Browse > Article
http://dx.doi.org/10.6109/jkiice.2011.15.8.1720

A New Defense against DDoS Attacks using Reputation  

Shin, Jung-Hwa (부경대학교)
Shin, Weon (동명대학교)
Abstract
The DDoS attacks which are increasing recently must have many zombie PCs before attacking targeted systems by attacker. A zombie PC is infected by attacker's malignant code and may be operated by the his/her special malicious purposes. But most users generally don't know that their PCs are infected and used as zombies by illegal activities covertly. In this paper, we propose a new scheme that decreases vulnerable PCs and isolates them from Internet before being zombie PCs. The proposed scheme point the reputations of connected PCs and decide whether their Internet connections are keeping continuously or not. Also We show the figures how to infect susceptable PCs to zombie PCs, and analyze the decrease effects of DDoS attacks adapted by the proposed scheme with various experiments.
Keywords
DDoS attack; Zombie PC; Bot; Reputation;
Citations & Related Records
Times Cited By KSCI : 1  (Citation Analysis)
연도 인용수 순위
1 T. Peng, C. Leckie, K. Ramamohanarao, "Survey of Network-based Defense Mechanism Countering the DoS and DDoS Problems," ACM Computing Surveys, Vol. 39, No. 1, April 2007.
2 J. Mirkovic, P. Reiher, "A Taxonomy of DDoS Attack and DDoS Defense Mechanisms," ACM SIGCOMM COmputer Communication Review, Volume 34, Issue 2, pp. 39-53, April 2004.   DOI   ScienceOn
3 E. Cooke, F. Jahanian, and D. McPherson, "The Zombie Roundup: Understanding, Detecting, and Distrupting Botnets," In Proceeding of Usenix Workshop on Steps to Reducing Unwanted Traffice on the Internet(SRUTI'05), pp.39-44, 2005.
4 한국경제연구원, "DDoS 사이버 테러의 피해와 대책," 2010
5 보안뉴스, http:/www.boannews.com
6 S. Marti, H. Garcia-Molina, "Taxonomy of Trust: Categorizing P2P Reputation Systems," Computer Networks, Volume 50, Issue 4, pp.472-484, 2006.   DOI   ScienceOn
7 인터넷 침해사고 동향 및 분석 월보, 한국인터넷 진흥원, 2011년 1월
8 노철우, 강경태, 이지웅, 전재현, "NAC(Network Access Control)을 이용한 컴퓨터 네트워크 보안 플랫폼 구성," 한국콘텐츠학회 춘계 종합학술대회 논문집, 제7권 제1호, pp.8-11, 2009.
9 H. W. Hethcote, "The Mathematics of Infectious Diseases," SINA Review, Vol. 42, No. 4, pp.599-653, 2000.
10 신원, 이경현, "인터넷 환경에서 웜 확산 모델의 제안과 분석," 정보보호학회논문지, 제16권, 제3호, pp.165-172, 2006
11 http://www.akamai.com