• DocumentCode
    393359
  • Title

    NetBouncer: client-legitimacy-based high-performance DDoS filtering

  • Author

    Thomas, Roshan ; Mark, Brian ; Johnson, Tommy ; Croall, James

  • Author_Institution
    Network Associates Labs., Network Associates, Inc, Herndon, VA, USA
  • Volume
    1
  • fYear
    2003
  • fDate
    22-24 April 2003
  • Firstpage
    14
  • Abstract
    We describe "NetBouncer", an approach and set of technologies for providing practical and high-performance defenses against distributed denial-of-service (DDoS) attacks. The central innovation in the NetBouncer approach to filtering and mitigating DDoS attacks is the ability to distinguish legitimate traffic from illegitimate ones so as to enable the discarding of only illegitimate traffic. In particular, this allows a NetBouncer-enabled network to distinguish DDoS congestion from flash crowd congestion situations. This provides a unique advantage over other DDoS mitigation techniques such as those based on filtering and congestion control where some loss of legitimate traffic is inevitable. The NetBouncer approach is characterized as an end-point-based solution to DDoS protection. It provides localized protection at potential choke points or bottlenecks that may exist in front of hosts and servers. NetBouncer attempts to block traffic as close to the victim as possible, while upstream of the nearest bottleneck. The immediate manifestation of NetBouncer technology is as a high-speed packet processing in-line appliance based on network processor technology. However, the long-term evolution, adoption and integration of NetBouncer technology may be in the back-plane/fast path of commercial high-speed routers.
  • Keywords
    computer networks; security of data; telecommunication security; telecommunication traffic; NetBouncer; bottlenecks; choke points; congestion control; distributed denial of service attack filtering; distributed denial of service attack mitigation; end-point-based solution; high-speed packet processing in-line appliance; high-speed routers; hosts; legitimate traffic; localized protection; network processor technology; servers; Communication system traffic control; Computer crime; Filtering; Home appliances; Inductors; Isolation technology; Laboratories; Network servers; Protection; Testing;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    DARPA Information Survivability Conference and Exposition, 2003. Proceedings
  • Print_ISBN
    0-7695-1897-4
  • Type

    conf

  • DOI
    10.1109/DISCEX.2003.1194869
  • Filename
    1194869