Defending DoS attacks using a puzzle-based approach and reduction in traceback time towards the attacker

Anup Mathew Abraham, Shweta Vincent

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

In today's world Denial-of-Service attacks have huge impact on network security. DoS attacks are usually launched to make the service of a system unavailable to a person who is authorized to use it. Several methods were introduced for defending Denial-of-Service attacks earlier. In our paper we propose a client-puzzle mechanism approach to defend DoS attacks. Here, intermediate routers can be used for issuing and solving network puzzles of various difficulty levels depending on the intensity of the attack. The target server will be protected by using an intermediate firewall router for issuing the puzzles; this will reduce the load over the server. Likewise intermediate proxy routers can be used for solving the puzzle. But furthermore, this proxy can also be a target of attack. This problem can be overcome by using a hybrid traceback mechanism for the attacking client. This technique helps to find out the attacking node and the router through which the attack packet was forwarded.

Original languageEnglish
Title of host publicationGlobal Trends in Computing and Communication Systems - 4th International Conference, ObCom 2011, Proceedings
Pages425-433
Number of pages9
EditionPART I
DOIs
Publication statusPublished - 2012
Event4th International Conference on Global Trends in Computing and Communication Systems, ObCom 2011 - Vellore, TN, India
Duration: 09-12-201111-12-2011

Publication series

NameCommunications in Computer and Information Science
NumberPART I
Volume269 CCIS
ISSN (Print)1865-0929

Conference

Conference4th International Conference on Global Trends in Computing and Communication Systems, ObCom 2011
Country/TerritoryIndia
CityVellore, TN
Period09-12-1111-12-11

All Science Journal Classification (ASJC) codes

  • Computer Science(all)
  • Mathematics(all)

Fingerprint

Dive into the research topics of 'Defending DoS attacks using a puzzle-based approach and reduction in traceback time towards the attacker'. Together they form a unique fingerprint.

Cite this