Keeping Denial-of-Service Attackers in the Dark View Full Text


Ontology type: schema:Chapter      Open Access: True


Chapter Info

DATE

2005

AUTHORS

Gal Badishi , Amir Herzberg , Idit Keidar

ABSTRACT

We consider the problem of overcoming (Distributed) Denial of Service (DoS) attacks by realistic adversaries that can eavesdrop on messages, or parts thereof, but with some delay. We show a protocol that mitigates DoS attacks by eavesdropping adversaries, using only available, efficient packet filtering mechanisms based mainly on (addresses and) port numbers. Our protocol avoids the use of fixed ports, and instead performs ‘pseudo-random port hopping’. We model the underlying packet-filtering services and define measures for the capabilities of the adversary and for the success rate of the protocol. Using these, we analyze the proposed protocol, and show that it provides effective DoS prevention for realistic attack and deployment scenarios. More... »

PAGES

18-32

Book

TITLE

Distributed Computing

ISBN

978-3-540-29163-3
978-3-540-32075-3

Identifiers

URI

http://scigraph.springernature.com/pub.10.1007/11561927_4

DOI

http://dx.doi.org/10.1007/11561927_4

DIMENSIONS

https://app.dimensions.ai/details/publication/pub.1000092912


Indexing Status Check whether this publication has been indexed by Scopus and Web Of Science using the SN Indexing Status Tool
Incoming Citations Browse incoming citations for this publication using opencitations.net

JSON-LD is the canonical representation for SciGraph data.

TIP: You can open this SciGraph record using an external JSON-LD service: JSON-LD Playground Google SDTT

[
  {
    "@context": "https://springernature.github.io/scigraph/jsonld/sgcontext.json", 
    "about": [
      {
        "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/10", 
        "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
        "name": "Technology", 
        "type": "DefinedTerm"
      }, 
      {
        "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/1005", 
        "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
        "name": "Communications Technologies", 
        "type": "DefinedTerm"
      }
    ], 
    "author": [
      {
        "affiliation": {
          "alternateName": "The Technion Department of Electrical Engineering", 
          "id": "http://www.grid.ac/institutes/None", 
          "name": [
            "The Technion Department of Electrical Engineering"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Badishi", 
        "givenName": "Gal", 
        "id": "sg:person.011657273253.11", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.011657273253.11"
        ], 
        "type": "Person"
      }, 
      {
        "affiliation": {
          "alternateName": "Department of Computer Science, Bar Ilan University", 
          "id": "http://www.grid.ac/institutes/grid.22098.31", 
          "name": [
            "Department of Computer Science, Bar Ilan University"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Herzberg", 
        "givenName": "Amir", 
        "id": "sg:person.016522007577.47", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.016522007577.47"
        ], 
        "type": "Person"
      }, 
      {
        "affiliation": {
          "alternateName": "The Technion Department of Electrical Engineering", 
          "id": "http://www.grid.ac/institutes/None", 
          "name": [
            "The Technion Department of Electrical Engineering"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Keidar", 
        "givenName": "Idit", 
        "id": "sg:person.07674464077.03", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.07674464077.03"
        ], 
        "type": "Person"
      }
    ], 
    "datePublished": "2005", 
    "datePublishedReg": "2005-01-01", 
    "description": "We consider the problem of overcoming (Distributed) Denial of Service (DoS) attacks by realistic adversaries that can eavesdrop on messages, or parts thereof, but with some delay. We show a protocol that mitigates DoS attacks by eavesdropping adversaries, using only available, efficient packet filtering mechanisms based mainly on (addresses and) port numbers. Our protocol avoids the use of fixed ports, and instead performs \u2018pseudo-random port hopping\u2019. We model the underlying packet-filtering services and define measures for the capabilities of the adversary and for the success rate of the protocol. Using these, we analyze the proposed protocol, and show that it provides effective DoS prevention for realistic attack and deployment scenarios.", 
    "editor": [
      {
        "familyName": "Fraigniaud", 
        "givenName": "Pierre", 
        "type": "Person"
      }
    ], 
    "genre": "chapter", 
    "id": "sg:pub.10.1007/11561927_4", 
    "inLanguage": "en", 
    "isAccessibleForFree": true, 
    "isPartOf": {
      "isbn": [
        "978-3-540-29163-3", 
        "978-3-540-32075-3"
      ], 
      "name": "Distributed Computing", 
      "type": "Book"
    }, 
    "keywords": [
      "service attackers", 
      "service attacks", 
      "realistic adversaries", 
      "DoS prevention", 
      "realistic attacks", 
      "efficient packet", 
      "port numbers", 
      "deployment scenarios", 
      "adversary", 
      "attacks", 
      "denial", 
      "protocol", 
      "attacker", 
      "packets", 
      "success rate", 
      "messages", 
      "scenarios", 
      "services", 
      "capability", 
      "ports", 
      "delay", 
      "prevention", 
      "number", 
      "use", 
      "measures", 
      "rate", 
      "part", 
      "mechanism", 
      "dark", 
      "problem", 
      "pseudo-random port", 
      "packet-filtering services", 
      "effective DoS prevention"
    ], 
    "name": "Keeping Denial-of-Service Attackers in the Dark", 
    "pagination": "18-32", 
    "productId": [
      {
        "name": "dimensions_id", 
        "type": "PropertyValue", 
        "value": [
          "pub.1000092912"
        ]
      }, 
      {
        "name": "doi", 
        "type": "PropertyValue", 
        "value": [
          "10.1007/11561927_4"
        ]
      }
    ], 
    "publisher": {
      "name": "Springer Nature", 
      "type": "Organisation"
    }, 
    "sameAs": [
      "https://doi.org/10.1007/11561927_4", 
      "https://app.dimensions.ai/details/publication/pub.1000092912"
    ], 
    "sdDataset": "chapters", 
    "sdDatePublished": "2022-01-01T19:13", 
    "sdLicense": "https://scigraph.springernature.com/explorer/license/", 
    "sdPublisher": {
      "name": "Springer Nature - SN SciGraph project", 
      "type": "Organization"
    }, 
    "sdSource": "s3://com-springernature-scigraph/baseset/20220101/entities/gbq_results/chapter/chapter_231.jsonl", 
    "type": "Chapter", 
    "url": "https://doi.org/10.1007/11561927_4"
  }
]
 

