• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Advanced Search Include Citations
Advanced Search Include Citations

DMCA

Attacking DDoS at the Source (2002)

Cached

  • Download as a PDF

Download Links

  • [www.cs.ucla.edu]
  • [lasr.cs.ucla.edu]
  • [www.mnlab.cs.depaul.edu]
  • [www.lasr.cs.ucla.edu]
  • [www.cis.udel.edu]
  • [www.cs.unc.edu]
  • [www.eecis.udel.edu]
  • [lever.cs.ucla.edu]
  • [web.eecs.umich.edu]
  • [fmg-www.cs.ucla.edu]
  • [www.isi.edu]
  • [www.utdallas.edu]
  • [web.eecs.umich.edu]
  • [lever.cs.ucla.edu]
  • [www.fortguard.com]
  • [www.utdallas.edu]
  • [www.isi.edu]
  • [www.isi.edu]
  • [www.eecis.udel.edu]
  • [www.utdallas.edu]
  • [web.eecs.umich.edu]
  • [www.ieee-icnp.org]

  • Other Repositories/Bibliography

  • DBLP
  • Save to List
  • Add to Collection
  • Correct Errors
  • Monitor Changes
by Jelena Mirkovic , Gregory Prier , Peter Reiher
Citations:172 - 9 self
  • Summary
  • Citations
  • Active Bibliography
  • Co-citation
  • Clustered Documents
  • Version History

BibTeX

@MISC{Mirkovic02attackingddos,
    author = {Jelena Mirkovic and Gregory Prier and Peter Reiher},
    title = {Attacking DDoS at the Source},
    year = {2002}
}

Share

Facebook Twitter Reddit Bibsonomy

OpenURL

 

Abstract

Distributed denial-of-service (DDoS) attacks present an Internet-wide threat. We propose D-WARD, a DDoS defense system deployed at source-end networks that autonomously detects and stops attacks originating from these networks. Attacks are detected by the constant monitoring of two-way traffic flows between the network and the rest of the Internet and periodic comparison with normal flow models. Mismatching flows are rate-limited in proportion to their aggressiveness. D-WARD offers good service to legitimate traffic even during an attack, while effectively reducing DDoS traffic to a negligible level. A prototype of the system has been built in a Linux router. We show its effectiveness in various attack scenarios, discuss motivations for deployment, and describe associated costs.

Keyphrases

d-ward offer good service    internet-wide threat    constant monitoring    various attack scenario    ddos traffic    discus motivation    negligible level    periodic comparison    source-end network    two-way traffic    normal flow model    linux router    ddos defense system   

Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University