Counteracting TCP SYN DDoS attacks using automated model

Udaya Kiran Tupakula*, Vijay Varadharajan, Ashok Kumar Gajam

*Corresponding author for this work

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contributionpeer-review

6 Citations (Scopus)

Abstract

We propose modifications to the automated model to counteract TCP SYN Distributed Denial of Service (DDoS) attacks nearest to the attacking source and also discuss the prototype implementation of our technique. It should be noted that we are not solving the TCP SYN problem, but we are enabling the victim to differentiate between the traffic originating from good and bad network domains, trace the router that is nearest to attacking source with a single packet even if the source address of the packet is spoofed and prevent the attack traffic at the router which is nearest to the attacking source. Since our model is invoked only during attack times, it has very less overhead and the main advantage of this technique is that the victim can provide better service for traffic originating from good network domain and completely eliminate or provide limited service for the traffic originating from bad network domaia

Original languageEnglish
Title of host publicationGLOBECOM'04 - IEEE Global Telecommunications Conference
EditorsSoontorn Oraintara
Place of PublicationPiscataway, NJ
PublisherInstitute of Electrical and Electronics Engineers (IEEE)
Pages2240-2244
Number of pages5
ISBN (Print)9780780387959, 9780780387942
Publication statusPublished - 2004
EventGLOBECOM'04 - IEEE Global Telecommunications Conference - Dallas, TX, United States
Duration: 29 Nov 20043 Dec 2004

Other

OtherGLOBECOM'04 - IEEE Global Telecommunications Conference
Country/TerritoryUnited States
CityDallas, TX
Period29/11/043/12/04

Fingerprint

Dive into the research topics of 'Counteracting TCP SYN DDoS attacks using automated model'. Together they form a unique fingerprint.

Cite this