Preventing Distributed Denial-of-Service Flooding Attacks with Dynamic Path Identifiers

  • Hongbin Luo
  • , Zhe Chen
  • , Jiawei Li
  • , Athanasios V. Vasilakos

Research output: Contribution to journalArticlepeer-review

Abstract

In recent years, there are increasing interests in using path identifiers (PIDs ) as inter-domain routing objects. However, the PIDs used in existing approaches are static, which makes it easy for attackers to launch the distributed denial-of-service (DDoS) flooding attacks. To address this issue, in this paper, we present the design, implementation, and evaluation of dynamic PID (D-PID), a framework that uses PIDs negotiated between the neighboring domains as inter-domain routing objects. In D-PID, the PID of an inter-domain path connecting the two domains is kept secret and changes dynamically. We describe in detail how neighboring domains negotiate PIDs and how to maintain ongoing communications when PIDs change. We build a 42-node prototype comprised of six domains to verify D-PID's feasibility and conduct extensive simulations to evaluate its effectiveness and cost. The results from both simulations and experiments show that D-PID can effectively prevent DDoS attacks.

Original languageEnglish
Article number7888484
Pages (from-to)1801-1815
Number of pages15
JournalIEEE Transactions on Information Forensics and Security
Volume12
Issue number8
DOIs
StatePublished - Aug 2017

Keywords

  • Distributed denial-of-service (DDoS) attacks
  • Inter-domain routing
  • Path identifiers
  • Security

Fingerprint

Dive into the research topics of 'Preventing Distributed Denial-of-Service Flooding Attacks with Dynamic Path Identifiers'. Together they form a unique fingerprint.

Cite this