Centralized Defense Using Smart Routing Against Link-Flooding Attacks

2018 2nd Cyber Security in Networking Conference (CSNet)(2018)

引用 7|浏览25
暂无评分
摘要
Recently, two new distributed Link-flooding attacks with high destruction potential have been introduced named the Coremelt and the Crossfire attacks. Unlike the traditional DDoS attacks these two attacks isolate the victim from the rest of internet while the traffic is not sent to it. Moreover, these attacks are indistinguishable since the adversary keeps each per-flow rate, to flood the target network links, low for the Crossfire attack and only legitimate traffic is used for the Coremelt attack. The previous characteristics make these attacks undetectable by the current protection mechanisms in the routers or by intrusion detection systems (IDS). In this paper, we present a new mechanism that detects the sources used by the adversary to perform the attacks. Besides, we went one step further and we try to mitigate the attack even during the detection phase. This mechanism can be enabled by the softwarization mechanism as SDN. By extensive simulation on an ISP topology, and by comparing our work with previous solutions selected from the state of the art. Our results show that our heuristic is up to three times faster than the existing solutions and improve by ten the network stability. We believe that these results can help ISP enablers and designers to counter the link flooding attacks.
更多
查看译文
关键词
distributed Link-flooding attacks,Crossfire attack,traditional DDoS attacks,Coremelt attack,link flooding attacks,current protection mechanisms,intrusion detection systems,IDS,softwarization mechanism,ISP topology
AI 理解论文
溯源树
样例
生成溯源树,研究论文发展脉络
Chat Paper
正在生成论文摘要