Anycast Agility: Adaptive Routing to Manage DDoS

06/24/2020
by   ASM Rizvi, et al.
0

IP Anycast is used for services such as DNS and Content Delivery Networks to provide the capacity to handle Distributed Denial-of-Service (DDoS) attacks. During a DDoS attack service operators may wish to redistribute traffic between anycast sites to take advantage of sites with unused or greater capacity. Depending on site traffic and attack size, operators may instead choose to concentrate attackers in a few sites to preserve operation in others. Previously service operators have taken these actions during attacks, but how to do so has not been described publicly. This paper meets that need, describing methods to use BGP to shift traffic when under DDoS that can build a "response playbook". Operators can use this playbook, with our new method to estimate attack size, to respond to attacks. We also explore constraints on responses seen in an anycast deployment.

READ FULL TEXT

page 9

page 11

page 12

page 17

research
05/14/2019

A Proactive Design to Detect Denial of Service Attacks Using SNMP-MIB ICMP Variables

Denial of Service (DOS) attack is one of the most attack that attract th...
research
02/01/2020

Dissecting the Workload of a Major Adult Video Portal

Adult content constitutes a major source of Internet traffic. As with ma...
research
04/16/2019

The Methods to Improve Quality of Service by Accounting Secure Parameters

A solution to the problem of ensuring quality of service, providing a gr...
research
02/24/2019

Expect More from the Networking: DDoS Mitigation by FITT in Named Data Networking

Distributed Denial of Service (DDoS) attacks have plagued the Internet f...
research
04/18/2018

SDN-Assisted Network-Based Mitigation of Slow DDoS Attacks

Slow-running attacks against network applications are often not easy to ...
research
05/22/2023

Adaptive Distributed Filtering of DDoS Traffic on the Internet

Despite the proliferation of traffic filtering capabilities throughout t...
research
10/25/2020

Exploring Network-Wide Flow Data with Flowyager

Many network operations, ranging from attack investigation and mitigatio...

Please sign up or login with your details

Forgot password? Click here to reset