Trung Hai Nguyen, Cao Thanh Doan, Van Quan Nguyen, Thi Huyen Trang Nguyen, Minh Phuong Doan
{"title":"Distributed defense of distributed DoS using pushback and communicate mechanism","authors":"Trung Hai Nguyen, Cao Thanh Doan, Van Quan Nguyen, Thi Huyen Trang Nguyen, Minh Phuong Doan","doi":"10.1109/ATC.2011.6027461","DOIUrl":null,"url":null,"abstract":"DDoS is one of the most dangerous methods to attack victim network because it uses a vast quantity of distributed agents to make victim paralyze. This paper gives a DDoS defense method which is based on “pushback and communicate” idea (PaC method). When the gateway of victim detects DDoS attack, it has to listen on interfaces to define the neighbors from which DDoS packets come. Those neighbors will receive DDoS information and do same things the victim's gateway does. By repeating that work, PaC can find the exact way DDoS packets had passed through. All routers then continue creating their own filters before sending DDoS information to their next neighbors.","PeriodicalId":221905,"journal":{"name":"The 2011 International Conference on Advanced Technologies for Communications (ATC 2011)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2011-09-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"9","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"The 2011 International Conference on Advanced Technologies for Communications (ATC 2011)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ATC.2011.6027461","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 9
Abstract
DDoS is one of the most dangerous methods to attack victim network because it uses a vast quantity of distributed agents to make victim paralyze. This paper gives a DDoS defense method which is based on “pushback and communicate” idea (PaC method). When the gateway of victim detects DDoS attack, it has to listen on interfaces to define the neighbors from which DDoS packets come. Those neighbors will receive DDoS information and do same things the victim's gateway does. By repeating that work, PaC can find the exact way DDoS packets had passed through. All routers then continue creating their own filters before sending DDoS information to their next neighbors.