Skip to main content

Mitigating bandwidth-exhaustion attacks using congestion puzzles

Publication ,  Conference
Wang, X; Reiter, MK
Published in: Proceedings of the ACM Conference on Computer and Communications Security
January 1, 2004

We present congestion puzzles (CP), a new countermeasure to bandwidth-exhaustion attacks. Like other defenses based on client puzzles, CP attempts to force attackers to invest vast resources in order to effectively perform denial-of-service attacks. Unlike previous puzzle-based approaches, however, ours is the first designed for the bandwidth-exhaustion attacks that are common at the network (IP) layer. At the core of CP is an elegant distributed puzzle mechanism that permits routers to cooperatively impose and check puzzles. We demonstrate through analysis and simulation that CP can effectively defend networks from flooding attacks with-out relying on the formulation of attack signatures to filter traffic. Moreover, as many such attacks are conducted by "zombie" computers that have been silently commandeered without the knowledge of their owners, the overheads that CP imposes on heavily engaged zombies can increase the likelihood that the computer's owner detects the compromise and takes action to remedy it. Copyright 2004 ACM.

Duke Scholars

Published In

Proceedings of the ACM Conference on Computer and Communications Security

DOI

ISSN

1543-7221

Publication Date

January 1, 2004

Start / End Page

257 / 267
 

Citation

APA
Chicago
ICMJE
MLA
NLM
Wang, X., & Reiter, M. K. (2004). Mitigating bandwidth-exhaustion attacks using congestion puzzles. In Proceedings of the ACM Conference on Computer and Communications Security (pp. 257–267). https://doi.org/10.1145/1030083.1030118
Wang, X., and M. K. Reiter. “Mitigating bandwidth-exhaustion attacks using congestion puzzles.” In Proceedings of the ACM Conference on Computer and Communications Security, 257–67, 2004. https://doi.org/10.1145/1030083.1030118.
Wang X, Reiter MK. Mitigating bandwidth-exhaustion attacks using congestion puzzles. In: Proceedings of the ACM Conference on Computer and Communications Security. 2004. p. 257–67.
Wang, X., and M. K. Reiter. “Mitigating bandwidth-exhaustion attacks using congestion puzzles.” Proceedings of the ACM Conference on Computer and Communications Security, 2004, pp. 257–67. Scopus, doi:10.1145/1030083.1030118.
Wang X, Reiter MK. Mitigating bandwidth-exhaustion attacks using congestion puzzles. Proceedings of the ACM Conference on Computer and Communications Security. 2004. p. 257–267.

Published In

Proceedings of the ACM Conference on Computer and Communications Security

DOI

ISSN

1543-7221

Publication Date

January 1, 2004

Start / End Page

257 / 267