DocumentCode :
1591232
Title :
An Empirical Study of Denial of Service Mitigation Techniques
Author :
Badishi, Gal ; Herzberg, Amir ; Keidar, Idit ; Romanov, Oleg ; Yachin, Avital
fYear :
2008
Firstpage :
115
Lastpage :
124
Abstract :
We present an empirical study of the resistance of several protocols to denial of service (DoS) attacks on client-server communication. We show that protocols that use authentication alone, e.g., IPSec, provide protection to some extent, but are still susceptible to DoS attacks, even when the network is not congested. In contrast, a protocol that uses a changing filtering identifier (FI) is usually immune to DoS attacks, as long as the network itself is not congested. This approach is called FI hopping. We build and experiment with two prototype implementations of FI hopping. One implementation is a modification of IPSec in a Linux kernel, and a second implementation comes as an NDIS hook driver on a Windows machine. We present results of experiments in which client-server communication is subject to a DoS-attack. Our measurements illustrate that FI hopping withstands severe DoS attacks without hampering the client-server communication. Moreover, our implementations show that FI hopping is simple, practical, and easy to deploy.
Keywords :
client-server systems; protocols; telecommunication security; DoS; FI hopping; Linux kernel; Windows machine; client-server communication; denial of service mitigation techniques; filtering identifier; Authentication; Computer crime; Filtering; Kernel; Linux; Network servers; Protection; Protocols; Prototypes; Web server; client-server communication; denial of service mitigation;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Reliable Distributed Systems, 2008. SRDS '08. IEEE Symposium on
Conference_Location :
Naples
ISSN :
1060-9857
Print_ISBN :
978-0-7695-3410-7
Type :
conf
DOI :
10.1109/SRDS.2008.27
Filename :
4690806
Link To Document :
بازگشت