Share Email Print

Proceedings Paper

Using overlays to improve network security
Author(s): Angelos D. Keromytis; Vishal Misra; Daniel Rubenstein
Format Member Price Non-Member Price
PDF $17.00 $21.00

Paper Abstract

As we increase our dependency upon networked communication, the incentive to compromise and degrade network performance increases for those who wish to disrupt the flow of information. Attacks that lead to such compromise and degradation can come in a variety of forms, including distributed denial of service (DDoS) attacks, cutting wires, jamming transmissions, and monitoring/eavesdropping. Users can protect themselves from monitoring by applying cryptographic techniques, and the recent work has explored developing networks that react to DDoS attacks by locating the source(s) of the attack. However, there has been little work that addresses preventing the other kinds of attacks as opposed to reacting to them. Here, we discuss how network overlays can be used to complicate the job of an attacker that wishes to prevent communication. To amplify our point, we focus briefly on a study of preventing DDoS attacks by using overlays.

Paper Details

Date Published: 8 July 2002
PDF: 10 pages
Proc. SPIE 4868, Scalability and Traffic Control in IP Networks II, (8 July 2002); doi: 10.1117/12.475275
Show Author Affiliations
Angelos D. Keromytis, Columbia Univ. (United States)
Vishal Misra, Columbia Univ. (United States)
Daniel Rubenstein, Columbia Univ. (United States)

Published in SPIE Proceedings Vol. 4868:
Scalability and Traffic Control in IP Networks II
Victor Firoiu; Zhi-Li Zhang, Editor(s)

© SPIE. Terms of Use
Back to Top
Sign in to read the full article
Create a free SPIE account to get access to
premium articles and original research
Forgot your username?