DocumentCode
423247
Title
Counteracting TCP SYN DDoS attacks using automated model
Author
Tupakula, Udaya Kiran ; Varadharajan, Vijay ; Gajam, Ashok Kumar
Author_Institution
Div. of Inf. & Commun. Sci., Macquarie Univ., Sydney, NSW, Australia
Volume
4
fYear
2004
fDate
29 Nov.-3 Dec. 2004
Firstpage
2240
Abstract
We propose modifications to the automated model to counteract TCP SYN distributed denial of service (DDoS) attacks nearest to the attacking source and also discuss the prototype implementation of our technique. It should be noted that we do not solve the TCP SYN problem, but we enable the victim to differentiate between the traffic originating from good and bad network domains, trace the router that is nearest to the attacking source with a single packet, even if the source address of the packet is spoofed, and prevent the attack traffic at the router which is nearest to the attacking source. Since our model is invoked only during attack times, it has much less overhead, and the main advantage of this technique is that the victim can provide better service for traffic originating from good network domains and completely eliminate or provide limited service for the traffic originating from the bad network domain.
Keywords
computer networks; security of data; telecommunication security; telecommunication traffic; transport protocols; TCP SYN DDoS attacks; attacking source; automated model; bad network domains; computer networks; distributed DoS attacks; distributed denial of service attacks; good network domains; spoof source address; Authorization; Communication system security; Computer crime; Data structures; Information security; Network servers; Prototypes; Telecommunication traffic; Traffic control; Web and internet services;
fLanguage
English
Publisher
ieee
Conference_Titel
Global Telecommunications Conference, 2004. GLOBECOM '04. IEEE
Print_ISBN
0-7803-8794-5
Type
conf
DOI
10.1109/GLOCOM.2004.1378407
Filename
1378407
Link To Document