Source-End DDoS Defense

  • Authors:
  • Jelena Mirkovic;Gregory Prier;Peter Reiher

  • Affiliations:
  • -;-;-

  • Venue:
  • NCA '03 Proceedings of the Second IEEE International Symposium on Network Computing and Applications
  • Year:
  • 2003

Quantified Score

Hi-index 0.00

Visualization

Abstract

A successful source-end DDoS defense enables earlysuppression of the attack and minimizes collateral damage.However, such an approach faces many challenges: (a) distributingthe attack hinders detection; (b) defense systemsmust guarantee good service to legitimate traffic during theattack; and (c) deployment costs and false alarm levels mustbe sufficiently small and effectiveness must be high to providedeployment incentive. We discuss each of the challengesand describe one successful design of a source-endDDoS defense system - the D-WARD system. D-WARDwas implemented in a Linux router. We include experimentalresults to illustrate D-WARD's performance.