Download the RDF metadata as:  json-ld nt turtle xml License info

HOW TO GET THIS DATA PROGRAMMATICALLY:

JSON-LD is a popular format for linked data which is fully compatible with JSON.

curl -H 'Accept: application/ld+json' 'https://scigraph.springernature.com/pub.10.1007/11561927_4'

N-Triples is a line-based linked data format ideal for batch operations.

curl -H 'Accept: application/n-triples' 'https://scigraph.springernature.com/pub.10.1007/11561927_4'

Turtle is a human-readable linked data format.

curl -H 'Accept: text/turtle' 'https://scigraph.springernature.com/pub.10.1007/11561927_4'

RDF/XML is a standard XML format for linked data.

curl -H 'Accept: application/rdf+xml' 'https://scigraph.springernature.com/pub.10.1007/11561927_4'


 

This table displays all metadata directly associated to this object as RDF triples.

110 TRIPLES      23 PREDICATES      59 URIs      52 LITERALS      7 BLANK NODES

Subject Predicate Object
1 sg:pub.10.1007/11561927_4 schema:about anzsrc-for:10
2 anzsrc-for:1005
3 schema:author N19e42d13d7af4653a0c4d6bf6f6ae79e
4 schema:datePublished 2005
5 schema:datePublishedReg 2005-01-01
6 schema:description We consider the problem of overcoming (Distributed) Denial of Service (DoS) attacks by realistic adversaries that can eavesdrop on messages, or parts thereof, but with some delay. We show a protocol that mitigates DoS attacks by eavesdropping adversaries, using only available, efficient packet filtering mechanisms based mainly on (addresses and) port numbers. Our protocol avoids the use of fixed ports, and instead performs ‘pseudo-random port hopping’. We model the underlying packet-filtering services and define measures for the capabilities of the adversary and for the success rate of the protocol. Using these, we analyze the proposed protocol, and show that it provides effective DoS prevention for realistic attack and deployment scenarios.
7 schema:editor N011a21ff346e43c4bf3d5c21a7f657e7
8 schema:genre chapter
9 schema:inLanguage en
10 schema:isAccessibleForFree true
11 schema:isPartOf N5c4d54b32d7a411f932b6124174f5e21
12 schema:keywords DoS prevention
13 adversary
14 attacker
15 attacks
16 capability
17 dark
18 delay
19 denial
20 deployment scenarios
21 effective DoS prevention
22 efficient packet
23 measures
24 mechanism
25 messages
26 number
27 packet-filtering services
28 packets
29 part
30 port numbers
31 ports
32 prevention
33 problem
34 protocol
35 pseudo-random port
36 rate
37 realistic adversaries
38 realistic attacks
39 scenarios
40 service attackers
41 service attacks
42 services
43 success rate
44 use
45 schema:name Keeping Denial-of-Service Attackers in the Dark
46 schema:pagination 18-32
47 schema:productId N2c72d5716bad4208a4d1e83118478685
48 Na8139156477342bdb98fbc1faef49c3c
49 schema:publisher N90f6ccaec8c14efeabf763c738bc3747
50 schema:sameAs https://app.dimensions.ai/details/publication/pub.1000092912
