Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security 2021
DOI: 10.1145/3460120.3485385
|View full text |Cite
|
Sign up to set email alerts
|

United We Stand: Collaborative Detection and Mitigation of Amplification DDoS Attacks at Scale

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
5
1
1

Relationship

0
7

Authors

Journals

citations
Cited by 21 publications
(3 citation statements)
references
References 35 publications
0
3
0
Order By: Relevance
“…During a mitigation, the DOTS server and client regularly share DDoS related telemetry with each other to refine the mitigation actions. Another recent work, DXP [158], allows multiple ISPs to share DDoS telemetry such as reflector server IPs, victim IPs and attack traffic volume with each other via a publisher/subscriber system to achieve better level of detection and mitigation. Rodrigues et al [159] proposed to use the blockchain systems as a distributed immutable database to signal and share the DDoS detection results, and mitigation information.…”
Section: D32 High-level Information Exchangementioning
confidence: 99%
“…During a mitigation, the DOTS server and client regularly share DDoS related telemetry with each other to refine the mitigation actions. Another recent work, DXP [158], allows multiple ISPs to share DDoS telemetry such as reflector server IPs, victim IPs and attack traffic volume with each other via a publisher/subscriber system to achieve better level of detection and mitigation. Rodrigues et al [159] proposed to use the blockchain systems as a distributed immutable database to signal and share the DDoS detection results, and mitigation information.…”
Section: D32 High-level Information Exchangementioning
confidence: 99%
“…Another type of DDoS mitigation involves BGP routing the victim networks, either temporarily during the attack or permanently, through a service provider that offers DDoS protection services, for example, Akamai, Arbor, Cloudflare [43]. [49] proposes a DXP (DDoS Information Exchange Point) that encourages collaboration between networks (IXPs) in detecting and mitigating DDoS attacks closer to the source, as such detection requires visibility at multiple locations. An ISP may also use a hidden Distributed Reflection DoS (DRDoS) honeypot [27] to filter out the unwanted traffic in their networks [52].…”
Section: Related Workmentioning
confidence: 99%
“…As the intensity, capacity, and duration of Denial of Service (DoS) attacks increase, network operators constantly look for countermeasures [26]. There are many DDoS mitigation methods, each having different levels of complexity, cost, and efficiency [49,50]. The most common are blackholing, clean pipe, content delivery networks (CDN) attack dilution, and antiDDoS proxy.…”
Section: Introductionmentioning
confidence: 99%