Home > Research > Publications & Outputs > Identifying Legitimate Clients under Distribute...

Links

Text available via DOI:

View graph of relations

Identifying Legitimate Clients under Distributed Denial-of-Service Attacks

Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

Published
Publication date1/09/2010
Host publication4th International Conference on Network and System Security (NSS), 2010
PublisherIEEE
Pages365-370
Number of pages6
ISBN (print)978-1-4244-8484-3
<mark>Original language</mark>English
Event4th International Conference on Network and System Security (NSS 2010) - Melbourne, Australia
Duration: 1/09/20103/09/2010

Conference

Conference4th International Conference on Network and System Security (NSS 2010)
CityMelbourne, Australia
Period1/09/103/09/10

Conference

Conference4th International Conference on Network and System Security (NSS 2010)
CityMelbourne, Australia
Period1/09/103/09/10

Abstract

Distributed Denial of Service (DDoS) attacks are a persistent, current, and very real threat to networks. Expanding upon a flexible distributed framework for network remediation utilising multiple strategies, we examine a novel fusion of methods to maximise throughput from legitimate clients and minimise the impact from attackers. The basic approach is to build up a whitelist of likely legitimate clients by observing outgoing traffic, presenting a challenge though proof-of-work, and providing flow cookies. Traffic that does not match the expected profile is likely attack traffic, and can be heavily filtered during attack conditions. After we incrementally develop this approach, we explore the positive and negative impacts of this approach upon the network and analyse potential countermeasures.