[go: up one dir, main page]

Khanna et al., 2011 - Google Patents

Adaptive selective verification: An efficient adaptive countermeasure to thwart dos attacks

Khanna et al., 2011

View PDF
Document ID
14009053313330847783
Author
Khanna S
Venkatesh S
Fatemieh O
Khan F
Gunter C
Publication year
Publication venue
IEEE/ACM Transactions On Networking

External Links

Snippet

Denial-of-service (DoS) attacks are considered within the province of a shared channel model in which attack rates may be large but are bounded and client request rates vary within fixed bounds. In this setting, it is shown that clients can adapt effectively to an attack …
Continue reading at seclab.illinois.edu (PDF) (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/1458Denial of Service
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1416Event detection, e.g. attack signature detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/54Store-and-forward switching systems
    • H04L12/56Packet switching systems
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/02Details
    • H04L12/26Monitoring arrangements; Testing arrangements
    • H04L12/2602Monitoring arrangements
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L47/00Traffic regulation in packet switching networks
    • H04L47/10Flow control or congestion control
    • H04L47/19Flow control or congestion control at layers above network layer
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L47/00Traffic regulation in packet switching networks
    • H04L47/10Flow control or congestion control
    • H04L47/24Flow control or congestion control depending on the type of traffic, e.g. priority or quality of service [QoS]
    • H04L47/2441Flow classification
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/02Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L43/00Arrangements for monitoring or testing packet switching networks
    • H04L43/08Monitoring based on specific metrics
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L29/00Arrangements, apparatus, circuits or systems, not covered by a single one of groups H04L1/00 - H04L27/00 contains provisionally no documents
    • H04L29/02Communication control; Communication processing contains provisionally no documents
    • H04L29/06Communication control; Communication processing contains provisionally no documents characterised by a protocol
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance or administration or management of packet switching networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network-specific arrangements or communication protocols supporting networked applications
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L69/00Application independent communication protocol aspects or techniques in packet data networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L45/00Routing or path finding of packets in data switching networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L49/00Packet switching elements

Similar Documents

Publication Publication Date Title
Khanna et al. Adaptive selective verification: An efficient adaptive countermeasure to thwart dos attacks
Xu et al. Sustaining availability of web services under distributed denial of service attacks
Jansen et al. The sniper attack: Anonymously deanonymizing and disabling the Tor network
Yuan et al. Defending against flow table overloading attack in software-defined networks
Liu et al. Netfence: preventing internet denial of service from inside out
JP6726331B2 (en) Systems and methods for regulating access requests
US8387144B2 (en) Network amplification attack mitigation
Sanmorino et al. DDoS attack detection method and mitigation using pattern of the flow
CN105991617B (en) Computer-implemented system and method for selecting a secure path using network scoring
Liu et al. Umbrella: Enabling ISPs to offer readily deployable and privacy-preserving DDoS prevention services
KR101042291B1 (en) DDoS detection / blocking system for DDoS attack and its method
CN106411828B (en) The method, apparatus and system of quantization defence result
Mohammadi et al. SYN‐Guard: An effective counter for SYN flooding attack in software‐defined networking
Ubale et al. SRL: An TCP SYNFLOOD DDoS mitigation approach in software-defined networks
Wu et al. Fmd: A DoS mitigation scheme based on flow migration in software‐defined networking
Khanna et al. Adaptive selective verification
Luo et al. The NewShrew attack: A new type of low-rate TCP-Targeted DoS attack
Stachtiari et al. Probabilistic model checking of CAPTCHA admission control for DoS resistant anti-SPIT protection
Beitollahi et al. A cooperative mechanism to defense against distributed denial of service attacks
Wang et al. A multi-layer framework for puzzle-based denial-of-service defense
Yang et al. Modeling and mitigating the coremelt attack
Djalaliev et al. Sentinel: hardware-accelerated mitigation of bot-based DDoS attacks
Charzinski Problems of elastic traffic admission control in an HTTP scenario
Hepsiba et al. Enhanced techniques to strengthening DTN against flood attacks
David et al. Router based approach to mitigate DOS attacks on the wireless networks