File Download
Links for fulltext
(May Require Subscription)
- Publisher Website: 10.1109/ICDCSW.2005.84
- Scopus: eid_2-s2.0-80052201538
- Find via
Supplementary
-
Citations:
- Scopus: 0
- Appears in Collections:
Conference Paper: MAFIC: adaptive packet dropping for cutting malicious flows to push back DDoS attacks
Title | MAFIC: adaptive packet dropping for cutting malicious flows to push back DDoS attacks |
---|---|
Authors | |
Keywords | Packet dropping policy DDoS defense Malicious flows Probing Duplicated ACKs |
Issue Date | 2005 |
Publisher | IEEE. |
Citation | The 25th International Conference on Distributed Computing Systems Workshop Proceedings, Columbus, Ohio, USA, 6-10 June 2005, p. 123-129 How to Cite? |
Abstract | In this paper, we propose a new approach called MAFIC (malicious flow identification and cutoff) to support adaptive packet dropping to fend off DDoS attacks. MAFIC works by judiciously issuing lightweight probes to flow sources to check if they are legitimate. Through such probing, MAFIC would drop malicious attack packets with high accuracy while minimizes the loss on legitimate traffic flows. Our NS-2 based simulation indicates that MAFIC algorithm drops packets from unresponsive potential attack flows with an accuracy as high as 99% and reduces the loss of legitimate flows to less than 3%. Furthermore, the false positive and negative rates are low-only around 1% for a majority of the cases. |
Persistent Identifier | http://hdl.handle.net/10722/45821 |
ISSN |
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Chen, Y | en_HK |
dc.contributor.author | Kwok, YK | en_HK |
dc.contributor.author | Hwang, K | en_HK |
dc.date.accessioned | 2007-10-30T06:36:17Z | - |
dc.date.available | 2007-10-30T06:36:17Z | - |
dc.date.issued | 2005 | en_HK |
dc.identifier.citation | The 25th International Conference on Distributed Computing Systems Workshop Proceedings, Columbus, Ohio, USA, 6-10 June 2005, p. 123-129 | en_HK |
dc.identifier.issn | 1533-9610 | en_HK |
dc.identifier.uri | http://hdl.handle.net/10722/45821 | - |
dc.description.abstract | In this paper, we propose a new approach called MAFIC (malicious flow identification and cutoff) to support adaptive packet dropping to fend off DDoS attacks. MAFIC works by judiciously issuing lightweight probes to flow sources to check if they are legitimate. Through such probing, MAFIC would drop malicious attack packets with high accuracy while minimizes the loss on legitimate traffic flows. Our NS-2 based simulation indicates that MAFIC algorithm drops packets from unresponsive potential attack flows with an accuracy as high as 99% and reduces the loss of legitimate flows to less than 3%. Furthermore, the false positive and negative rates are low-only around 1% for a majority of the cases. | en_HK |
dc.format.extent | 163269 bytes | - |
dc.format.extent | 3564 bytes | - |
dc.format.mimetype | application/pdf | - |
dc.format.mimetype | text/plain | - |
dc.language | eng | en_HK |
dc.publisher | IEEE. | en_HK |
dc.relation.ispartof | International Conference on Distributed Computing Systems Workshop Proceedings | - |
dc.rights | ©2005 IEEE. Personal use of this material is permitted. However, permission to reprint/republish this material for advertising or promotional purposes or for creating new collective works for resale or redistribution to servers or lists, or to reuse any copyrighted component of this work in other works must be obtained from the IEEE. | - |
dc.subject | Packet dropping policy | en_HK |
dc.subject | DDoS defense | en_HK |
dc.subject | Malicious flows | en_HK |
dc.subject | Probing | en_HK |
dc.subject | Duplicated ACKs | en_HK |
dc.title | MAFIC: adaptive packet dropping for cutting malicious flows to push back DDoS attacks | en_HK |
dc.type | Conference_Paper | en_HK |
dc.identifier.openurl | http://library.hku.hk:4550/resserv?sid=HKU:IR&issn=1533-9610&volume=&spage=123&epage=129&date=2005&atitle=MAFIC:+adaptive+packet+dropping+for+cutting+malicious+flows+to+push+back+DDoS+attacks | en_HK |
dc.description.nature | published_or_final_version | en_HK |
dc.identifier.doi | 10.1109/ICDCSW.2005.84 | en_HK |
dc.identifier.scopus | eid_2-s2.0-80052201538 | - |
dc.identifier.hkuros | 105760 | - |