2012 IEEE 31st International Performance Computing and Communications Conference (IPCCC) 2012
DOI: 10.1109/pccc.2012.6407750
|View full text |Cite
|
Sign up to set email alerts
|

HADEGA: A novel MPLS-based mitigation solution to handle network attacks

Abstract: Abstract-We present HADEGA, a novel adaptive mitigation solution to handle the impact of network attacks. By extracting information from network detection alerts, and build upon the Multiprotocol Label Switching (MPLS) standard, the solution assigns labels and quality of service treatments to suspicious flows. As a result, those labeled flows are controlled and properly handled inside the core network of service providers. We conducted simulations in order to evaluate the efficiency of our approach. Results ar… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
9
0

Year Published

2013
2013
2020
2020

Publication Types

Select...
4
1

Relationship

2
3

Authors

Journals

citations
Cited by 8 publications
(9 citation statements)
references
References 29 publications
(36 reference statements)
0
9
0
Order By: Relevance
“…These dual schemes are achieved in MPLS through Traffic Engineering [5] and Differentiated Services [14] strengths. We presented in [16] HADEGA, a novel mitigation technique that benefits from these strengths to mitigate and reduce the impact of suspicious flows. In HADEGA, each MPLS domain is seen as a single packet forwarding component that first aggregates the suspicious flows, and second controls them (e.g., de-prioritizes their treatment or points them to a blackhole).…”
Section: Hadegamentioning
confidence: 99%
See 3 more Smart Citations
“…These dual schemes are achieved in MPLS through Traffic Engineering [5] and Differentiated Services [14] strengths. We presented in [16] HADEGA, a novel mitigation technique that benefits from these strengths to mitigate and reduce the impact of suspicious flows. In HADEGA, each MPLS domain is seen as a single packet forwarding component that first aggregates the suspicious flows, and second controls them (e.g., de-prioritizes their treatment or points them to a blackhole).…”
Section: Hadegamentioning
confidence: 99%
“…We model the management of threat contexts based on the construction of the original HADEGA proposal presented in [16]. This way, the contexts are based on the alert attributes: Impact Level (IL), and Confidence Level (CL).…”
Section: Threat Contextsmentioning
confidence: 99%
See 2 more Smart Citations
“…Most of the current automated Intrusion Response Systems (IRS)s are based on the risk assessment and the cost-sensitive analysis as detailed in [2][3][4]. They are still suffering from several drawbacks as described in [5]. Usually, they provide isolated response applied in a single Policy Enforcement Point (PEP) of the Information System.…”
Section: Introductionmentioning
confidence: 99%