End Host Defense against DDoS Attacks with IP Spoofing

سال انتشار: 1388
نوع سند: مقاله کنفرانسی
زبان: انگلیسی
مشاهده: 2,067

فایل این مقاله در 6 صفحه با فرمت PDF قابل دریافت می باشد

استخراج به نرم افزارهای پژوهشی:

لینک ثابت به این مقاله:

شناسه ملی سند علمی:

ISCC06_008

تاریخ نمایه سازی: 16 تیر 1389

چکیده مقاله:

DDoS attacks are becoming a common nature to the internet and effective defense mechanisms are yet to be discovered. IP spoofing is a common nature of many DDoS attacks. While forging any field in an IP header is possible, number of hops an IP packet takes to reach its destination is solely depended on the routing infrastructure of the internet. A spoofed packet received at a specific host, would have wrong number of hops if it has been generated by an attacker with different distance to the host comparing to the legitimate packet generated by the original source. Since most modern Operating Systems, use only a few initial Time-to-Live (TTL) values, the final TTL value in a received packet could be used to determine whether or not the packet is spoofed. In this paper we propose a simple but yet effective filtering scheme, TTLF, we will use the final TTL values in previously captured legitimate IP packets as method of authentication for any new coming IP packet. Finally, we will present an implementation of TTLF in Linux kernel and demonstrate the performance gain obtained by using TTLF.

کلیدواژه ها:

نویسندگان

Koorosh Firouzbakht,

Electrical Engineering Department

Hadi Shahriar Shahhoseini

Electrical Engineering Department

مراجع و منابع این مقاله:

لیست زیر مراجع و منابع استفاده شده در این مقاله را نمایش می دهد. این مراجع به صورت کاملا ماشینی و بر اساس هوش مصنوعی استخراج شده اند و لذا ممکن است دارای اشکالاتی باشند که به مرور زمان دقت استخراج این محتوا افزایش می یابد. مراجعی که مقالات مربوط به آنها در سیویلیکا نمایه شده و پیدا شده اند، به خود مقاله لینک شده اند :
  • T. Beng, C. Leckie and K Ramamohan arao , "Survey ...
  • TCP SYN Flooding and IP Spoofing. CERT Advisory Available ...
  • US CERT Vulnerability Note VU# 539363, "State- based firewalls fai ...
  • Distributedء [4] P. A. R. Kumar and S. Selvakumar, Denial-of- ...
  • K. Park and H. Lee.، On the effectiveness of router- ...
  • C. Jin, H.Wang, and K. G. Shin. "Defense Against Spoofed ...
  • I. B. Mopari, S. G. Pukale and M L. Dhore, ...
  • The Swiss Education and Research Network, Default TTL values in ...
  • The Internet Assigned Numbers Authority, "IP Op- tion Numbers", February ...
  • B. Cheswick, H. Burch, and S. Branigan, "Mapping and visualizing ...
  • A Fei, G Pei, R Liu and L Zhang, "Measurements ...
  • Shavitt, "Constrained mirror placement on the inter- net ", IEEE ...
  • نمایش کامل مراجع