Download presentation
Presentation is loading. Please wait.
Published byPamela King Modified over 6 years ago
1
- Issues, Answers & A Comparison 江政祐 Henry, Cheng-You Chiang
A Divide-and-Conquer Strategy for Thwarting Distributed Denial of-Service Attacks - Issues, Answers & A Comparison 江政祐 Henry, Cheng-You Chiang
2
Agenda Abstract INTRODUCTION 2.1 Assumptions
2.2 Overview of AD and PAD 2.5 Analysis of False Positives 3.4 Gradual Deployment Considerations 4 SIMULATION AND RESULTS A Comparison
3
Abstract How does this scheme deal with the problem that, nowadays, there exist : Numerous DDoS attackers Scarce and expensive filter resources
4
INTRODUCTION Source of Ideas
FROM : Current Paper FROM: Optimal Filtering for DDoS Attacks
5
INTRODUCTION Mitigation techniques can be divided into two categories
FIRST To regard DDoS defense as a resource allocation problem effectively suppress attackers that generate traffic at a high rate high-rate legitimate traffic may be throttled, causing “collateral damage” not effective against low-rate DDoS attacks
6
INTRODUCTION Mitigation techniques can be divided into two categories
SECOND Two modules: an attack detection module and a packet filtering module The attack detection module is used to extract the characteristics of attack packets, i.e., “attack signatures,” such as source IP addresses or marked IP header values After the characteristics have been summarized, this information is used by the packet filtering module to filter malicious packets.
7
2.1 Assumptions How about the legitimate traffic from an attacking source !
8
2.2 Overview of AD and PAD - How to solve the LAN configuration problem
9
2.2 Overview of AD and PAD How to deal with the storage issue as topology gets larger !
10
2.5 Analysis of False Positives - How about MAC Spoofing !
IP address may not be spoofed, but MAC!
11
2.5 Analysis of False Positives - The Cause of false positives
12
3.4 Gradual Deployment Considerations
The same as an earlier mentioned : - How to deal with the storage issue as topology gets larger !
13
4 SIMULATION AND RESULTS
How about non-treelike multi-victim TOPOLOGY !
14
A Comparison - between my work & the paper
15
END
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.