Path attestation scheme to avert DDoS flood attacks
TL;DR: The Path Attestation Scheme coupled with a metric called "Confidence Index" was able to successfully distinguish between malicious and genuine traffic, 85% of the time, and presupposes support from a fraction of routers in the path.
Abstract: DDoS mitigation schemes are increasingly becoming relevant in the Internet. The main hurdle faced by such schemes is the “nearly indistinguishable” line between malicious traffic and genuine traffic. It is best tackled with a paradigm shift in connection handling by attesting the path. We therefore propose the scheme called “Path Attestation Scheme” coupled with a metric called “Confidence Index” to tackle the problem of distinguishing malicious and genuine traffic in a progressive manner, with varying levels of certainty. We support our work through an experimental study to establish the stability of Internet topology by using 134 different global Internet paths over a period of 16 days. Our Path Attestation Scheme was able to successfully distinguish between malicious and genuine traffic, 85% of the time. The scheme presupposes support from a fraction of routers in the path.
...read more
Citations
1 citations
Cites methods from "Path attestation scheme to avert DD..."
...[2] Raktim Bhattacharjee, S. Sanand, and S.V. Raghavan....
[...]
...Abraham[17] in 2003 and Raktim[2] in 2010 proposed mitigation techniques based on Path identification and attestation; Nicholas[10] in 2007 proposed Client puzzles to mitigate DDos attacks whereas Antonis Michalas[4] 2010....
[...]
References
1,747 citations
"Path attestation scheme to avert DD..." refers background in this paper
...Though behavioral based schemes can detect unknown attacks, it suffers from several drawbacks as listed in [5]....
[...]
1,555 citations
"Path attestation scheme to avert DD..." refers background in this paper
...HopCount Filtering [8] is a type of host based scheme....
[...]
...Ingress Filtering [1] is one such type of solution where ingress routers block packets that arrive with source addresses having prefixes that do not match the customer’s network prefixes....
[...]
803 citations
"Path attestation scheme to avert DD..." refers background in this paper
...According to a study [6] done during 1994-1995, about 2/3 of the Internet paths were having routing persistence of either days or week and most variation was either in one or two routers....
[...]
598 citations
"Path attestation scheme to avert DD..." refers methods in this paper
...The Pushback scheme [2] view flooding by DDoS as a congestion problem....
[...]
437 citations
"Path attestation scheme to avert DD..." refers methods in this paper
...Further, network based solutions like Pi [10] and SIFF [9] use path based identification to filter out attack packets....
[...]