Path attestation scheme to avert DDoS flood attacks

0Citations
Citations of this article
5Readers
Mendeley users who have this article in their library.

This article is free to access.

Abstract

DDoS mitigation schemes are increasingly becoming relevant in the Internet. The main hurdle faced by such schemes is the "nearly indistinguishable" line between malicious traffic and genuine traffic. It is best tackled with a paradigm shift in connection handling by attesting the path. We therefore propose the scheme called "Path Attestation Scheme" coupled with a metric called "Confidence Index" to tackle the problem of distinguishing malicious and genuine traffic in a progressive manner, with varying levels of certainty. We support our work through an experimental study to establish the stability of Internet topology by using 134 different global Internet paths over a period of 16 days. Our Path Attestation Scheme was able to successfully distinguish between malicious and genuine traffic, 85% of the time. The scheme presupposes support from a fraction of routers in the path. © 2010 Springer-Verlag.

Cite

CITATION STYLE

APA

Bhattacharjee, R., Sanand, S., & Raghavan, S. V. (2010). Path attestation scheme to avert DDoS flood attacks. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 6091 LNCS, pp. 397–408). https://doi.org/10.1007/978-3-642-12963-6_32

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free