ML: DDoS damage control with MPLS

  • Pierre Edouard Fabre
  • , Hervé Debar
  • , Jouni Viinikka
  • , Gregory Blanc

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

We present a DDoS mitigation mechanism dispatching suspicious and legitimate traffic into separate MultiProtocol Label Switching (MPLS) tunnels, well upstream from the target. The objective is to limit the impact a voluminous attack could otherwise have on the legitimate traffic through saturation of network resources. The separation of traffic is based on a signature identifying suspicious flows, carried in an MPLS label, and then used by a load-balancing mechanism in a router. The legitimite traffic is preserved at the expense of suspcious flows, whose resource allocations are throttled as needed to avoid congestion.

Original languageEnglish
Title of host publicationSecure IT Systems - 21st Nordic Conference, NordSec 2016, Proceedings
EditorsJuha Roning, Billy Bob Brumley
PublisherSpringer Verlag
Pages101-116
Number of pages16
ISBN (Print)9783319475592
DOIs
Publication statusPublished - 1 Jan 2016
Externally publishedYes
Event21st Nordic Conference on Secure IT Systems, NordSec 2016 - Oulu, Finland
Duration: 2 Nov 20164 Nov 2016

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume10014 LNCS
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Conference

Conference21st Nordic Conference on Secure IT Systems, NordSec 2016
Country/TerritoryFinland
CityOulu
Period2/11/164/11/16

Keywords

  • Amplification DDoS
  • Bloom filter
  • Multiprotocol Label Switching
  • Network resilience
  • Quality of service
  • Volumetric DDoS

Fingerprint

Dive into the research topics of 'ML: DDoS damage control with MPLS'. Together they form a unique fingerprint.

Cite this