Open Access Open Access  Restricted Access Subscription Access
Open Access Open Access Open Access  Restricted Access Restricted Access Subscription Access

Defending DoS Attacks Using a Puzzle-Based Approach and Tracing Back to the Attacker


Affiliations
1 St. Thomas Institute of Science and Technology, Kerala, India
2 Karunya University, Tamil Nadu, India
     

   Subscribe/Renew Journal


In today's world Denial-of-Service attacks have huge impact on network security. DoS attacks are usually launched to make the service of a system unavailable to a person who is authorized to use it. Several methods were introduced for defending Denial-of-Service attacks earlier. In our paper we propose a client-puzzle mechanism approach to defend DoS attacks. Here, intermediate routers can be used for issuing and solving network puzzles of various difficulty levels depending on the intensity of the attack. The target server will be protected by using an intermediate firewall router for issuing the puzzles;this will reduce the load over the server. Likewise intermediate proxy routers can be used for solving the puzzle. But furthermore, this proxy can also be a target of attack. This problem can be overcome by using a hybrid traceback mechanism for the attacking client. This technique helps to find out the attacking node and the router through which the attack packet was forwarded.

Keywords

Client-Puzzle Approach, Flooding DoS Attack, Game Theory, Nash Equilibrium, Trace-Back.
User
Subscription Login to verify subscription
Notifications
Font Size

Abstract Views: 189

PDF Views: 2




  • Defending DoS Attacks Using a Puzzle-Based Approach and Tracing Back to the Attacker

Abstract Views: 189  |  PDF Views: 2

Authors

Anup Mathew Abraham
St. Thomas Institute of Science and Technology, Kerala, India
Shweta Vincent
Karunya University, Tamil Nadu, India

Abstract


In today's world Denial-of-Service attacks have huge impact on network security. DoS attacks are usually launched to make the service of a system unavailable to a person who is authorized to use it. Several methods were introduced for defending Denial-of-Service attacks earlier. In our paper we propose a client-puzzle mechanism approach to defend DoS attacks. Here, intermediate routers can be used for issuing and solving network puzzles of various difficulty levels depending on the intensity of the attack. The target server will be protected by using an intermediate firewall router for issuing the puzzles;this will reduce the load over the server. Likewise intermediate proxy routers can be used for solving the puzzle. But furthermore, this proxy can also be a target of attack. This problem can be overcome by using a hybrid traceback mechanism for the attacking client. This technique helps to find out the attacking node and the router through which the attack packet was forwarded.

Keywords


Client-Puzzle Approach, Flooding DoS Attack, Game Theory, Nash Equilibrium, Trace-Back.