Mitigating active attacks towards client networks using the bitmap filter

Chun-Ying Huang*, Kuan Ta Chen, Chin Laung Lei

*Corresponding author for this work

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

1 Scopus citations

Abstract

With the emergence of active worms, the targets of attacks have been moved from well-known Internet servers to generic Internet hosts, and since the rate at which patches can be applied is always much slower than the spread of a worm, an Internet worm can usually attack or infect millions of hosts in a short time. It is difficult to eliminate Internet attacks globally; thus, protecting client networks from being attacked or infected is a relatively critical issue. In this paper, we propose a method that protects client networks from being attacked by people who try to scan, attack, or infect hosts in local networks via unpatched vulnerabilities. Based on the symmetry of network traffic in both temporal and spatial domains, a bitmap filter is installed at the entry point of a client network to filter out possible attack traffic. Our evaluation shows that with a small amount of memory (less than 1 megabyte), more than 95% of attack traffic can be filtered out in a small- or medium-scale client network.

Original languageEnglish
Title of host publicationProceedings - DSN 2006
Subtitle of host publication2006 International Conference on Dependable Systems and Networks
Pages403-412
Number of pages10
DOIs
StatePublished - 22 Dec 2006
EventDSN 2006: 2006 International Conference on Dependable Systems and Networks - Philadelphia, PA, United States
Duration: 25 Jun 200628 Jun 2006

Publication series

NameProceedings of the International Conference on Dependable Systems and Networks
Volume2006

Conference

ConferenceDSN 2006: 2006 International Conference on Dependable Systems and Networks
CountryUnited States
CityPhiladelphia, PA
Period25/06/0628/06/06

Fingerprint Dive into the research topics of 'Mitigating active attacks towards client networks using the bitmap filter'. Together they form a unique fingerprint.

Cite this