{"title":"抗DDoS攻击通信的安全传输协议","authors":"A.Z. Ghavidel, B. Issac","doi":"10.1109/SCORED.2007.4451371","DOIUrl":null,"url":null,"abstract":"A technical solution has been proposed in this paper to secure transport protocol communication in the case of DDoS (distributed denial of service) attacks. The recent papers about DDoS attacks, especially the amplification attack looks for abnormal transaction that signals and eventually reports them. These methods may generate false positives or negatives and in turn can be quite dismal in its performance, in the wake of a real DDoS attack. This paper suggests a symmetric key exchange and hiding of a secret code in the UDP (user datagram protocol) packets. Any packet that has the secret code missing would be rejected. At first, the secure UDP protocol will be discussed and later, a similar method for the TCP (transmission control protocol) will be discussed. Finally the performance analysis is done to compare the overhead incurred.","PeriodicalId":443652,"journal":{"name":"2007 5th Student Conference on Research and Development","volume":"1 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2007-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":"{\"title\":\"Secure Transport Protocols for DDoS Attack Resistant Communication\",\"authors\":\"A.Z. Ghavidel, B. Issac\",\"doi\":\"10.1109/SCORED.2007.4451371\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"A technical solution has been proposed in this paper to secure transport protocol communication in the case of DDoS (distributed denial of service) attacks. The recent papers about DDoS attacks, especially the amplification attack looks for abnormal transaction that signals and eventually reports them. These methods may generate false positives or negatives and in turn can be quite dismal in its performance, in the wake of a real DDoS attack. This paper suggests a symmetric key exchange and hiding of a secret code in the UDP (user datagram protocol) packets. Any packet that has the secret code missing would be rejected. At first, the secure UDP protocol will be discussed and later, a similar method for the TCP (transmission control protocol) will be discussed. Finally the performance analysis is done to compare the overhead incurred.\",\"PeriodicalId\":443652,\"journal\":{\"name\":\"2007 5th Student Conference on Research and Development\",\"volume\":\"1 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2007-12-11\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"1\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2007 5th Student Conference on Research and Development\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/SCORED.2007.4451371\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2007 5th Student Conference on Research and Development","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/SCORED.2007.4451371","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Secure Transport Protocols for DDoS Attack Resistant Communication
A technical solution has been proposed in this paper to secure transport protocol communication in the case of DDoS (distributed denial of service) attacks. The recent papers about DDoS attacks, especially the amplification attack looks for abnormal transaction that signals and eventually reports them. These methods may generate false positives or negatives and in turn can be quite dismal in its performance, in the wake of a real DDoS attack. This paper suggests a symmetric key exchange and hiding of a secret code in the UDP (user datagram protocol) packets. Any packet that has the secret code missing would be rejected. At first, the secure UDP protocol will be discussed and later, a similar method for the TCP (transmission control protocol) will be discussed. Finally the performance analysis is done to compare the overhead incurred.