distributed denial of service attacks by information sharing. We assume with global
information, we can defense DDoS attacks with higher accuracy. Compared to the ex-
isting solutions, our contribution is to provide a distributed proactive DDoS detection
and defense mechanism. Our approach continuously monitors the network. When an at-
tack begins, individual defense nodes drop attack traffic identified according to the local
information and mitigate load to the target victim. However, as local detection has high
false alarm rate, the legitimate traffic will dropped as well with high rate. By correlating
the attack information of each individual nodes, our scheme can get more information
about the network attack thus can defense against DDoS attacks more effectively.
References
1. A. Akella, A. Bharambe, M. Reiter, and S. Seshan. Detecting DDoS attacks on ISP networks.
In ACM SIGMOD Workshop on Management and Processing of Data Streams, pages 20–23,
San Diego, CA, 2003.
2. D. Dittrich. Distributed denial of service (DDoS) attacks/tools, 2004.
http://staff.washington.edu/dittrich/misc/ddos/.
3. C. Estan and G. Varghese. New directions in traffic measurement and accounting. In Pro-
ceesings of SIGCOMM 2002, pages 270–313, Pittsburgh, PA, USA, 2002.
4. T. M. Gil and M. Poleto. Multops: a data-structure for bandwidth attack detection. In Pro-
ceedings of 10th Usenix Security Symposium, pages 23–28, Washington, D.C., USA, August
2001.
5. I. Gupta, K. P. Birman, and R. van Renesse. Fighting fire with fire: using randomized gossip
to combat stochastic scalability limits. Special Issue Journal Quality and Reliability En-
gineering International:Secure, Reliable Computer and Network Systems, 18(3):165–184,
May 2002.
6. Q. Huang, H. Kobayashi, and B. Liu. Analysis of a new form of distributed denial of service
attack. In Proceedings of CISS03, the 37th Annual Conference on Information Science and
Systems, Johns Hopkins University, Baltimore, Maryland, March 2003.
7. J. Ioannidis and S. M. Bellovin. Implementing pushback: Router-based defense against
DDoS attacks. In Proceedings of Network and Distributed System Security Symposium,
NDSS ’02, pages 100–108, Reston, VA, USA, February 2002.
8. R. M. Karp, C. Schindelhauer, S. Shenker, and B. Vocking. Randomized rumor spreading.
In IEEE Symposium on Foundations of Computer Science, pages 565–574, 2000.
9. D. Kempe, A. Dobra, and J. Gehrke. Computing aggregate information using gossip. In
in Proceedings of the 44th Annual IEEE Symposium on Foundations of Computer Science,
Cambridge, MA, October 2003.
10. M. Lin and K. Marzullo. Directional gossip: gossip in a wide area network. In Proceedings of
Dependable Computing - Third European Dependable Computing Conference, pages 364–
379, Berlin, Germany, 1999.
11. J. Mirkovic, G. Prier, and P. Reiher. Attacking DDoS at the source. In Proceedings of ICNP
2002, pages 312–321, Paris, France, November 2002.
12. C. Papadopoulos, R. Lindell, J. Mehringer, A. Hussain, and R. Govindan. Cossack: Coordi-
nated suppression of simultaneous attacks. In DARPA Information Survivability Conference
and Exposition, volume 1, pages 2–13, Washington, DC, April 2003.
13. R. Renesse, K. Birman, and W. Vogels. Astrolabe: A robust and scalable technology for dis-
tributed system monitoring, management, and data mining. ACM Transactions on Computer
Systems, 21(2):164–206, May 2003.
14. M. Roesch. The snort network intrusion detection system, 2002. http://www.snort.org.
122