51 https://doi.org/10.1007/11561927_4
52 schema:sdDatePublished 2022-01-01T19:13
53 schema:sdLicense https://scigraph.springernature.com/explorer/license/
54 schema:sdPublisher N5a28e9de11644ccaa2c0d97aecc1fada
55 schema:url https://doi.org/10.1007/11561927_4
56 sgo:license sg:explorer/license/
57 sgo:sdDataset chapters
58 rdf:type schema:Chapter
59 N011a21ff346e43c4bf3d5c21a7f657e7 rdf:first N22b768c917874d918c5f37dcb6c15c4f
60 rdf:rest rdf:nil
61 N19e42d13d7af4653a0c4d6bf6f6ae79e rdf:first sg:person.011657273253.11
62 rdf:rest Na282a311c2264cc08244a4b9b798883a
63 N22b768c917874d918c5f37dcb6c15c4f schema:familyName Fraigniaud
64 schema:givenName Pierre
65 rdf:type schema:Person
66 N2c72d5716bad4208a4d1e83118478685 schema:name dimensions_id
67 schema:value pub.1000092912
68 rdf:type schema:PropertyValue
69 N4f1503ec2fb740e9b4e7a60253d69e63 rdf:first sg:person.07674464077.03
70 rdf:rest rdf:nil
71 N5a28e9de11644ccaa2c0d97aecc1fada schema:name Springer Nature - SN SciGraph project
72 rdf:type schema:Organization
73 N5c4d54b32d7a411f932b6124174f5e21 schema:isbn 978-3-540-29163-3
74 978-3-540-32075-3
75 schema:name Distributed Computing
76 rdf:type schema:Book
77 N90f6ccaec8c14efeabf763c738bc3747 schema:name Springer Nature
78 rdf:type schema:Organisation
79 Na282a311c2264cc08244a4b9b798883a rdf:first sg:person.016522007577.47
80 rdf:rest N4f1503ec2fb740e9b4e7a60253d69e63
81 Na8139156477342bdb98fbc1faef49c3c schema:name doi
82 schema:value 10.1007/11561927_4
83 rdf:type schema:PropertyValue
84 anzsrc-for:10 schema:inDefinedTermSet anzsrc-for:
85 schema:name Technology
86 rdf:type schema:DefinedTerm
87 anzsrc-for:1005 schema:inDefinedTermSet anzsrc-for:
88 schema:name Communications Technologies
89 rdf:type schema:DefinedTerm
90 sg:person.011657273253.11 schema:affiliation grid-institutes:None
91 schema:familyName Badishi
92 schema:givenName Gal
93 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.011657273253.11
94 rdf:type schema:Person
95 sg:person.016522007577.47 schema:affiliation grid-institutes:grid.22098.31
96 schema:familyName Herzberg
97 schema:givenName Amir
98 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.016522007577.47
99 rdf:type schema:Person
100 sg:person.07674464077.03 schema:affiliation grid-institutes:None
101 schema:familyName Keidar
102 schema:givenName Idit
103 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.07674464077.03
104 rdf:type schema:Person
105 grid-institutes:None schema:alternateName The Technion Department of Electrical Engineering
106 schema:name The Technion Department of Electrical Engineering
107 rdf:type schema:Organization
108 grid-institutes:grid.22098.31 schema:alternateName Department of Computer Science, Bar Ilan University
109 schema:name Department of Computer Science, Bar Ilan University
110 rdf:type schema:Organization
 




Preview window. Press ESC to close (or click here)


...