Skip to main content
Top

2017 | OriginalPaper | Chapter

Super-Router: A Collaborative Filtering Technique Against DDoS Attacks

Authors : Akshat Gaurav, Awadhesh Kumar Singh

Published in: Advanced Informatics for Computing Research

Publisher: Springer Singapore

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

DDoS attack is one of the well known cyber attacks of Internet era, which affects on the availability of the network. In 1999, though Computer Incident Advisory Capability (CIAC) reports the first ever DDoS attack, but first major DDoS attack was recorded in year 2000 on some of the big websites e.g., Yahoo, Amazon, CNN, eBay etc. due to which their services went offline for few hours and huge amount of revenue losses were recorded. Since then DDoS attacks become favourite attacks of antagonists. There are so many different defense techniques available to detect and filter malicious traffic, but none of these methods could adequately filter out the malicious traffic. In this context, this paper proposed a new filtering scheme, Super-router, which uses collaborative filtering technique to filter malicious traffic. More specifically, Super-router uses unicast method of communication between filters which reduces the communication overheads and response time of individual filters. This makes Super-router an effective defense against DDoS attacks for high speed networks.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
5.
go back to reference Dittrich, D.: The tribe flood network distributed denial of service attack tool. University of Washington (2002) Dittrich, D.: The tribe flood network distributed denial of service attack tool. University of Washington (2002)
8.
go back to reference Gupta, B.B., Joshi, R.C., Misra, M.: Distributed denial of service prevention techniques. Int. J. Comput. Electr. Eng. IJCEE 2(2), 268–276 (2012). arXiv preprint arXiv:1208.3557 (2010) Gupta, B.B., Joshi, R.C., Misra, M.: Distributed denial of service prevention techniques. Int. J. Comput. Electr. Eng. IJCEE 2(2), 268–276 (2012). arXiv preprint arXiv:​1208.​3557 (2010)
9.
go back to reference Weiler, N.: Honeypots for distributed denial-of-service attacks. In: Proceedings of the 11th IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises, WET ICE, pp. 109–114 (2002). doi:10.1109/ENABL.2002.1029997 Weiler, N.: Honeypots for distributed denial-of-service attacks. In: Proceedings of the 11th IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises, WET ICE, pp. 109–114 (2002). doi:10.​1109/​ENABL.​2002.​1029997
10.
go back to reference Bhavani, Y., Reddy, P.N.: An efficient IP traceback through packet marking algorithm. Int. J. Netw. Secur. Appl. IJNSA 2, 132–142 (2010) Bhavani, Y., Reddy, P.N.: An efficient IP traceback through packet marking algorithm. Int. J. Netw. Secur. Appl. IJNSA 2, 132–142 (2010)
12.
go back to reference Jin, C., Wang, H., Shin, K.G.: Hop-count filtering: an effective defense against spoofed DDoS attracks. In: Proceedings of the 10th ACM Conference on Computer and Communications Security, pp. 30–41 (2003). doi:10.1145/948109.948116. Jin, C., Wang, H., Shin, K.G.: Hop-count filtering: an effective defense against spoofed DDoS attracks. In: Proceedings of the 10th ACM Conference on Computer and Communications Security, pp. 30–41 (2003). doi:10.​1145/​948109.​948116.​
13.
