scispace - formally typeset
Open AccessProceedings ArticleDOI

Implementing Pushback : Router-Based Defense Against DDoS Attacks

TLDR
This paper presents an architecture for Pushback, its implementation under FreeBSD, and suggestions for how such a system can be implemented in core routers.
Abstract
Pushback is a mechanism for defending against distributed denial-of-service (DDoS) attacks. DDoS attacks are treated as a congestion-control problem, but because most such congestion is caused by malicious hosts not obeying traditional end-to-end congestion control, the problem must be handled by the routers. Functionality is added to each router to detect and preferentially drop packets that probably belong to an attack. Upstream routers are also notified to drop such packets (hence the term Pushback ) in order that the router’s resources be used to route legitimate traffic. In this paper we present an architecture for Pushback, its implementation under FreeBSD, and suggestions for how such a system can be implemented in core routers.

read more

Content maybe subject to copyright    Report

Citations
More filters
Journal ArticleDOI

Controlling high bandwidth aggregates in the network

TL;DR: The design involves both a local mechanism for detecting and controlling an aggregate at a single router, and a cooperative pushback mechanism in which a router can ask upstream routers to control an aggregate.
Journal ArticleDOI

DDoS attacks and defense mechanisms: classification and state-of-the-art

TL;DR: The goal of the paper is to place some order into the existing attack and defense mechanisms, so that a better understanding of DDoS attacks can be achieved and subsequently more efficient and effective algorithms, techniques and procedures to combat these attacks may be developed.
Proceedings ArticleDOI

A framework for classifying denial of service attacks

TL;DR: In this article, the authors introduce a framework for classifying DoS attacks based on header content, and novel techniques such as transient ramp-up behavior and spectral analysis, which can be packaged as an automated tool to aid in rapid response to attacks, and can also be used to estimate the level of DoS activity on the Internet.
Proceedings ArticleDOI

Hop-count filtering: an effective defense against spoofed DDoS traffic

TL;DR: Hop-Count Filtering (HCF) can identify close to 90% of spoofed IP packets, and then discard them with little collateral damage, and is implemented and evaluated in the Linux kernel, demonstrating its benefits using experimental measurements.
Proceedings ArticleDOI

SOS: secure overlay services

TL;DR: This work proposes an architecture called Secure Overlay Services (SOS) that proactively prevents DoS attacks, geared toward supporting Emergency Services or similar types of communication, and demonstrates that such an architecture reduces the likelihood of a successful attack to minuscule levels.
References
More filters

An Architecture for Differentiated Service

TL;DR: An architecture for implementing scalable service differentiation in the Internet achieves scalability by aggregating traffic classification state which is conveyed by means of IP-layer packet marking using the DS field [DSFIELD].
Journal ArticleDOI

Random early detection gateways for congestion avoidance

TL;DR: Red gateways are designed to accompany a transport-layer congestion control protocol such as TCP and have no bias against bursty traffic and avoids the global synchronization of many connections decreasing their window at the same time.
Journal ArticleDOI

Analysis and simulation of a fair queueing algorithm

TL;DR: In this article, a fair gateway queueing algorithm based on an earlier suggestion by Nagle is proposed to control congestion in datagram networks, based on the idea of fair queueing.

Network Ingress Filtering: Defeating Denial of Service Attacks which employ IP Source Address Spoofing

P. Ferguson, +1 more
TL;DR: A simple, effective, and straightforward method for using ingress traffic filtering to prohibit DoS attacks which use forged IP addresses to be propagated from 'behind' an Internet Service Provider's (ISP) aggregation point is discussed.
Proceedings Article

Inferring internet denial-of-service activity

TL;DR: This article presents a new technique, called “backscatter analysis,” that provides a conservative estimate of worldwide denial-of-service activity, and believes it is the first to provide quantitative estimates of Internet-wide denial- of- service activity.