基于服务的访问控制

U. Tupakula, V. Varadharajan, S. K. Vuppala
{"title":"基于服务的访问控制","authors":"U. Tupakula, V. Varadharajan, S. K. Vuppala","doi":"10.1109/ICECCS.2009.43","DOIUrl":null,"url":null,"abstract":"In this paper we propose a dynamically invoked Service Based Access Control (SBAC) Model to efficiently deal with the Distributed Denial of Service (DDoS) attacks. The main idea of the SBAC is based on the observation that if the routers have information about the services that are running on the end host and can identify the upper layer traffic from the IP packet payload, then it becomes easy to differentiate between legitimate and attack traffic for that particular victim server. To minimise the overhead on the routers, the SBAC model is invoked during the attack times only and the victim’s traffic is processed separately. The boundary routers in SBAC model validate each incoming packet to the victim on a per server basis. Only the packets that are considered to be accessing the legitimate services are passed and the remaining packets are dropped. Hence, at this stage the victim’s network is immune to any dynamic changes in attack pattern if the attack packets are not accessing the legitimate services at the victim end. The packets that are considered to be accessing legitimate services of the victim machine/network are marked with a unique ID and destined to the victim. If any of the received packets are found to be malicious, the unique ID enables the victim to identify service specific attack signature for each ingress SBAC router and prevent the attack traffic at that particular router. We will also discuss how the SBAC model deals with attacks on the infrastructure of the Autonomous System.","PeriodicalId":282238,"journal":{"name":"2009 14th IEEE International Conference on Engineering of Complex Computer Systems","volume":"37 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2009-06-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"13","resultStr":"{\"title\":\"SBAC: Service Based Access Control\",\"authors\":\"U. Tupakula, V. Varadharajan, S. K. Vuppala\",\"doi\":\"10.1109/ICECCS.2009.43\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"In this paper we propose a dynamically invoked Service Based Access Control (SBAC) Model to efficiently deal with the Distributed Denial of Service (DDoS) attacks. The main idea of the SBAC is based on the observation that if the routers have information about the services that are running on the end host and can identify the upper layer traffic from the IP packet payload, then it becomes easy to differentiate between legitimate and attack traffic for that particular victim server. To minimise the overhead on the routers, the SBAC model is invoked during the attack times only and the victim’s traffic is processed separately. The boundary routers in SBAC model validate each incoming packet to the victim on a per server basis. Only the packets that are considered to be accessing the legitimate services are passed and the remaining packets are dropped. Hence, at this stage the victim’s network is immune to any dynamic changes in attack pattern if the attack packets are not accessing the legitimate services at the victim end. The packets that are considered to be accessing legitimate services of the victim machine/network are marked with a unique ID and destined to the victim. If any of the received packets are found to be malicious, the unique ID enables the victim to identify service specific attack signature for each ingress SBAC router and prevent the attack traffic at that particular router. We will also discuss how the SBAC model deals with attacks on the infrastructure of the Autonomous System.\",\"PeriodicalId\":282238,\"journal\":{\"name\":\"2009 14th IEEE International Conference on Engineering of Complex Computer Systems\",\"volume\":\"37 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2009-06-02\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"13\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2009 14th IEEE International Conference on Engineering of Complex Computer Systems\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICECCS.2009.43\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2009 14th IEEE International Conference on Engineering of Complex Computer Systems","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICECCS.2009.43","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 13

摘要

为了有效地应对分布式拒绝服务(DDoS)攻击,提出了一种动态调用的基于服务的访问控制(SBAC)模型。SBAC的主要思想是基于这样的观察:如果路由器有关于在终端主机上运行的服务的信息,并且可以从IP数据包有效负载中识别上层流量,那么就很容易区分特定受害服务器的合法流量和攻击流量。为了尽量减少路由器的开销,SBAC模型只在攻击期间调用,受害者的流量被单独处理。SBAC模型中的边界路由器在每个服务器的基础上验证每个到达受害者的数据包。只有被认为访问了合法服务的数据包才会被传递,其余的数据包将被丢弃。因此,在此阶段,如果攻击报文没有访问受害者端的合法服务,则受害者的网络不会受到攻击模式的任何动态变化的影响。被认为是访问受害者机器/网络的合法服务的数据包被标记为唯一的ID并发送给受害者。如果发现收到的任何数据包是恶意的,则唯一ID使受害者能够识别每个进入SBAC路由器的特定服务攻击签名,并阻止该特定路由器的攻击流量。我们还将讨论SBAC模型如何处理对自治系统基础设施的攻击。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
SBAC: Service Based Access Control
In this paper we propose a dynamically invoked Service Based Access Control (SBAC) Model to efficiently deal with the Distributed Denial of Service (DDoS) attacks. The main idea of the SBAC is based on the observation that if the routers have information about the services that are running on the end host and can identify the upper layer traffic from the IP packet payload, then it becomes easy to differentiate between legitimate and attack traffic for that particular victim server. To minimise the overhead on the routers, the SBAC model is invoked during the attack times only and the victim’s traffic is processed separately. The boundary routers in SBAC model validate each incoming packet to the victim on a per server basis. Only the packets that are considered to be accessing the legitimate services are passed and the remaining packets are dropped. Hence, at this stage the victim’s network is immune to any dynamic changes in attack pattern if the attack packets are not accessing the legitimate services at the victim end. The packets that are considered to be accessing legitimate services of the victim machine/network are marked with a unique ID and destined to the victim. If any of the received packets are found to be malicious, the unique ID enables the victim to identify service specific attack signature for each ingress SBAC router and prevent the attack traffic at that particular router. We will also discuss how the SBAC model deals with attacks on the infrastructure of the Autonomous System.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信