go back to reference Mahajan, R., Bellovin, S.M., Floyd, S., Ioannidis, J., Paxson, V., Shenker, S.: Controlling high bandwidth aggregates in the network. ACM SIGCOMM Comput. Commun. Rev. 32(3), 62–73 (2002). doi:10.1145/571697.571724 CrossRef Mahajan, R., Bellovin, S.M., Floyd, S., Ioannidis, J., Paxson, V., Shenker, S.: Controlling high bandwidth aggregates in the network. ACM SIGCOMM Comput. Commun. Rev. 32(3), 62–73 (2002). doi:10.​1145/​571697.​571724 CrossRef
14.
go back to reference Argyraki, K.J., Cheriton, D.R.: Active internet traffic filtering: real-time response to denial-of-service attacks. In: USENIX Annual Technical Conference, General track, pp. 135–148 (2005) Argyraki, K.J., Cheriton, D.R.: Active internet traffic filtering: real-time response to denial-of-service attacks. In: USENIX Annual Technical Conference, General track, pp. 135–148 (2005)
15.
go back to reference Seo, D., Lee, H., Perrig, A.: PFS: probabilistic filter scheduling against distributed denial-of-service attacks. In: 36th Conference on Local Computer Networks (LCN), pp. 9–17. IEEE (2011). doi:10.1109/LCN.2011.6114645 Seo, D., Lee, H., Perrig, A.: PFS: probabilistic filter scheduling against distributed denial-of-service attacks. In: 36th Conference on Local Computer Networks (LCN), pp. 9–17. IEEE (2011). doi:10.​1109/​LCN.​2011.​6114645
16.
go back to reference Ferguson, P.: Network ingress filtering: defeating denial of service attacks which employ IP source address spoofing (2000) Ferguson, P.: Network ingress filtering: defeating denial of service attacks which employ IP source address spoofing (2000)
17.
go back to reference Park, K., Lee, H.: On the effectiveness of route-based packet filtering for distributed DoS attack prevention in power-law internets. ACM SIGCOMM Comput. Commun. Rev. 31(4), 15–26 (2001). doi:10.1145/964723.383061 CrossRef Park, K., Lee, H.: On the effectiveness of route-based packet filtering for distributed DoS attack prevention in power-law internets. ACM SIGCOMM Comput. Commun. Rev. 31(4), 15–26 (2001). doi:10.​1145/​964723.​383061 CrossRef
18.
go back to reference Kim, Y., Lau, Y.C., Chuah, M.C., Chao, H.J.: PacketScore: a statistics-based packet filtering scheme against distributed denial-of-service attacks. IEEE Trans. Dependable Secure Comput. 3(2), 141–155 (2006). doi:10.1109/TDSC.2006.25 CrossRef Kim, Y., Lau, Y.C., Chuah, M.C., Chao, H.J.: PacketScore: a statistics-based packet filtering scheme against distributed denial-of-service attacks. IEEE Trans. Dependable Secure Comput. 3(2), 141–155 (2006). doi:10.​1109/​TDSC.​2006.​25 CrossRef
20.
go back to reference Kasera, S., Pinheiro, J., Loader, C., Karaul, M., Hari, A., LaPorta, T.: Fast and robust signaling overload control. In: 9th International Conference on Network Protocols, pp. 323–331 (2001). doi:10.1109/ICNP.2001.992913 Kasera, S., Pinheiro, J., Loader, C., Karaul, M., Hari, A., LaPorta, T.: Fast and robust signaling overload control. In: 9th International Conference on Network Protocols, pp. 323–331 (2001). doi:10.​1109/​ICNP.​2001.​992913
22.
go back to reference Kaur, R., Sangal, A.L., Kumar, K.: Modeling and simulation of DDoS attack using Omnet++. In: International Conference on Signal Processing and Integrated Networks (SPIN), pp. 220–225 (2014). doi:10.1109/SPIN.2014.6776951 Kaur, R., Sangal, A.L., Kumar, K.: Modeling and simulation of DDoS attack using Omnet++. In: International Conference on Signal Processing and Integrated Networks (SPIN), pp. 220–225 (2014). doi:10.​1109/​SPIN.​2014.​6776951
Metadata
Title
Super-Router: A Collaborative Filtering Technique Against DDoS Attacks
Authors
Akshat Gaurav
Awadhesh Kumar Singh
Copyright Year
2017
Publisher
Springer Singapore
DOI
https://doi.org/10.1007/978-981-10-5780-9_27

Premium Partner