MAfIc: Adaptive packet dropping for cutting malicious flows to push back DDoS attacks

13Citations
Citations of this article
8Readers
Mendeley users who have this article in their library.
Get full text

Abstract

In this paper, we propose a new approach called MAFIC (MAlicious Flow Identification and Cutoff) to support adaptive packet dropping to fend off DDoS attacks. MAFIC works by judiciously issuing lightweight probes to flow sources to check if they are legitimate. Through such probing, MAFIC would drop malicious attack packets with high accuracy while minimizes the loss on legitimate traffic flows. Our NS-2 based simulation indicates that MAFIC algorithm drops packets from unresponsive potental attack flows with an accuracy as high as 99% and reduces the loss of legitimate flows to less than 3%. Furthermore, the false positive and negative rates are low-only around 1% for a majority of the cases.

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Cite

CITATION STYLE

APA

Chen, Y., Kwok, Y. K., & Hwang, K. (2005). MAfIc: Adaptive packet dropping for cutting malicious flows to push back DDoS attacks. In Proceedings - International Conference on Distributed Computing Systems. Institute of Electrical and Electronics Engineers Inc. https://doi.org/10.1109/ICDCSW.2005.84

Readers' Seniority

Tooltip

PhD / Post grad / Masters / Doc 6

100%

Readers' Discipline

Tooltip

Computer Science 8

100%

Save time finding and organizing research with Mendeley

Sign up for free