Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Review Help
Search
DDoS defense by offense
Walfish M., Vutukuru M., Balakrishnan H., Karger D., Shenker S. ACM Transactions on Computer Systems28 (1):1-54,2010.Type:Article
Date Reviewed: Jul 9 2010

Two methods are usually used to defend against distributed denial-of-service (DDoS) attacks: the first method provides lots of resources to satisfy requests, so that services cannot be denied; the other method builds a blacklist for denying requests.

This paper proposes a different approach: allocate a fair amount of bandwidth and resources, such as central processing unit (CPU) time and memory, to each connection, instead of trying to distinguish who is and who isn’t an attacker. The assumption is that attackers would use most of their uplink bandwidth to infiltrate; therefore, the method encourages all clients to promote their bandwidth usage. Under this scenario, malicious clients cannot react to the encouragement and good clients can obtain better service than before.

This method has three main steps: limit requests to a defending server to a threshold; encourage all clients to send more traffic (for example, by resending the same message); and proportionally allocate bandwidth owned by the server according to the delivered bandwidth of all clients.

The authors claim that the idea is also applicable to network address translation (NAT) and proxy environments. However, the corresponding evaluation is not included in Section 8, the experimental evaluation part. The claim that evaluation is based on local area networks (LANs) disregards the fact that, currently, many connect to the Internet via asymmetric digital subscriber lines (ADSLs).

While users with bandwidth to spare could apply this method, most users are controlled by service providers or run peer-to-peer (P2P) applications. Bandwidth is not something that users can control. The paper is written in a question-and-answer style, and the first part reads like an advertisement.

Reviewer:  R. S. Chang Review #: CR138154 (1012-1247)
Bookmark and Share
  Featured Reviewer  
 
Security and Protection (C.2.0 ... )
 
Would you recommend this review?
yes
no
Other reviews under "Security and Protection": Date
Introduction to data security and controls (2nd ed.)
Edward R. I., QED Information Sciences, Inc., Wellesley, MA, 1991. Type: Book (9780894353864)
Aug 1 1992
Security for computer networks: an introduction to data security in teleprocessing and electronic funds transfer
Davies D., Price W., John Wiley & Sons, Inc., New York, NY, 1984. Type: Book (9780471900634)
Oct 1 1985
The development and proof of a formal specification for a multilevel secure system
Glasgow J., Macewen G. ACM Transactions on Computer Systems 5(2): 151-184, 1987. Type: Article
Oct 1 1987
more...

E-Mail This Printer-Friendly
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright 1999-2024 ThinkLoud®
Terms of Use
| Privacy Policy