Skip to main content

Part of the book series: Lecture Notes in Computer Science ((LNCCN,volume 5787))

Included in the following conference series:

Abstract

We propose a two-stage Distributed Denial of Service (DDoS) defense system, which can protect a given subnet by serving existing flows and new flows with a different priority based on IP history information. Denial of Service (DoS) usually occurs when the resource of a network node or link is limited and the demand of the users for that resource exceeds the capacity. The objective of the proposed defense system is to provide continued service to existing flows even in the presence of DDoS attacks, and we attempt to achieve this goal by discriminating existing flows from new flows. The proposed scheme can protect existing connections effectively with a reduced memory size by reducing the monitored IP address set through sampling in the first stage and using Bloom filters. We evaluate the performance of the proposed scheme through simulation.

This work was supported by the IT R&D program of MKE/KEIT. [2009-S-038-01, The Development of Anti-DDoS Technology].

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Dagon, D., Gu, G., Lee, C.P., Lee, W.: A Taxonomy of Botnet Structures. In: Proc. of Annual Computer Security Applications Conference (ACSAC) (December 2007)

    Google Scholar 

  2. Peng, T., Leckie, C., Ramamohanarao, K.: Survey of Network-Based Defense Mechanisms Countering the DoS and DDoS Problems. ACM Computing Surveys 39(1) (April 2007)

    Google Scholar 

  3. Estan, C., Varghese, G.: New Directions in Traffic Measurement and Accounting. In: Proc. of ACM SIGCOMM (August 2002)

    Google Scholar 

  4. Kompella, R.R., Singh, S., Varghese, G.: On Scalable Attack Detection in the Network. In: Proc. of ACM Internet Measurement Conference (IMC) (October 2004)

    Google Scholar 

  5. Jung, J., Krishnamurthy, B., Rabinovich, M.: Flash Crowds and Denial of Service Attacks: Characterization and Implication for CDNs and Web Sites. In: Proc. of World Wide Web (WWW) Conference (May 2002)

    Google Scholar 

  6. Peng, T., Leckie, C., Ramamohanarao, K.: Protecting from Distributed Denial of Service Attack Using History-based IP Filtering. In: Proc. of IEEE ICC, May 2003, pp. 482–486 (2003)

    Google Scholar 

  7. Peng, T., Leckie, C., Ramamohanarao, K.: Proactively Detecting Distributed Denial of Service Attacks Using Source IP Address Monitoring. In: Proc. of Networking Conference, May 2004, pp. 771–782 (2004)

    Google Scholar 

  8. Fan, L., Cao, P., Almeida, J., Broder, A.Z.: Summary cache: a scalable wide-area web cache sharing protocol, Technical Report 1361, Univ. of Wisconsin-Madison (February 1998)

    Google Scholar 

  9. Crovella, M.E., Bestavros, A.: Self-similarity in world wide web traffic: evidence and possible causes. IEEE/ACM Trans. Networking 5(6), 835–846 (1997)

    Article  Google Scholar 

  10. Sun, Z., He, D., Liang, L., Cruickshank, H.: Internet QoS and traffic modelling. IEEE Proceedings 151(5), 248–255 (2004)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2009 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Nam, S.Y., Lee, T. (2009). Memory-Efficient IP Filtering for Countering DDoS Attacks . In: Hong, C.S., Tonouchi, T., Ma, Y., Chao, CS. (eds) Management Enabling the Future Internet for Changing Business and New Computing Services. APNOMS 2009. Lecture Notes in Computer Science, vol 5787. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-04492-2_31

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-04492-2_31

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-04491-5

  • Online ISBN: 978-3-642-04492-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics