TY - GEN
T1 - Unified rate limiting in broadband access networks for defeating Internet worms and DDoS attacks
AU - Park, Keun
AU - Seo, Dongwon
AU - Yoo, Jaewon
AU - Lee, Heejo
AU - Kim, Hyogon
PY - 2008
Y1 - 2008
N2 - Internet worms and DDoS attacks are considered the two most menacing attacks on today's Internet. The traditional wisdom is that they are different beasts, and they should be dealt with independently. In this paper, however, we show that a unified rate limiting algorithm is possible, which effectively works on both Internet worms and DDoS attacks. The unified approach leads to higher worm traffic reduction performance than that of existing rate limiting schemes geared toward worm mitigation, in addition to the added advantage of dropping most DDoS attack packets. In our experiments with attack traffics generated by attacking tools, the unified rate limiting scheme drops 80.7% worm packets and 93% DDoS packets, while 69.2% worms and 3.4% DDoS packets are dropped at maximum by previous worm scan rate limiting schemes. Also, the proposed scheme requires less computing resources, and has higher accuracy for dropping attack packets but not dropping legitimate packets.
AB - Internet worms and DDoS attacks are considered the two most menacing attacks on today's Internet. The traditional wisdom is that they are different beasts, and they should be dealt with independently. In this paper, however, we show that a unified rate limiting algorithm is possible, which effectively works on both Internet worms and DDoS attacks. The unified approach leads to higher worm traffic reduction performance than that of existing rate limiting schemes geared toward worm mitigation, in addition to the added advantage of dropping most DDoS attack packets. In our experiments with attack traffics generated by attacking tools, the unified rate limiting scheme drops 80.7% worm packets and 93% DDoS packets, while 69.2% worms and 3.4% DDoS packets are dropped at maximum by previous worm scan rate limiting schemes. Also, the proposed scheme requires less computing resources, and has higher accuracy for dropping attack packets but not dropping legitimate packets.
UR - http://www.scopus.com/inward/record.url?scp=41549160289&partnerID=8YFLogxK
U2 - 10.1007/978-3-540-79104-1_13
DO - 10.1007/978-3-540-79104-1_13
M3 - Conference contribution
AN - SCOPUS:41549160289
SN - 3540791035
SN - 9783540791034
T3 - Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
SP - 176
EP - 187
BT - Information Security Practice and Experience - 4th International Conference, ISPEC 2008, Proceedings
T2 - 4th Information Security Practice and Experience Conference, ISPEC 2008
Y2 - 21 April 2008 through 23 April 2008
ER -