skip to main content
10.1145/3230833.3233279acmotherconferencesArticle/Chapter ViewAbstractPublication PagesaresConference Proceedingsconference-collections
research-article

Augmented DDoS Mitigation with Reputation Scores

Published:27 August 2018Publication History

ABSTRACT

Network attacks, especially DoS and DDoS attacks, are a significant threat for all providers of services or infrastructure. The biggest attacks can paralyze even large-scale infrastructures of worldwide companies. Attack mitigation is a complex issue studied by many researchers and security companies. While several approaches were proposed, there is still space for improvement. This paper proposes to augment existing mitigation heuristic with knowledge of reputation score of network entities. The aim is to find a way to mitigate malicious traffic present in DDoS amplification attacks with minimal disruption to communication of legitimate traffic.

References

  1. A10 Networks. 2018. A10 DDoS Protection Cloud. https://www.a10networks.com/products/hybrid-cloud-ddos-defenseGoogle ScholarGoogle Scholar
  2. A10 Networks. 2018. Multi-vector DDoS Attack Protection. https://www.a10networks.com/products/thunder-series/ddos-detection-protection-mitigationGoogle ScholarGoogle Scholar
  3. Akamai Technologies. 2018. Kona Site Defender. https://www.akamai.com/us/en/products/cloud-security/kona-site-defender.jspGoogle ScholarGoogle Scholar
  4. Václav Bartoš and Jan Kořenek. 2016. Evaluating Reputation of Internet Entities. Springer International Publishing, Cham, 132--136.Google ScholarGoogle Scholar
  5. Vaclav Bartos and Martin Zadnik. 2014. An analysis of correlations of intrusion alerts in an NREN. In Computer Aided Modeling and Design of Communication Links and Networks (CAMAD), 2014 IEEE 19th International Workshop on. IEEE, 305--309.Google ScholarGoogle ScholarCross RefCross Ref
  6. Business.com. 2018. The Best DDoS Protection Services. http://www.toptenreviews.com/business/internet/best-ddos-protection-services/Google ScholarGoogle Scholar
  7. CESNET, a.l.e. 2018. DDoS Protector. https://www.liberouter.org/technologies/ddos-protector/Google ScholarGoogle Scholar
  8. Cloudflare Inc. 2018. Advanced DDoS Protection and Mitigation. https://www.cloudflare.com/ddos/Google ScholarGoogle Scholar
  9. Corsa Technology Inc. 2018. Network Security Enforcement for DDoS Attacks. https://www.corsa.com/red-armor-security/Google ScholarGoogle Scholar
  10. Jelena Mirkovic and Peter Reiher. 2004. A taxonomy of DDoS attack and DDoS defense mechanisms. ACM SIGCOMM Computer Communication Review 34, 2 (2004), 39--53. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. Giovane César Moura. 2013. Internet bad neighborhoods. Dissertation Thesis, University of Twente.Google ScholarGoogle Scholar
  12. Vern Paxson. 2001. An analysis of using reflectors for distributed denial-of-service attacks. ACM SIGCOMM Computer Communication Review 31, 3 (2001), 38--47. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. Viktor Puš, Jan Kučera, Martin Zadnik, and Jan Kořenek. 2017. Protector: DDoS mitigation at 100G.Google ScholarGoogle Scholar
  14. Radware. 2018. DDoS Mitigation Service: DDoS Attack Mitigation. https://www.radware.com/products/attack-mitigation-service/Google ScholarGoogle Scholar
  15. Craig A Shue, Andrew J Kalafut, and Minaxi Gupta. 2012. Abnormally malicious autonomous systems and their internet connectivity. IEEE/ACM Transactions on Networking (TON) 20, 1 (2012), 220--230. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. Fabio Soldo, Anh Le, and Athina Markopoulou. 2011. Blacklisting recommendation system: using spatio-temporal patterns to predict future attacks. IEEE Journal on Selected Areas in Communications 29, 7 (2011), 1423--1437.Google ScholarGoogle ScholarCross RefCross Ref
  17. S. T. Zargar, J. Joshi, and D. Tipper. 2013. A Survey of Defense Mechanisms Against Distributed Denial of Service (DDoS) Flooding Attacks. IEEE Communications Surveys & Tutorials 15, 4 (2013), 2046--2069.Google ScholarGoogle ScholarCross RefCross Ref
  18. Jian Zhang, Phillip A Porras, and Johannes Ullrich. 2008. Highly Predictive Blacklisting. In USENIX Security Symposium. 107--122. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Augmented DDoS Mitigation with Reputation Scores

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in
    • Published in

      cover image ACM Other conferences
      ARES '18: Proceedings of the 13th International Conference on Availability, Reliability and Security
      August 2018
      603 pages
      ISBN:9781450364485
      DOI:10.1145/3230833

      Copyright © 2018 ACM

      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 27 August 2018

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • research-article
      • Research
      • Refereed limited

      Acceptance Rates

      ARES '18 Paper Acceptance Rate128of260submissions,49%Overall Acceptance Rate228of451submissions,51%

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader