Academic
Publications
Traceback of DDoS Attacks Using Entropy Variations

Traceback of DDoS Attacks Using Entropy Variations,10.1109/TPDS.2010.97,IEEE Transactions on Parallel and Distributed Systems,Shui Yu,Wanlei Zhou,Robi

Traceback of DDoS Attacks Using Entropy Variations   (Citations: 1)
BibTex | RIS | RefWorks Download
Distributed Denial-of-Service (DDoS) attacks are a critical threat to the Internet. However, the memoryless feature of the Internet routing mechanisms makes it extremely hard to trace back to the source of these attacks. As a result, there is no effective and efficient method to deal with this issue so far. In this paper, we propose a novel traceback method for DDoS attacks that is based on entropy variations between normal and DDoS attack traffic, which is fundamentally different from commonly used packet marking techniques. In comparison to the existing DDoS traceback methods, the proposed strategy possesses a number of advantages—it is memory nonintensive, efficiently scalable, robust against packet pollution, and independent of attack traffic patterns. The results of extensive experimental and simulation studies are presented to demonstrate the effectiveness and efficiency of the proposed method. Our experiments show that accurate traceback is possible within 20 seconds (approximately) in a large-scale attack network with thousands of zombies.
Journal: IEEE Transactions on Parallel and Distributed Systems - TPDS , vol. 22, no. 3, pp. 412-425, 2011
Cumulative Annual
View Publication
The following links allow you to view full publications. These links are maintained by other sources not affiliated with Microsoft Academic Search.
    • ...There are drawbacks with PPM [14] [20, 21]...
    • ...It is reported that within 10 packets, the attacker origin can be located [20]...
    • ...DPM encounters the following limitations [9] [20] [29]...

    Mohammed Aleneziet al. IP traceback methodologies

Sort by: