skip to main content
article

A DoS-limiting network architecture

Published: 22 August 2005 Publication History

Abstract

We present the design and evaluation of TVA, a network architecture that limits the impact of Denial of Service (DoS) floods from the outset. Our work builds on earlier work on capabilities in which senders obtain short-term authorizations from receivers that they stamp on their packets. We address the full range of possible attacks against communication between pairs of hosts, including spoofed packet floods, network and host bottlenecks, and router state exhaustion. We use simulation to show that attack traffic can only degrade legitimate traffic to a limited extent, significantly outperforming previously proposed DoS solutions. We use a modified Linux kernel implementation to argue that our design can run on gigabit links using only inexpensive off-the-shelf hardware. Our design is also suitable for transition into practice, providing incremental benefit for incremental deployment.

References

[1]
D. Andersen. Mayday: Distributed Filtering for Internet Services. In 3rd Usenix USITS, 2003.
[2]
T. Anderson, T. Roscoe, and D. Wetherall. Preventing Internet Denial of Service with Capabilities. In Proc. HotNets-II, Nov. 2003.
[3]
K. Argyraki and D. Cheriton. Active Internet Traffic Filtering: Real-Time Response to Denial-of-Service Attacks. In USENIX 2005, 2005.
[4]
DDoS attacks still pose threat to Internet. BizReport, 11/4/03.
[5]
Extortion via DDoS on the rise. Network World, 5/16/05.
[6]
A. Demers, S. Keshav, and S. Shenker. Analysis and Simulation of a Fair Queueing Algorithm. In ACM SIGCOMM, 1989.
[7]
P. Druschel and G. Banga. Lazy Receiver Processing (LRP): A Network Subsystem Architecture for Server Systems. In 2nd OSDI, 1996.
[8]
P. Ferguson and D. Senie. Network Ingress Filtering: Defeating Denial of Service Attacks that Employ IP Source Address Spoofing. Internet RFC 2827, 2000.
[9]
M. Handley and A. Greenhalgh. Steps Towards a DoS-Resistant Internet Architecture. In ACM SIGCOMM Work-shop on Future Directions in Network Architecture (FDNA), 2004.
[10]
J. Ioannidis and S. Bellovin. Implementing Pushback: Router-Based Defense Against DoS Attacks. In NDSS, 2002.
[11]
S. Kandula, D. Katabi, M. Jacob, and A. Berger. Botz-4-sale: Surviving organized DDoS attacks that mimic flash crowds. In 2nd NSDI, May 2005.
[12]
A. Keromytis, V. Misra, and D. Rubenstein. SOS: Secure Overlay Services. In ACM SIGCOMM, 2002.
[13]
E. Kohler, R. Morris, B. Chen, J. Jannotti, and M. F. Kaashoek. The Click Modular Router. ACM Transactions on Computer Systems, 18(3):263--297, Aug. 2000.
[14]
K. Lakshminarayanan, D. Adkins, A. Perrig, and I. Stoica. Taming IP Packet Flooding Attacks. In Proc. HotNets-II, 2003.
[15]
S. Machiraju, M. Seshadri, and I. Stoica. A Scalable and Robust Solution for Bandwidth Allocation . In IWQoS'02, 2002.
[16]
R. Mahajan, S. Bellovin, S. Floyd, J. Ioannidis, V. Paxson, and S. Shenker. Controlling High Bandwidth Aggregates in the Network. Computer Communications Review, 32(3), July 2002.
[17]
A. J. Menezes, P. C. van Oorschot, and S. A. Vanstone. Handbook of applied cryptography, chapter 9. CRC Pres, 1997.
[18]
D. Moore, G. Voelker, and S. Savage. Inferring Internet Denial of Service Activity. In Usenix Security Symposium 2001, 2001.
[19]
http://www.netfilter.org/.
[20]
S. Savage, D. Wetherall, A. Karlin, and T. Anderson. Practical Network Support for IP Traceback. In ACM SIGCOMM, 2000.
[21]
A. Snoeren, C. Partridge, L. Sanchez, C. Jones, F. Tchakountio, S. Kent, and W. Strayer. Hash-Based IP Traceback. In ACM SIGCOMM, 2001.
[22]
D. Song and A. Perrig. Advance and Authenticated Marking Schemes for IP Traceback. In Proc. IEEE Infocom, 2001.
[23]
I. Stoica, S. Shenker, and H. Zhang. Core-Stateless Fair Queueing: Achieving Approximately Fair Bandwidth Allocations in High Speed Networks. In ACM SIGCOMM, 1998.
[24]
A. Yaar, A. Perrig, and D. Song. Pi: A Path Identification Mechanism to Defend Against DDoS Attacks. In IEEE Symposium on Security and Privacy, 2003.
[25]
A. Yaar, A. Perrig, and D. Song. SIFF: A Stateless Internet Flow Filter to Mitigate DDoS Flooding Attacks. In IEEE Symposium on Security and Privacy, 2004.

