TY - GEN
T1 - An enhanced SOS architecture for DDoS attack defense using active network technology
AU - In, Chi Hyung
AU - Hong, Choong Seon
AU - Wei, Jiang
AU - Okamura, Koji
PY - 2005/12/1
Y1 - 2005/12/1
N2 - After a long time study in DDoS attack, we find the Secure Overlay Services (SOS) architecture is one of the best ways to protect our service. There is no other reason but the ability to provide reliable communication between authorized clients and a protected target under on-going DDoS attacks. The SOS architecture defines a set of overlay nodes arranged in four function groups that controls access to the protected target. Although, the architecture is novel and works well under simple congestion based attacks, we observe that when the attacker uses same malicious traffic raid the SOS nodes with some kind of sleight, the SOS system can not response this kind of trick, and somehow it has already threaten the reliability of the Secure overlay Service. We propose a scheme to enhance the secure overlay services (SOS) against the intelligent DDoS attack both from the mechanisms and detection algorithm.
AB - After a long time study in DDoS attack, we find the Secure Overlay Services (SOS) architecture is one of the best ways to protect our service. There is no other reason but the ability to provide reliable communication between authorized clients and a protected target under on-going DDoS attacks. The SOS architecture defines a set of overlay nodes arranged in four function groups that controls access to the protected target. Although, the architecture is novel and works well under simple congestion based attacks, we observe that when the attacker uses same malicious traffic raid the SOS nodes with some kind of sleight, the SOS system can not response this kind of trick, and somehow it has already threaten the reliability of the Secure overlay Service. We propose a scheme to enhance the secure overlay services (SOS) against the intelligent DDoS attack both from the mechanisms and detection algorithm.
UR - http://www.scopus.com/inward/record.url?scp=33751013008&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=33751013008&partnerID=8YFLogxK
U2 - 10.1109/AICT.2005.22
DO - 10.1109/AICT.2005.22
M3 - Conference contribution
AN - SCOPUS:33751013008
SN - 0769523889
SN - 9780769523880
T3 - Proceedings - Advanced Industrial Conference on Telecommunications/Service Assurance with Partial and Intermittent Resources Conference/E-Learning on Telecommunications Workshop AICT/SAPIR/ELETE 2005
SP - 90
EP - 97
BT - Proceedings - Advanced Industrial Conference on Telecommunications/Service Assurance with Partial and Intermittent Resources Conference/E-Learning on Telecommunications Workshop AICT/SAPIR/ELETE 2005
T2 - Advanced Industrial Conference on Telecommunications/Service Assurance with Partial and Intermittent Resources Conference/E-Learning on Telecommunications Workshop AICT/SAPIR/ELETE 2005
Y2 - 17 July 2005 through 20 July 2005
ER -