Defense against bandwidth attacks with traffic resource management

Hongli Luo, Mei Ling Shyu

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

In this paper, a framework is proposed to defend against Internet bandwidth attacks with traffic resource management to provide service for legitimate users. Denial of Service (DoS) is one of the major bandwidth attacks in the Internet. A DoS attack generates a large volume of traffic to consume the network bandwidth and degrade the service that legitimate users can obtain. Incoming traffic to the server is monitored and features are extracted for each connection. Anomaly detection technique is used to detect the abnormal traffic. Based on the outcome of the anomaly detection technique, the proposed resource management approach allocates suitable bandwidth. With the early detection of DoS, the attack traffic can be isolated. The bandwidth occupied by the attack can be reduced and protected for the legitimate users. Performances are compared under different attack loads with and without resource management. Simulation results show that bandwidth can be greatly saved from an attack and the service for the legitimate users can be protected during an attack.

Original languageEnglish (US)
Title of host publication2007 IEEE International Conference on Information Reuse and Integration, IEEE IRI-2007
Pages190-195
Number of pages6
DOIs
StatePublished - Dec 1 2007
Event2007 IEEE International Conference on Information Reuse and Integration, IEEE IRI-2007 - Las Vegas, NV, United States
Duration: Aug 13 2007Aug 15 2007

Publication series

Name2007 IEEE International Conference on Information Reuse and Integration, IEEE IRI-2007

Other

Other2007 IEEE International Conference on Information Reuse and Integration, IEEE IRI-2007
CountryUnited States
CityLas Vegas, NV
Period8/13/078/15/07

ASJC Scopus subject areas

  • Information Systems
  • Information Systems and Management
  • Electrical and Electronic Engineering

Fingerprint Dive into the research topics of 'Defense against bandwidth attacks with traffic resource management'. Together they form a unique fingerprint.

Cite this