Cited By

View all
  • (2025)Revealing Protocol Architecture’s Design Patterns in the Volumetric DDoS Defense Design SpaceIEEE Communications Surveys & Tutorials10.1109/COMST.2024.339225327:1(353-371)Online publication date: 1-Feb-2025
  • (2025)Collaborative DoS DefensesEncyclopedia of Cryptography, Security and Privacy10.1007/978-3-030-71522-9_263(374-378)Online publication date: 8-Jan-2025
  • (2024)GeckoNet - Self-Healing SDN Framework2024 23rd RoEduNet Conference: Networking in Education and Research (RoEduNet)10.1109/RoEduNet64292.2024.10722172(1-6)Online publication date: 19-Sep-2024
  • Show More Cited By

Index Terms

  1. A DoS-limiting network architecture

      Recommendations

      Comments

      Information & Contributors

      Information

      Published In

      cover image ACM SIGCOMM Computer Communication Review
      ACM SIGCOMM Computer Communication Review  Volume 35, Issue 4
      Proceedings of the 2005 conference on Applications, technologies, architectures, and protocols for computer communications
      October 2005
      324 pages
      ISSN:0146-4833
      DOI:10.1145/1090191
      Issue’s Table of Contents
      • cover image ACM Conferences
        SIGCOMM '05: Proceedings of the 2005 conference on Applications, technologies, architectures, and protocols for computer communications
        August 2005
        350 pages
        ISBN:1595930094
        DOI:10.1145/1080091
      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      Published: 22 August 2005
      Published in SIGCOMM-CCR Volume 35, Issue 4

      Check for updates

      Author Tags

      1. denial-of-service
      2. internet

      Qualifiers

      • Article

      Contributors

      Other Metrics

      Bibliometrics & Citations

      Bibliometrics

      Article Metrics

      • Downloads (Last 12 months)187
      • Downloads (Last 6 weeks)22
      Reflects downloads up to 05 Mar 2025

      Other Metrics

      Citations

      Cited By

      View all
      • (2025)Revealing Protocol Architecture’s Design Patterns in the Volumetric DDoS Defense Design SpaceIEEE Communications Surveys & Tutorials10.1109/COMST.2024.339225327:1(353-371)Online publication date: 1-Feb-2025
      • (2025)Collaborative DoS DefensesEncyclopedia of Cryptography, Security and Privacy10.1007/978-3-030-71522-9_263(374-378)Online publication date: 8-Jan-2025
      • (2024)GeckoNet - Self-Healing SDN Framework2024 23rd RoEduNet Conference: Networking in Education and Research (RoEduNet)10.1109/RoEduNet64292.2024.10722172(1-6)Online publication date: 19-Sep-2024
      • (2024)Potential smart grid vulnerabilities to cyber attacks: Current threats and existing mitigation strategiesHeliyon10.1016/j.heliyon.2024.e3798010:19(e37980)Online publication date: Oct-2024
      • (2022)Systematic Analysis of DDoS Attacks in Blockchain2022 24th International Conference on Advanced Communication Technology (ICACT)10.23919/ICACT53585.2022.9728816(132-137)Online publication date: 13-Feb-2022
      • (2022)SurgeProtectorProceedings of the ACM SIGCOMM 2022 Conference10.1145/3544216.3544250(723-738)Online publication date: 22-Aug-2022
      • (2022)Coda: Runtime Detection of Application-Layer CPU-Exhaustion DoS Attacks in ContainersIEEE Transactions on Services Computing10.1109/TSC.2022.3194266(1-12)Online publication date: 2022
      • (2022)Preventing DDoS Flooding Attacks With Cryptographic Path Identifiers in Future InternetIEEE Transactions on Network and Service Management10.1109/TNSM.2022.314751119:2(1690-1704)Online publication date: Jun-2022
      • (2022)DoCile: Taming Denial-of-Capability Attacks in Inter-Domain Communications2022 IEEE/ACM 30th International Symposium on Quality of Service (IWQoS)10.1109/IWQoS54832.2022.9812889(1-10)Online publication date: 10-Jun-2022
      • (2022)Consent Routing: Towards Bilaterally Trusted Communication Paths2022 IEEE 42nd International Conference on Distributed Computing Systems (ICDCS)10.1109/ICDCS54860.2022.00122(1247-1257)Online publication date: Jul-2022
      • Show More Cited By

      View Options

      Login options

      View options

      PDF

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader

      Figures

      Tables

      Media

      Share

      Share

      Share this Publication link

      Share on social media