search menu icon-carat-right cmu-wordmark

An Empirical Analysis of Target-Resident DoS Filters

White Paper
In this paper, the authors provide an empirical analysis of proposed techniques for filtering network traffic.
Publisher

Software Engineering Institute

Abstract

Numerous techniques have been proposed by which an end-system, subjected to a denial-of-service flood, filters the offending traffic. In this paper, we provide an empirical analysis of several such proposals, using traffic recorded at the border of a large network and including real DoS traffic. We focus our analysis on four filtering techniques, two based on the addresses from which the victim server typically receives traffic (static clustering and network-aware clustering), and two based on coarse indications of the path each packet traverses (hop-count filtering and path identifiers). Our analysis reveals challenges facing the proposed techniques in practice, and the implications of these issues for effective filtering. In addition, we compare techniques on equal footing, by evaluating the performance of one scheme under assumptions made by another. We conclude with an interpretation of the results and suggestions for further analysis.

This content was created for a conference series or symposium and does not necessarily reflect the positions and views of the Software Engineering Institute.