Proactive server roaming for mitigating Denial-of-Service attacks

Sherif M. Khattab, Chatree Sangpachatanaruk, Rami Melhem, Daniel Mossé, Taieb Znati

Research output: Chapter in Book/Report/Conference proceedingConference contribution

28 Citations (Scopus)

Abstract

We propose a framework based on proactive server roaming to mitigate the effects of Denial-of-Service (DoS) attacks. The active server proactively changes its location within a pool of servers to defend against unpredictable and undetectable attacks. Only legitimate clients can follow the active server as it roams. We present algorithms that are secure, distributed, randomized, and adaptive for triggering the roaming and determining the next server to roam to. We propose some modifications to the state recovery process of existing TCP connection-migration schemes to suit roaming. Preliminary experiments in a FreeBSD network show that the overhead of server roaming is small, in terms of response time, in the absence of attacks. Further, during an attack, roaming significantly improves the response time.

Original languageEnglish
Title of host publicationProceedings, ITRE 2003 - International Conference on Information Technology
Subtitle of host publicationResearch and Education
Pages286-290
Number of pages5
DOIs
Publication statusPublished - 2003
Externally publishedYes
Event2003 International Conference on Information Technology: Research and Education, ITRE 2003 - Newark, NJ, United States
Duration: Aug 11 2003Aug 13 2003

Publication series

NameProceedings, ITRE 2003 - International Conference on Information Technology: Research and Education

Conference

Conference2003 International Conference on Information Technology: Research and Education, ITRE 2003
Country/TerritoryUnited States
CityNewark, NJ
Period8/11/038/13/03

Keywords

  • DoS attack mitigation
  • Network security

ASJC Scopus subject areas

  • Information Systems
  • Education

Fingerprint

Dive into the research topics of 'Proactive server roaming for mitigating Denial-of-Service attacks'. Together they form a unique fingerprint.

Cite this