Skip to main content

Highspeed and Flexible Source-End DDoS Protection System Using IXP2400 Network Processor

  • Conference paper
IP Operations and Management (IPOM 2007)

Part of the book series: Lecture Notes in Computer Science ((LNCCN,volume 4786))

Included in the following conference series:

  • 421 Accesses

Abstract

This paper proposes an architecture of source-end DDoS protection system on IXP2400 network processor, which monitors traffic from the source network and polices traffic at the source without affecting the traffic from other network. The proposed architecture includes usual IPv4 forwarder with additional modules for source filtering, packet classification and flow control, and uses modified non-parametric CUSUM algorithm. We analyze the major shortcomings of previous approaches, and present basic performance analysis. The proposed system can handle 65,000 aggregated flows, and can operate at OC-48 line rate.

This research is supported by the MIC, under the ITRC support program supervised by the IITA (IITA-2006-(C1090-0603-0002)).

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Mirkovic, J., Reiher, P.: A taxonomy of DDoS attacks and defense mechanisms. ACM SIGCOMM Computer Communications Review 34(2), 39–54 (2004)

    Article  Google Scholar 

  2. Wang, H., Zhang, D., Shin, K.G.: Change-point monitoring for detection of DoS attacks. IEEE Transactions on Dependable and Secure Computing 1(4) (December 2004)

    Google Scholar 

  3. Intel IXP2400 Network Processor Hardware Reference Manual, Intel Corporation (October 2004)

    Google Scholar 

  4. Mirkovic, J., Reiher, P.: D-WARD: A source end defense against flooding denial-of-service attacks. IEEE Transactions on Dependable and Secure Computing 2(3), 216–232 (2005)

    Article  Google Scholar 

  5. Peng, T., Leckie, C., Ramamohanarao, K.: Detecting distributed denial of service attacks by sharing distributed beliefs. In: Safavi-Naini, R., Seberry, J. (eds.) ACISP 2003. LNCS, vol. 2727, Springer, Heidelberg (2003)

    Chapter  Google Scholar 

  6. Lim, B., Uddin, M.: Statistical-based SYN-flooding detection using programmable network processor. In: Proceedings of the Third International Conference on Information Technology and Applications, vol. 2, pp. 465–470 (2005)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Deep Medhi José Marcos Nogueira Tom Pfeifer S. Felix Wu

Rights and permissions

Reprints and permissions

Copyright information

© 2007 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Siradjev, D., Ke, Q., Park, J., Kim, YT. (2007). Highspeed and Flexible Source-End DDoS Protection System Using IXP2400 Network Processor. In: Medhi, D., Nogueira, J.M., Pfeifer, T., Wu, S.F. (eds) IP Operations and Management. IPOM 2007. Lecture Notes in Computer Science, vol 4786. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-75853-2_16

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-75853-2_16

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-75852-5

  • Online ISBN: 978-3-540-75853-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics