Show simple item record

dc.contributor.authorFebro, Aldo
dc.contributor.authorXiao, Hannan
dc.contributor.authorSpring, William
dc.date.accessioned2020-05-24T00:02:42Z
dc.date.available2020-05-24T00:02:42Z
dc.date.issued2019-10-31
dc.identifier.citationFebro , A , Xiao , H & Spring , W 2019 , Distributed SIP DDoS Defense with P4 . in 2019 IEEE Wireless Communications and Networking Conference (WCNC) : Proceedings . IEEE , 2019 IEEE Wireless Communications and Networking Conference, WCNC 2019 , Marrakesh , Morocco , 15/04/19 . https://doi.org/10.1109/WCNC.2019.8885926
dc.identifier.citationconference
dc.identifier.isbn9781538676479
dc.identifier.isbn9781538676462
dc.identifier.otherPURE: 16146017
dc.identifier.otherPURE UUID: 64d0a755-f479-41ae-8644-f3f779bac4d5
dc.identifier.otherScopus: 85074786706
dc.identifier.otherORCID: /0000-0003-2273-6679/work/74458157
dc.identifier.otherORCID: /0000-0002-2251-2838/work/74458234
dc.identifier.urihttp://hdl.handle.net/2299/22749
dc.description© 2019 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works.
dc.description.abstractSIP DDoS attack is growing and has a real threat to crippling public communication infrastructure. The standard approach to building the defense is at or near the attack destination (i.e. victim’s location). This approach is struggling to keep up with the growing volume and attack sophistication. To be better prepared for future attacks, the workload needs to be distributed, and the attack needs to be mitigated as close to the attack source as possible. This paper experiments with data plane programming (P4) and control plane programming of Ethernet switches to provide first-hop detection and mitigation capability for SIP INVITE DDoS attack at every switch port. This approachcreates a distributed or source-based defense component which could be added to the existing destination-based components to create a more comprehensive overall solution that is extensible, economical, and scalable against SIP DDoS attack of the future.en
dc.format.extent8
dc.language.isoeng
dc.publisherIEEE
dc.relation.ispartof2019 IEEE Wireless Communications and Networking Conference (WCNC)
dc.titleDistributed SIP DDoS Defense with P4en
dc.contributor.institutionCentre for Computer Science and Informatics Research
dc.contributor.institutionSchool of Computer Science
rioxxterms.versionAM
rioxxterms.versionofrecordhttps://doi.org/10.1109/WCNC.2019.8885926
rioxxterms.typeOther
herts.preservation.rarelyaccessedtrue


Files in this item

Thumbnail

This item appears in the following Collection(s)

Show simple item record