skip to main content
10.1145/3093241.3093252acmotherconferencesArticle/Chapter ViewAbstractPublication PagesiccdaConference Proceedingsconference-collections
research-article

XFirewall: A Dynamic and Additional Mitigation Against DDoS Storm

Authors Info & Claims
Published:19 May 2017Publication History

ABSTRACT

The Distributed Denial of Service (DDoS) attack is a main concern in network security. Since the attackers have developed different techniques and methods, preventing DDoS attacks has become more difficult. Traditional firewall is ineffective in preventing DDoS attacks. In this paper, we propose a new type of firewall named XFirewall to defend against DDoS attacks. XFirewall is a temporary firewall and is created when an attack occurs. Also, XFirewall will be configured with dynamic rules based on real-time traffic analysis. We will discuss in detail the design and algorithm for generating an XFirewall.

References

  1. "Defeating DDOS Attacks," Cisco white paper, (January 2014). Retrieved March 10, 2017 from http://www.cisco.com/c/en/us/products/collateral/security/traffic-anomaly-detector-xt-5600a/prod_white_paper0900aecd8011e927.html.Google ScholarGoogle Scholar
  2. A. Aljuhani and T. Alharbi, 2017. "Virtualized network functions security attacks and vulnerabilities," The 7th IEEE Annual Computing and Communication Workshop and Conference (2017). DOI:http://dx.doi.org/10.1109/ccwc.2017.7868478. Google ScholarGoogle ScholarCross RefCross Ref
  3. V. Network and I. Planning, "SDN-NFV reference architecture," no. February, pp. 1--220, 2016.Google ScholarGoogle Scholar
  4. Doyle, L. What's the difference between NFV automation and NFV orchestration? Retrieved March 16, 2017 from http://searchsdn.techtarget.com/answer/Whats-the-difference-between-NFV-automation-and-NFV-orchestration.Google ScholarGoogle Scholar
  5. Juan, D., Hongxin, H., Hongda, L., Zhizhong, P., Kuang-Ching, W., Gail-Joon, A., Jun, B., Younghee, P. 2015. VNGuard: An NFV/SDN combination framework for provisioning and managing virtual firewalls. 2015 IEEE Conference on Network Function Virtualization and Software Defined Network (NFV-SDN) (2015). DOI:http://dx.doi.org/10.1109/nfv-sdn.2015.7387414. Google ScholarGoogle ScholarCross RefCross Ref
  6. T. Alharbi, A. Aljuhani, and H. Liu, 2017. "Holistic DDoS mitigation using NFV," The 7th IEEE Annual Computing and Communication Workshop and Conference (2017). DOI:http://dx.doi.org/10.1109/ccwc.2017.7868480. Google ScholarGoogle ScholarCross RefCross Ref
  7. Woolf, N. 2016. DDoS attack that disrupted internet was largest of its kind in history, experts say. (October 2016). Retrieved February 21, 2017 from https://www.theguardian.com/technology/2016/oct/26/ddos-attack-dyn-mirai-botnetGoogle ScholarGoogle Scholar
  8. Scott Hilton. Dyn analysis summary of friday october 21 attack. Retrieved February 21, 2017 from http://dyn.com/blog/dyn-analysis-summary-of-friday-october-21-attack/Google ScholarGoogle Scholar
  9. J. Jeong., H. Kim., and J. Park. 2015 "A framework for security services based on Software-Defined Networking,". ICTC 2015 DC2, Mar. 2015Google ScholarGoogle Scholar
  10. Barna, C., Shtern, M., Smit, M., Tzerpos, V., and Litoiu, M. Model-based adaptive DoS attack mitigation. In 2012 ICSE Workshop on Software Engineering for Adaptive and Self-Managing Systems (SEAMS) (2012), pp. 119--128. Google ScholarGoogle ScholarCross RefCross Ref
  11. Navarikuth, M., Neelakantan, S., Sachan, K., Singh, U. P., Kumar, R. and Mallick, A. 2013. "A dynamic firewall architecture based on multi-source analysis". csi transactions on ICT 1.4 (2013): 317--329. Web.Google ScholarGoogle Scholar
  12. S, Akram., I, Zubair., M, Hasan Islam. 2009. "Fully Distributed Dynamically Configurable Firewall to Resist DOS Attacks in MANET". Networked Digital Technologies, 2009. NDT '09. First International Conference on Digital Object Identifier, 2009 pp. 547--549" Google ScholarGoogle ScholarCross RefCross Ref

Index Terms

  1. XFirewall: A Dynamic and Additional Mitigation Against DDoS Storm

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in
    • Published in

      cover image ACM Other conferences
      ICCDA '17: Proceedings of the International Conference on Compute and Data Analysis
      May 2017
      307 pages
      ISBN:9781450352413
      DOI:10.1145/3093241

      Copyright © 2017 ACM

      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 19 May 2017

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • research-article
      • Research
      • Refereed limited

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader