Trace-back of Active Attack Flows
In this type of solution, an observer tracks an existing attack flow by examining incoming and outgoing ports on routers starting from the host under attack. Thus, such a solution requires having privileged access to routers along the attack path.
To bypass this restriction and automate this process, Stone proposes routing suspicious packets on an overlay network using ISP edge routers. By simplifying the topology, suspicious packets can easily be re-routed to a specialized network for further analysis.
This is an interesting approach. By nature of DoS, any such attack will be sufficiently long lived for tracking in such a fashion to be possible. Layer-three topology changes, while hard to mask to a determined attacker, have the possibility of alleviating the DoS until the routing change is discovered and subsequently adapted to. Once the attacker has adapted, the re-routing scheme can once again adapt and re-route; causing an oscillation in the DoS attack; granting some ability to absorb the impact of such an attack.
Read more about this topic: IP Traceback
Famous quotes containing the words active, attack and/or flows:
“There is not enough exercise in this way of life. I try to make up by active gymnastics before I dress when I get up, by walking rapidly in the lower hall and the greenhouse after each meal for perhaps five to ten minutes, and a good hand rubbing before going to bed. I eat moderately; drink one cup of coffee at breakfast and one cup of tea at lunch and no other stimulant. My health is now, and usually, excellent.”
—Rutherford Birchard Hayes (18221893)
“We attack not only to hurt someone, to defeat him, but perhaps also simply to become conscious of our own strength.”
—Friedrich Nietzsche (18441900)
“While the town small-talk flows from lip to lip;
Intrigues half-gathered, conversation-scraps,
Kitchen-cabals, and nursery-mishaps.”
—George Crabbe (17541832)