scispace - formally typeset
Search or ask a question

Showing papers in "International journal of database theory and application in 2008"


Journal Article
Fasheng Yi, Shui Yu, Wanlei Zhou, Jing Hai, Alessio Bonti1 
TL;DR: A novel filtering scheme based on source information in this paper to defend against various source IP address spoofing, which works independently at the potential victim side, and accumulates the source information of its clients.
Abstract: IP address spoofing is employed by a lot of DDoS attack tools. Most of the current research on DDoS attack packet filtering depends on cooperation among routers, which is hard to achieve in real campaigns. Therefore, in the paper, we propose a novel filtering scheme based on source information in this paper to defend against various source IP address spoofing. The proposed method works independently at the potential victim side, and accumulates the source information of its clients, for instance, source IP addresses, hops from the server during attacks free period. When a DDoS attack alarm is raised, we can filter out the attack packets based on the accumulated knowledge of the legitimate clients. We divide the source IP addresses into n (1 ≤ n ≤ 32) segments in our proposed algorithm; as a result, we can therefore release the challenge storage and speed up the procedure of information retrieval. The system which is proposed by us and the experiments indicated that the proposed method works effectively and efficiently.

29 citations