You Can Run, But You Can't Hide: An Effective Methodology to Traceback DDoS Attackers

  • Authors:
  • K. T. Law;J. C. S. Lui;D. K. Y. Yau

  • Affiliations:
  • -;-;-

  • Venue:
  • MASCOTS '02 Proceedings of the 10th IEEE International Symposium on Modeling, Analysis, and Simulation of Computer and Telecommunications Systems
  • Year:
  • 2002

Quantified Score

Hi-index 0.00

Visualization

Abstract

With the increase of sophistication and severity of DDoSattack, it is important for a victim site to quickly identifythe potential attackers and eliminate their traffic. Ourwork is based on the probabilistic marking algorithm bySavage[12] in which an attack graph can be constructedby a victim site. We extend the concept further such that wecan deduce the local traffic rate of each router in the attackgraph based on the received marked packets. Given the intensitiesof these local traffic rates, we can eliminate theseattackers fromsending high volume of traffic to a victim site.More importantly, we propose a theoretical method to determinethe minimum stable time tmin, which is the minimumtime it takes to accurately determine the local traffic rate ofevery participating router in the attack graph.