{"title":"网络主导攻击检测和缓解","authors":"J. Johny, M. Singh","doi":"10.1109/INFOCOMTECH.2018.8722390","DOIUrl":null,"url":null,"abstract":"In this paper, we address the issue of network dominating attack through which a malicious user tries to grab an unfair share of bandwidth. In this attack, malicious senders on receiving the congestion indication, increase their congestion window instead of decreasing. Random Early Detection (RED), which is one of the current Active Queue Management (AQM) schemes, fails to identify such flow that leads to unfair sharing of bandwidth. Therefore, we present a unique solution which works on top of RED to detect and mitigate the anomalous flows by monitoring the packets present in the gateway buffer.","PeriodicalId":175757,"journal":{"name":"2018 Conference on Information and Communication Technology (CICT)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Network Dominating Attack Detection and Mitigation\",\"authors\":\"J. Johny, M. Singh\",\"doi\":\"10.1109/INFOCOMTECH.2018.8722390\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"In this paper, we address the issue of network dominating attack through which a malicious user tries to grab an unfair share of bandwidth. In this attack, malicious senders on receiving the congestion indication, increase their congestion window instead of decreasing. Random Early Detection (RED), which is one of the current Active Queue Management (AQM) schemes, fails to identify such flow that leads to unfair sharing of bandwidth. Therefore, we present a unique solution which works on top of RED to detect and mitigate the anomalous flows by monitoring the packets present in the gateway buffer.\",\"PeriodicalId\":175757,\"journal\":{\"name\":\"2018 Conference on Information and Communication Technology (CICT)\",\"volume\":\"10 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2018-10-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2018 Conference on Information and Communication Technology (CICT)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/INFOCOMTECH.2018.8722390\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2018 Conference on Information and Communication Technology (CICT)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/INFOCOMTECH.2018.8722390","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Network Dominating Attack Detection and Mitigation
In this paper, we address the issue of network dominating attack through which a malicious user tries to grab an unfair share of bandwidth. In this attack, malicious senders on receiving the congestion indication, increase their congestion window instead of decreasing. Random Early Detection (RED), which is one of the current Active Queue Management (AQM) schemes, fails to identify such flow that leads to unfair sharing of bandwidth. Therefore, we present a unique solution which works on top of RED to detect and mitigate the anomalous flows by monitoring the packets present in the gateway buffer.