2019 IEEE Symposium on Security and Privacy (SP) 2019
DOI: 10.1109/sp.2019.00055
|View full text |Cite
|
Sign up to set email alerts
|

On the Feasibility of Rerouting-Based DDoS Defenses

Abstract: Large botnet-based flooding attacks have recently demonstrated unprecedented damage. However, the best-known end-to-end availability guarantees against flooding attacks require costly global-scale coordination among autonomous systems (ASes). A recent proposal called routing around congestion (or RAC) attempts to offer strong end-to-end availability to a selected critical flow by dynamically rerouting it to an uncongested detour path without requiring any inter-AS coordination.This paper presents an in-depth a… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
26
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
4
2

Relationship

0
6

Authors

Journals

citations
Cited by 24 publications
(26 citation statements)
references
References 32 publications
(44 reference statements)
0
26
0
Order By: Relevance
“…Our findings on the feasibility of steering return paths impact all security systems mentioned in Section II-C, including Nyx, LIFEGUARD, RAD, Waterfall of Liberty, and Feasible Nyx [52], [23], [50], [36], [60]. Notably, the claims made by systems that leverage BGP poisoning are more in line, but not an exact match, with the behavior of the live Internet.…”
Section: Security Ramifications and Takeawaysmentioning
confidence: 88%
See 4 more Smart Citations
“…Our findings on the feasibility of steering return paths impact all security systems mentioned in Section II-C, including Nyx, LIFEGUARD, RAD, Waterfall of Liberty, and Feasible Nyx [52], [23], [50], [36], [60]. Notably, the claims made by systems that leverage BGP poisoning are more in line, but not an exact match, with the behavior of the live Internet.…”
Section: Security Ramifications and Takeawaysmentioning
confidence: 88%
“…Despite their success in simulation and limited sample sizes in practice, these systems assumptions need expansion and further validation at a wider scale to be used effectively for network defense. Tran et al's [60] feasibility study of Nyx raises issues with poisoning needed to steer traffic, but fails to evaluate their assumptions via realworld active measurements. Instead, they rely on passive measurement and simulation.…”
Section: How Does Bgp Poisoning Impact the Internet's Security?mentioning
confidence: 99%
See 3 more Smart Citations