IDEAS home Printed from https://ideas.repec.org/a/ids/ijcist/v6y2010i1p73-80.html
   My bibliography  Save this article

An effective defence mechanism for Distributed Denial-of-Service (DDoS) attacks using router-based techniques

Author

Listed:
  • Saravanan Kumarasamy

Abstract

Distributed Denial-of-Service (DDoS) attacks are becoming a major problem to both the internet and internet services. Congestion is caused by malicious hosts that are not obeying traditional end-to-end congestion control; the problem must be handled by routers. Functionality is added to each router to detect and preferentially drop packets that probably belong to an attack. Client puzzles have been advocated as a promising countermeasure to Denial-of-Service (DoS) attacks in the recent years. In order to identify the attackers, the victim server issues a puzzle to the client. When the client is able to solve the puzzle, it is assumed to be authentic and the traffic from it is allowed into the server. In order to attain the advantages of both pushback and puzzle solving techniques, a hybrid scheme called router-based pushback technique, which involves both techniques to solve the problem of DDoS attacks, is proposed. In this proposal, the puzzle-solving mechanism is pushed back to the core routers rather than to the victim. The router-based client puzzle mechanism checks the host system whether it is legitimate or not by providing a puzzle to be solved by the client.

Suggested Citation

  • Saravanan Kumarasamy, 2010. "An effective defence mechanism for Distributed Denial-of-Service (DDoS) attacks using router-based techniques," International Journal of Critical Infrastructures, Inderscience Enterprises Ltd, vol. 6(1), pages 73-80.
  • Handle: RePEc:ids:ijcist:v:6:y:2010:i:1:p:73-80
    as

    Download full text from publisher

    File URL: http://www.inderscience.com/link.php?id=29577
    Download Restriction: Access to full text is restricted to subscribers.
    ---><---

    As the access to this document is restricted, you may want to search for a different version of it.

    Corrections

    All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:ids:ijcist:v:6:y:2010:i:1:p:73-80. See general information about how to correct material in RePEc.

    If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.

    We have no bibliographic references for this item. You can help adding them by using this form .

    If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.

    For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: Sarah Parker (email available below). General contact details of provider: http://www.inderscience.com/browse/index.php?journalID=58 .

    Please note that corrections may take a couple of weeks to filter through the various RePEc services.

    IDEAS is a RePEc service. RePEc uses bibliographic data supplied by the respective publishers.