Mitigating DoS attack through selective bin verification

  • Authors:
  • Micah Sherr;Michael Greenwald;Carl A. Gunter;Sanjeev Khanna;Santosh S. Venkatesh

  • Affiliations:
  • School of Engineering and Applied Science, University of Pennsylvania;Bell Labs;Department of Computer Science, University of Illinois at Urbana-Champaign;School of Engineering and Applied Science, University of Pennsylvania;School of Engineering and Applied Science, University of Pennsylvania

  • Venue:
  • NPSEC'05 Proceedings of the First international conference on Secure network protocols
  • Year:
  • 2005

Quantified Score

Hi-index 0.00

Visualization

Abstract

Despite considerable attention from both the academic and commercial communities, denial-of-service (DoS) attacks represent a growing threat to network administrators and service providers. A large number of proposed DoS countermeasures attempt to detect an attack in-progress and filter out the DoS attack packets. These techniques often depend on the instantiation of sophisticated routing mechanisms and the ability to differentiate between normal and malicious messages. Unfortunately, neither of these prerequisites may be practical or possible. We propose and evaluate a defense against DoS attacks which we call selective bin verification. The technique shows promise against large DoS attacks, even when attack packets are able to permeate the network and reach the target of their attack. We explore the effectiveness of our technique by implementing an experimental testbed in which selective bin verification is successfully used to protect against DoS attacks. We formally describe the mathematical properties of our approach and delineate "tuning" parameters for defending against various attacks.