Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Lee, FY | en_US |
dc.contributor.author | Shieh, S | en_US |
dc.date.accessioned | 2014-12-08T15:18:20Z | - |
dc.date.available | 2014-12-08T15:18:20Z | - |
dc.date.issued | 2005-10-01 | en_US |
dc.identifier.issn | 0167-4048 | en_US |
dc.identifier.uri | http://dx.doi.org/10.1016/j.cose.2005.03.005 | en_US |
dc.identifier.uri | http://hdl.handle.net/11536/13219 | - |
dc.description.abstract | In this paper, we propose anew scheme, called ANTI D, for detecting and filtering DDoS attacks which use spoofed packets to circumvent the conventional intrusion detection schemes. The proposed anti-DDoS scheme intends to complement, rather than replace conventional schemes. By embedding in each IP packet a unique path fingerprint that represents the route an IP packet has traversed, ANTID is able to distinguish IP packets that traverse different Internet paths. In ANTID, a server maintains for each of its communicating clients the mapping from the client's IP address to the corresponding path fingerprint. The construction and renewal of these mappings is performed in an on-demand fashion that helps to reduce the cost of maintenance. With presence of the mapping table, the onset of a spoofed DDoS attack can be detected by observing a surge of spoofed packets. Consequently, spoofed attack packets are filtered so as to sustain the quality of protected Internet services. ANTID is lightweight, robust, and incrementally deployable. Our experiment results showed that the proposed scheme can detect 99.95% spoofed IP packets and can discard them with little collateral damage to legitimate clients. It also showed that the higher the aggregated attack rate is, the sooner the attack can be detected. (C) 2005 Elsevier Ltd. All rights reserved. | en_US |
dc.language.iso | en_US | en_US |
dc.subject | network security | en_US |
dc.subject | intrusion detection | en_US |
dc.subject | DDoS | en_US |
dc.subject | IP spoofing | en_US |
dc.title | Defending against spoofed DDoS attacks with path fingerprint | en_US |
dc.type | Article | en_US |
dc.identifier.doi | 10.1016/j.cose.2005.03.005 | en_US |
dc.identifier.journal | COMPUTERS & SECURITY | en_US |
dc.citation.volume | 24 | en_US |
dc.citation.issue | 7 | en_US |
dc.citation.spage | 571 | en_US |
dc.citation.epage | 586 | en_US |
dc.contributor.department | 資訊工程學系 | zh_TW |
dc.contributor.department | Department of Computer Science | en_US |
dc.identifier.wosnumber | WOS:000233232400019 | - |
dc.citation.woscount | 10 | - |
Appears in Collections: | Articles |
Files in This Item:
If it is a zip file, please download the file and unzip it, then open index.html in a browser to view the full text content.