Against Distributed Denial-of-Service Attacks: Difference between revisions
Created page with "Title: Against Distributed Denial-of-Service Attacks Research Question: How can we protect public-access sites like web servers and FTP servers from distributed denial-of-service (DDoS) attacks while minimizing the impact on network resources? Methodology: The researchers proposed Active Internet Traffic Filtering (AITF), an automated mechanism for filtering malicious traffic during DDoS attacks. AITF aims to protect victims' resources by efficiently managing the "filt..." |
No edit summary |
||
Line 1: | Line 1: | ||
Title: Against Distributed Denial-of-Service Attacks | Title: Against Distributed Denial-of-Service Attacks | ||
Research Question: How can we protect public-access sites | Research Question: How can we protect public-access sites from highly distributed denial-of-service (DDoS) attacks while efficiently managing the available filtering resources? | ||
Methodology: The researchers proposed Active Internet | Methodology: The researchers proposed Active Internet Traffic Filtering (AITF), a mechanism that protects public-access sites from DDoS attacks by causing undesired traffic to be blocked as close as possible to its sources. They identified filters as a scarce resource and showed that AITF protects a significant amount of the victim's bandwidth, while requiring from each participating router a number of filters that can be accommodated by today's routers. | ||
Results: AITF | Results: The study found that AITF is incrementally deployable, offering substantial benefits to the first sites that deploy it. The researchers demonstrated that AITF can effectively block attack traffic from a large number of sources, while minimizing the impact on legitimate traffic. | ||
Implications: AITF | Implications: The implementation of AITF can significantly enhance the security of public-access sites against DDoS attacks. By causing undesired traffic to be blocked as close as possible to its sources, AITF efficiently utilizes the available filtering resources and minimizes the impact on legitimate traffic. This makes it an attractive solution for protecting critical online services from highly distributed and sophisticated attacks. | ||
Link to Article: https://arxiv.org/abs/ | Link to Article: https://arxiv.org/abs/0403042v2 | ||
Authors: | Authors: | ||
arXiv ID: | arXiv ID: 0403042v2 | ||
[[Category:Computer Science]] | [[Category:Computer Science]] | ||
[[Category:Traffic]] | |||
[[Category:Aitf]] | [[Category:Aitf]] | ||
[[Category:Attacks]] | |||
[[Category:From]] | [[Category:From]] | ||
[[Category: | [[Category:As]] | ||
Latest revision as of 15:39, 24 December 2023
Title: Against Distributed Denial-of-Service Attacks
Research Question: How can we protect public-access sites from highly distributed denial-of-service (DDoS) attacks while efficiently managing the available filtering resources?
Methodology: The researchers proposed Active Internet Traffic Filtering (AITF), a mechanism that protects public-access sites from DDoS attacks by causing undesired traffic to be blocked as close as possible to its sources. They identified filters as a scarce resource and showed that AITF protects a significant amount of the victim's bandwidth, while requiring from each participating router a number of filters that can be accommodated by today's routers.
Results: The study found that AITF is incrementally deployable, offering substantial benefits to the first sites that deploy it. The researchers demonstrated that AITF can effectively block attack traffic from a large number of sources, while minimizing the impact on legitimate traffic.
Implications: The implementation of AITF can significantly enhance the security of public-access sites against DDoS attacks. By causing undesired traffic to be blocked as close as possible to its sources, AITF efficiently utilizes the available filtering resources and minimizes the impact on legitimate traffic. This makes it an attractive solution for protecting critical online services from highly distributed and sophisticated attacks.
Link to Article: https://arxiv.org/abs/0403042v2 Authors: arXiv ID: 0403042v2