DocumentCode :
2527523
Title :
Distributed Divide-and-Conquer Techniques for Effective DDoS Attack Defenses
Author :
Muthuprasanna, M. ; Manimaran, G.
Author_Institution :
Google, Inc., Mountain View, CA
fYear :
2008
fDate :
17-20 June 2008
Firstpage :
93
Lastpage :
102
Abstract :
Distributed Denial-of-Service (DDoS) attacks have emerged as a popular means of causing mass targeted service disruptions, often for extended periods of time. The relative ease and low costs of launching such attacks, supplemented by the current woeful state of any viable defense mechanism, have made them one of the top threats to the Internet community today. While distributed packet logging and/or packet marking have been explored in the past for DDoS attack traceback/mitigation, we propose to advance the state of the art by using a novel distributed divide-and-conquer approach in designing a new data dissemination architecture that efficiently tracks attack sources. The main focus of our work is to tackle the three disjoint aspects of the problem, namely attack tree construction, attack path frequency detection, and packet to path association, independently and to use succinct recurrence relations to express their individual implementations. We also evaluate the network traffic and storage overhead induced by our proposed deployment on real-life Internet topologies, supporting hundreds of victims each subject to thousands of high-bandwidth flows simultaneously, and conclude that we can truly achieve single packet traceback guarantees with minimal overhead and high efficiency.
Keywords :
Internet; divide and conquer methods; telecommunication network topology; telecommunication security; telecommunication traffic; trees (mathematics); DDoS attack mitigation; DDoS attack traceback; Internet threat; attack path frequency detection; attack tree construction; data dissemination architecture; distributed denial-of-service attack; distributed divide-and-conquer technique; distributed packet logging; distributed packet marking; network traffic; packet-to-path association; real-life Internet topology; Computer crime; Costs; Frequency; IP networks; Information filtering; Information filters; Internet; Routing; Telecommunication traffic; Tree graphs;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Distributed Computing Systems, 2008. ICDCS '08. The 28th International Conference on
Conference_Location :
Beijing
ISSN :
1063-6927
Print_ISBN :
978-0-7695-3172-4
Electronic_ISBN :
1063-6927
Type :
conf
DOI :
10.1109/ICDCS.2008.10
Filename :
4595873
Link To Document :
بازگشت