Denial of Service (DDoS) attacks are one of the challenging network security problems to address. The existing defense mechanisms against DDoS attacks usually filter the attack traffic at the victim side. The problem is exacerbated when there are spoofed IP addresses in the attack packets. In this case, even if the attacking traffic can be filtered by the victim, the attacker may reach the goal of blocking the access to the victim by consuming the computing resources or by consuming a big portion of the bandwidth to the victim. This paper proposes a Trace back-based Defense against DDoS Flooding Attacks (TDFA) approach to counter this problem. TDFA consists of three main components: Detection, Trace back, and Traffic Control. In this approach, the goal is to place the packet filtering as close to the attack source as possible. In doing so, the traffic control component at the victim side aims to set up a limit on the packet forwarding rate to the victim. This mechanism effectively reduces the rate of forwarding the attack packets and therefore improves the throughput of the legitimate traffic. Our results based on real world data sets show that TDFA is effective to reduce the attack traffic and to defend the quality of service for the legitimate traffic.
Keywords :
IP networks; computer network security; quality of service; telecommunication traffic; DDoS flooding attacks; TDFA; attack packets; attacking traffic; detection component; distributed denial of service attack; network security problems; packet filtering; packet forwarding rate; quality of service; spoofed IP addresses; trace back component; traceback-based defense; traffic control component; Bandwidth; Computer crime; Filtering; IP networks; Image edge detection; Internet; Protocols; DDoS Attack; Deterministic Flow Marking; IP Traceback; Packet Filtering; Traffic Control;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Advanced Information Networking and Applications (AINA), 2014 IEEE 28th International Conference on
Conference_Location :
Victoria, BC
ISSN :
1550-445X
Print_ISBN :
978-1-4799-3629-8
Type :
conf
DOI :
10.1109/AINA.2014.73
Filename :
6838719
Link To Document :
بازگشت