Securing hybrid wired/mobile IP networks from TCP-flooding based denial-of-service attacks

Tarik Taleb, Hiroki Nishiyama, Nei Kato, Yoshiaki Nemoto

Research output: Chapter in Book/Report/Conference proceedingConference contribution

1 Citation (Scopus)

Abstract

Protection of Mobile IP networks from Denial-of-Service (DoS) attacks, a serious security threat in today's Internet, is a one major step toward making this paradigm a reality. The paper proposes a method to detect DoS attacks, issued from mobile users, in the vicinity of flooding sources and in early stages before they cripple the targeted system. The fundamental challenge in attack detection consists in distinguishing between simple flash events and DoS attacks so as not to deprive innocent users from having legitimate accesses. In the proposed mechanism, this distinction is based on the fact that legitimate TCP flows obey the congestion control protocol, whereas misbehaving sources remain unresponsive. Suspicious flows are sent a test feedback and are required to decrease their sending rates. Legitimacy of such flows is decided based on their responsiveness. The scheme performance is evaluated through a set of simulations and encouraging results are obtained: short detection latency and high detection accuracy.

Original languageEnglish
Title of host publicationGLOBECOM'05
Subtitle of host publicationIEEE Global Telecommunications Conference, 2005
Pages2907-2911
Number of pages5
DOIs
Publication statusPublished - 2005 Dec 1
EventGLOBECOM'05: IEEE Global Telecommunications Conference, 2005 - St. Louis, MO, United States
Duration: 2005 Nov 282005 Dec 2

Publication series

NameGLOBECOM - IEEE Global Telecommunications Conference
Volume5

Other

OtherGLOBECOM'05: IEEE Global Telecommunications Conference, 2005
CountryUnited States
CitySt. Louis, MO
Period05/11/2805/12/2

ASJC Scopus subject areas

  • Engineering(all)

Fingerprint Dive into the research topics of 'Securing hybrid wired/mobile IP networks from TCP-flooding based denial-of-service attacks'. Together they form a unique fingerprint.

Cite this