MTF: Mitigating link flooding attacks in delay tolerant networks
- Publication Type:
- Conference Proceeding
- Citation:
- Proceedings - 2018 IEEE SmartWorld, Ubiquitous Intelligence and Computing, Advanced and Trusted Computing, Scalable Computing and Communications, Cloud and Big Data Computing, Internet of People and Smart City Innovations, SmartWorld/UIC/ATC/ScalCom/CBDCom/IoP/SCI 2018, 2018, pp. 1532 - 1539
- Issue Date:
- 2018-12-04
Closed Access
Filename | Description | Size | |||
---|---|---|---|---|---|
08560242.pdf | Published version | 953.17 kB |
Copyright Clearance Process
- Recently Added
- In Progress
- Closed Access
This item is closed access and not available.
© 2018 IEEE. The link flooding attack (LFA) is a new type of distributed denial-of-service (DDoS) attack emerged in recent years. Several defense mechanisms have been proposed in TCP/IP networks. However, due to the connectionless nature of Delay Tolerant Networks (DTN), the efficiency of these mechanisms is degraded facing the LFA in DTN. Thus, in this paper, we propose a new scheme named Macro Traffic Filtering (MTF), to defend the LFA in DTN efficiently. With the real prototype implementations and the long-term emulations, the preliminary results show that compared to the undifferentiated interception and the TE-based interplay scheme, MTF achieves significantly higher attack traffic hit ratio, lower collateral damage and higher cost to the attackers.
Please use this identifier to cite or link to this item: