TY - GEN
T1 - Defending DoS attacks using a puzzle-based approach and reduction in traceback time towards the attacker
AU - Abraham, Anup Mathew
AU - Vincent, Shweta
PY - 2012
Y1 - 2012
N2 - In today's world Denial-of-Service attacks have huge impact on network security. DoS attacks are usually launched to make the service of a system unavailable to a person who is authorized to use it. Several methods were introduced for defending Denial-of-Service attacks earlier. In our paper we propose a client-puzzle mechanism approach to defend DoS attacks. Here, intermediate routers can be used for issuing and solving network puzzles of various difficulty levels depending on the intensity of the attack. The target server will be protected by using an intermediate firewall router for issuing the puzzles; this will reduce the load over the server. Likewise intermediate proxy routers can be used for solving the puzzle. But furthermore, this proxy can also be a target of attack. This problem can be overcome by using a hybrid traceback mechanism for the attacking client. This technique helps to find out the attacking node and the router through which the attack packet was forwarded.
AB - In today's world Denial-of-Service attacks have huge impact on network security. DoS attacks are usually launched to make the service of a system unavailable to a person who is authorized to use it. Several methods were introduced for defending Denial-of-Service attacks earlier. In our paper we propose a client-puzzle mechanism approach to defend DoS attacks. Here, intermediate routers can be used for issuing and solving network puzzles of various difficulty levels depending on the intensity of the attack. The target server will be protected by using an intermediate firewall router for issuing the puzzles; this will reduce the load over the server. Likewise intermediate proxy routers can be used for solving the puzzle. But furthermore, this proxy can also be a target of attack. This problem can be overcome by using a hybrid traceback mechanism for the attacking client. This technique helps to find out the attacking node and the router through which the attack packet was forwarded.
UR - http://www.scopus.com/inward/record.url?scp=84865691280&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=84865691280&partnerID=8YFLogxK
U2 - 10.1007/978-3-642-29219-4_49
DO - 10.1007/978-3-642-29219-4_49
M3 - Conference contribution
AN - SCOPUS:84865691280
SN - 9783642292187
T3 - Communications in Computer and Information Science
SP - 425
EP - 433
BT - Global Trends in Computing and Communication Systems - 4th International Conference, ObCom 2011, Proceedings
T2 - 4th International Conference on Global Trends in Computing and Communication Systems, ObCom 2011
Y2 - 9 December 2011 through 11 December 2011
ER -