Towards Defeating DDoS Attacks

Alexander S. Doyal, J. Zhan, Huiming Yu
{"title":"Towards Defeating DDoS Attacks","authors":"Alexander S. Doyal, J. Zhan, Huiming Yu","doi":"10.1109/CyberSecurity.2012.34","DOIUrl":null,"url":null,"abstract":"Distributed Denial of Service (DDoS) attacks are attacks where a host of compromised systems are used to target a single system. This single system can be either an actual machine or a network resource. What makes these attacks so prevalent and hard to deal with is the fact that they are distributed. They come from a wide variety of machines, making them hard to trace and even harder to counter. This, in conjunction with the fact that many tools are becoming available on the market that make DDoS attacks easier, makes preventing DDoS attacks a very imperative issue. This paper proposes a mechanism, DDDoS, or Triple Dos, which will deal with DDoS attacks on the Internet layer. There are registration and authentication protocols used to connect clients and servers, so that an unregistered client cannot access the network and thus flood it with traffic. The Triple Dos service will only be activated when a DDoS attack is detected (using clustering), and it will ensure that registered clients and servers can always communicate.","PeriodicalId":162858,"journal":{"name":"2012 International Conference on Cyber Security","volume":"57 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2012-12-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"5","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2012 International Conference on Cyber Security","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/CyberSecurity.2012.34","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 5

Abstract

Distributed Denial of Service (DDoS) attacks are attacks where a host of compromised systems are used to target a single system. This single system can be either an actual machine or a network resource. What makes these attacks so prevalent and hard to deal with is the fact that they are distributed. They come from a wide variety of machines, making them hard to trace and even harder to counter. This, in conjunction with the fact that many tools are becoming available on the market that make DDoS attacks easier, makes preventing DDoS attacks a very imperative issue. This paper proposes a mechanism, DDDoS, or Triple Dos, which will deal with DDoS attacks on the Internet layer. There are registration and authentication protocols used to connect clients and servers, so that an unregistered client cannot access the network and thus flood it with traffic. The Triple Dos service will only be activated when a DDoS attack is detected (using clustering), and it will ensure that registered clients and servers can always communicate.
如何应对DDoS攻击
分布式拒绝服务(DDoS)攻击是利用一组受损系统来攻击单个系统的攻击。这个单一系统可以是一台实际的机器,也可以是一个网络资源。这些攻击之所以如此普遍和难以对付,是因为它们是分布式的。它们来自各种各样的机器,使它们难以追踪,更难以反击。这一点,再加上市场上出现了许多使DDoS攻击变得更容易的工具,使得防止DDoS攻击成为一个非常重要的问题。本文提出了一种处理互联网层DDoS攻击的机制,即DDDoS或Triple Dos。有注册和身份验证协议用于连接客户端和服务器,因此未注册的客户端无法访问网络,从而使流量泛滥。三重Dos服务只有在检测到DDoS攻击时才会被激活(使用集群),它将确保注册的客户端和服务器始终可以通信。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信