skip to main content
10.5555/783106.783137dlproceedingsArticle/Chapter ViewAbstractPublication Pagesaus-cscConference Proceedingsconference-collections
Article
Free access

A practical method to counteract denial of service attacks

Published: 01 February 2003 Publication History

Abstract

Today distributed denial of service (DDoS) attacks are causing major problems to conduct online business over the Internet. Recently several schemes have been proposed on how to prevent some of these attacks, but they suffer from a range of problems, some of them being impractical and others not being effective against these attacks. In this paper, we propose a Controller-Agent model that would greatly minimize DDoS attacks on Internet. With a new packet marking technique and agent design our scheme is able to identify the approximate source of attack (nearest router) with a single packet even in case of attack with spoofed source addresses. Our scheme is invoked only during attack times, is able to process the victims traffic separately without disturbing other traffic, is able to establish different attack signatures for different attacking sources, can prevent the attack traffic at the nearest router to the attacking system, has fast response time, is simple in its implementation and can be incrementally deployed. Hence we believe that the scheme proposed in this paper seems to be a promising approach to prevent distributed denial of service attacks

References

[1]
{BC00} Hal Burch and Bill Cheswick: Tracing Anonymous Packets to Their Approximate Source. In proceedings of Usenix LISA, December 2000.
[2]
{Bel00} Steve Bellovin: The ICMP Traceback Message. http://www.research.att.com/~smb, 2000.
[3]
{Bel89} S.M.Bellovin: Security Problems in the TCP/IP Protocol Suit. ACM Computer Communications Review, 19(2): 32-48, Apr.1989.
[4]
{CER00} Computer Emergency Response Team. CERT Advisory CA-2000-01 Denial-of-Service developments. http://www.cert.org/advisories/CA- 2000-01.html, Jan.2000.
[5]
{CER99} Computer Emergency Response Team. CERT Advisory CA-1999-17 Denial-of-Service Tools. http://www.cert.org/advisories/CA-1999-17.html.
[6]
{DFS01} Drew Dean, Matt Franklin and Adam Stubblefield: An Algebraic Approach to IP Traceback. In proceedings of NDSS'01, February 2001.
[7]
{DD99} D.Dittrich: The "stacheldraht" distributed denial of service attack tool. http://staff.washington.edu/dittrich/misc/stacheldraht.a nalysis.txt, Dec.1999.
[8]
{DO99} D.Dittrich: The "Tribe Flood Network" distributed denial of service attack tool. http://staff.washington.edu/dittrich/misc/tfn.analysis, Oct.1999.
[9]
{FS98} P.Ferguson and D.Senie: Network Ingress Filtering: Defeating Denial of Service Attacks Which Employ IP Source Address Spoofing. RFC 2267, January 1998.
[10]
{How98} John Howard: An Analysis of Security Incidents on the Internet. Ph.D.thesis, Carnegie Mellon University, Aug. 1998.
[11]
{MBFIPS01} Ratul Mahajan, Steven M.Bellovin, Sally Floyd, John Ioannidis, Vern Paxson, and Scott Shenker: Controlling High Bandwidth Aggregates in the Network. Draft, February 2001.
[12]
{MVS01} David Moore, Geoffrey M. Voelker and Stefan Savage, "Inferring Internet Denial -of-Service Activity," In proceedings of the 10th USENIX Security Symposium, August 2001.
[13]
{Pos81} J.Postel : Internet Protocol. RFC 791,Sept. 1981.
[14]
{SAN00} SANS Institute Resources. Egress Filtering. February 2000. http://www.sans.org/y2k/egress.htm.
[15]
{SWKA00} Stefan Savage, David Wetherall, Anna Karlin and Tom Anderson: Practical Network Support for IP Traceback. In Proceedings of the 2000 ACM SIGCOMM Conference, pages 295-306, August 2000.
[16]
{SP00} D. Song and A.Perrig: Advanced and Authenticated Marking Schemes for IP Traceback. Technical Report UCB/CSD-00-1107, University of California, Berkeley, June 2000.
[17]
{Sto00} Robert Stone: "CenterTrack: An IP Overlay Network for Tracking DoS Floods," In proceedings of 9th Usenix Security Symposium, August 2000.

Cited By

View all

Recommendations

Comments

Information & Contributors

Information

Published In

cover image DL Hosted proceedings
ACSC '03: Proceedings of the 26th Australasian computer science conference - Volume 16
February 2003
368 pages
ISBN:0909925941

Publisher

Australian Computer Society, Inc.

Australia

Publication History

Published: 01 February 2003

Author Tags

  1. DoS
  2. broad attack signatures
  3. controller-agent model
  4. denial of service
  5. packet marking

Qualifiers

  • Article

Conference

ACSC '03
01 02 2003
Adelaide, Australia

Acceptance Rates

Overall Acceptance Rate 136 of 379 submissions, 36%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)16
  • Downloads (Last 6 weeks)9
Reflects downloads up to 25 Dec 2024

Other Metrics

Citations

Cited By

View all

View Options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Login options

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media