Skip to main content

Cooperative Routers against DoS Attacks

  • Conference paper
  • First Online:
Information Security and Privacy (ACISP 2003)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 2727))

Included in the following conference series:

  • 4612 Accesses

Abstract

In order to protect network from the Denial of Service attacks which sends excessive traffic to a host, it is required for network components to throttle unauthorized traffics. The attacker must be identified through the cooperation of routers and must be isolated by the nearest router. It is the most important to identify and isolate the attacker since the nearest router can make ideal blocking of the DoS attacks. In this research, we will present a protocol which can identify the attacker of DoS by the request of victim in cooperation of routers on the attacking path between a victim and the attacker. The performance of our protocol will be verified by simulations and the experiments show that it takes considerably small time to identify the location of attacker.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Felix Lau, Stuart H. Rubin, Michael H. Smith, and Ljiljana Trajkovic. Distributed Denial of Service Attacks. McGraw-Hill, 2000.

    Google Scholar 

  2. Dawn Song and Adrian Perrig. Advanced and authenticated marking schemes for IP traceback. In IEEE Infocomm, 2001.

    Google Scholar 

  3. Stefan Savage, David Wetherall, Anna Karlin, and Tom Anderson. Practical network support for IP traceback. ACM SIGCOMM, 2000.

    Google Scholar 

  4. Vern Paxon. An analysis using reflectors for distributed Denial-of-Service attacks. ACM SIGCOMM, 31(3), July 2001.

    Google Scholar 

  5. Eric Y. Chen. Aegis: An active-network-powered defense mechanism against ddos attacks. Lecvure Notes in Computer Science, 2207, 2001.

    Google Scholar 

  6. J. B. D. Cabrera, L. Lewis, Xinzhou Qin, Wenke Lee, R. K. Prasanth, B. Ravichandran, and R. K. Mehra. Proactive detection of distributed denial of service attacks using MIB traffic variables-a feasibility study. In Proceedings of 2001 IEEE/IFIP International Symposium on Integrated Network Management, 2001.

    Google Scholar 

  7. Drew Dean, Matt Franklin, and Adam Stubblefield. An algebraic approach to IP traceback. ACM Transactions on Information and System Security, 5(2):199–137, May 2002.

    Article  Google Scholar 

  8. J. D. Case et al. SNMP v2. RFC 1441, 1993.

    Google Scholar 

  9. F. Baker. Requirements for IP version 4 routers. RFC 1812, 1995.

    Google Scholar 

  10. http://www.isi.edu/nsnam/ns/. The Network Simulator-ns-2.

    Google Scholar 

  11. Kevin Fall and Kannan Varadhan. The NS Manual. UC Berkeley, 2001.

    Google Scholar 

  12. http://www.uu.net/network/maps/northam/index.xml. WorldCom’s UUNET network maps.

    Google Scholar 

  13. P. Ferguson. Network ingress filtering: Defeating denial of service attacks which employ IP source address spoofing. RFC 2267, 1998.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2003 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Song, H.Y., Kim, Hg. (2003). Cooperative Routers against DoS Attacks. In: Safavi-Naini, R., Seberry, J. (eds) Information Security and Privacy. ACISP 2003. Lecture Notes in Computer Science, vol 2727. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-45067-X_18

Download citation

  • DOI: https://doi.org/10.1007/3-540-45067-X_18

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-40515-3

  • Online ISBN: 978-3-540-45067-2

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics