8 July 2002 Using overlays to improve network security
Author Affiliations +
Proceedings Volume 4868, Scalability and Traffic Control in IP Networks II; (2002) https://doi.org/10.1117/12.475275
Event: ITCom 2002: The Convergence of Information Technologies and Communications, 2002, Boston, MA, United States
As we increase our dependency upon networked communication, the incentive to compromise and degrade network performance increases for those who wish to disrupt the flow of information. Attacks that lead to such compromise and degradation can come in a variety of forms, including distributed denial of service (DDoS) attacks, cutting wires, jamming transmissions, and monitoring/eavesdropping. Users can protect themselves from monitoring by applying cryptographic techniques, and the recent work has explored developing networks that react to DDoS attacks by locating the source(s) of the attack. However, there has been little work that addresses preventing the other kinds of attacks as opposed to reacting to them. Here, we discuss how network overlays can be used to complicate the job of an attacker that wishes to prevent communication. To amplify our point, we focus briefly on a study of preventing DDoS attacks by using overlays.
© (2002) COPYRIGHT Society of Photo-Optical Instrumentation Engineers (SPIE). Downloading of the abstract is permitted for personal use only.
Angelos D. Keromytis, Angelos D. Keromytis, Vishal Misra, Vishal Misra, Daniel Rubenstein, Daniel Rubenstein, "Using overlays to improve network security", Proc. SPIE 4868, Scalability and Traffic Control in IP Networks II, (8 July 2002); doi: 10.1117/12.475275; https://doi.org/10.1117/12.475275

Back to Top