{"title":"Active shaping: a countermeasure against DDoS attacks","authors":"D. Kashiwa, E. Chen, H. Fuji","doi":"10.1109/ECUMN.2002.1002103","DOIUrl":null,"url":null,"abstract":"Distributed denial of service (DDoS) attacks are a pressing problem on the Internet as demonstrated by attacks on major e-commerce servers and ISPs. Since the attack is distributed and the attack tools evolve at a rapid and alarming rate, an effective solution must be formulated using a distributed and adaptive approach. In this paper, we propose a countermeasure against DDoS attacks using a method we call active shaping. The core-enabling technology of this framework is the active network, which allows us to detect, backtrack and defend against attacks at suitable network nodes and minimize damage. We also evaluate the effectiveness of our system using a prototype.","PeriodicalId":398555,"journal":{"name":"2nd European Conference on Universal Multiservice Networks. ECUMN'2001 (Cat. No.02EX563)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2002-08-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"15","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2nd European Conference on Universal Multiservice Networks. ECUMN'2001 (Cat. No.02EX563)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ECUMN.2002.1002103","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 15
Abstract
Distributed denial of service (DDoS) attacks are a pressing problem on the Internet as demonstrated by attacks on major e-commerce servers and ISPs. Since the attack is distributed and the attack tools evolve at a rapid and alarming rate, an effective solution must be formulated using a distributed and adaptive approach. In this paper, we propose a countermeasure against DDoS attacks using a method we call active shaping. The core-enabling technology of this framework is the active network, which allows us to detect, backtrack and defend against attacks at suitable network nodes and minimize damage. We also evaluate the effectiveness of our system using a prototype.