|
![]() |
![]() |
![]() |
![]() |
![]() |
|
![]() |
OverviewInternet denial-of-service (DoS) attack based on flooding are a serious, ongoing problem for Web sites. They are a fundamental weakness of the existing Internet architecture (in which any host can send to any other host at any time) and hence difficult to defeat. We are working on an alternative network architecture that limits the impact of DoS floods from the outset yet is practical and incrementally deployable. The name of our system is TVA, the traffic validation architecture. It is a play on the Tennessee Valley Authority, which operates a large-scale network of dams to control flood damage, saving more than $200 million annually. The approach we have developed is the use of capabilities, in which senders obtain short-term authorizations from receivers that they use to stamp their packets so that routers can recognize legitimate traffic. Papers
Earlier WorkMost approaches to mitigate DoS floods process traffic according to its path through the network rather than its source address, as the latter may be spoofed. We pioneered the probabilistic traceback method for obtaining path signatures in earlier work.
|
![]() |
Computer Science & Engineering University of Washington Box 352350 Seattle, WA 98195-2350 (206) 543-1695 voice, (206) 543-2969 FAX [comments to djw] |