This Article 
   
 Share 
   
 Bibliographic References 
   
 Add to: 
 
Digg
Furl
Spurl
Blink
Simpy
Google
Del.icio.us
Y!MyWeb
 
 Search 
   
Second IEEE International Symposium on Network Computing and Applications
Source-End DDoS Defense
Cambridge, Massachusette
April 16-April 18
ISBN: 0-7695-1938-5
Jelena Mirkovic, University of California Los Angeles
Gregory Prier, University of California Los Angeles
Peter Reiher, University of California Los Angeles
A successful source-end DDoS defense enables early suppression of the attack and minimizes collateral damage. However, such an approach faces many challenges: (a) distributing the attack hinders detection; (b) defense systems must guarantee good service to legitimate traffic during the attack; and (c) deployment costs and false alarm levels must be sufficiently small and effectiveness must be high to provide deployment incentive. We discuss each of the challenges and describe one successful design of a source-end DDoS defense system - the D-WARD system. D-WARD was implemented in a Linux router. We include experimental results to illustrate D-WARD?s performance.
Citation:
Jelena Mirkovic, Gregory Prier, Peter Reiher, "Source-End DDoS Defense," nca, pp.171, Second IEEE International Symposium on Network Computing and Applications, 2003
Usage of this product signifies your acceptance of the Terms of Use.