SlideShare a Scribd company logo
1 of 1
Download to read offline
Article Name: The Need for a Multi-Perspective Approach to Solve the DDoS Problem.
Author: Jorge Hernandez-Herrero and Jon A. Solworth
Bells Labs Technical Journal
Distribute denial of service.
Distributed denial of service (DDoS) attacks are a common event in today’s Internet,
affecting small and large organizations. Criminal organizations use DDoS as the means to
carry out extortion. Before engaging a set of compromised hosts in a DDoS attack, attackers
must create a DDoS botnet or agent network, coordinate attack activities among them and
execute the attack. The distribution and size of attack sources, spoofing, and the use of
reflectors make trace back a challenging task. In order to deploy a DDoS solution
successfully, it must either be mandated or offer valuable incentives. Another solution for
the DDoS attacks is to do a Blackhole routing. Blackhole routing discards all traffic to the
victim including legitimate traffic hence, the network and service sub problems are not
solved. A benefit of this technique is that it eliminates collateral damage since the filtering
of the network address is precise. In essence, solving the DDoS problem requires dealing
with a missing piece of functionality in the TCP/IP protocol stack. While the IP layer
unifies and identifies the network elements connected to the Internet, it lacks authentication
and authorization concepts that can prevent unwanted network traffic.

More Related Content

Viewers also liked

Michael Seres & Marion O'Connor: The evolving role of the engaged patient
Michael Seres & Marion O'Connor: The evolving role of the engaged patientMichael Seres & Marion O'Connor: The evolving role of the engaged patient
Michael Seres & Marion O'Connor: The evolving role of the engaged patientaimlabstanford
 
Defy Your Age
Defy Your AgeDefy Your Age
Defy Your Ageapappa
 
Lesson plan reading the short sory
Lesson plan reading the short soryLesson plan reading the short sory
Lesson plan reading the short sorymichael_uprh
 
Haverhill Cooperative School District October 2 Bond Hearing Presentation
Haverhill Cooperative School District October 2 Bond Hearing PresentationHaverhill Cooperative School District October 2 Bond Hearing Presentation
Haverhill Cooperative School District October 2 Bond Hearing Presentationahoughton
 
Final adobe photoshop
Final adobe photoshopFinal adobe photoshop
Final adobe photoshopu2709816
 

Viewers also liked (9)

Michael Seres & Marion O'Connor: The evolving role of the engaged patient
Michael Seres & Marion O'Connor: The evolving role of the engaged patientMichael Seres & Marion O'Connor: The evolving role of the engaged patient
Michael Seres & Marion O'Connor: The evolving role of the engaged patient
 
Defy Your Age
Defy Your AgeDefy Your Age
Defy Your Age
 
Modals
Modals Modals
Modals
 
Mw1204
Mw1204Mw1204
Mw1204
 
Lesson plan reading the short sory
Lesson plan reading the short soryLesson plan reading the short sory
Lesson plan reading the short sory
 
Windows 7 - Upgrade the Desktop
Windows 7 - Upgrade the DesktopWindows 7 - Upgrade the Desktop
Windows 7 - Upgrade the Desktop
 
Haverhill Cooperative School District October 2 Bond Hearing Presentation
Haverhill Cooperative School District October 2 Bond Hearing PresentationHaverhill Cooperative School District October 2 Bond Hearing Presentation
Haverhill Cooperative School District October 2 Bond Hearing Presentation
 
Final adobe photoshop
Final adobe photoshopFinal adobe photoshop
Final adobe photoshop
 
Hamzeh_Herzalla.CV
Hamzeh_Herzalla.CVHamzeh_Herzalla.CV
Hamzeh_Herzalla.CV
 

More from yito24

Settings
SettingsSettings
Settingsyito24
 
Dibujo
DibujoDibujo
Dibujoyito24
 
Organización de computadoras
Organización de computadorasOrganización de computadoras
Organización de computadorasyito24
 
Programación en matlab
Programación en matlabProgramación en matlab
Programación en matlabyito24
 
Marco teorico
Marco teoricoMarco teorico
Marco teoricoyito24
 
Programa 6
Programa 6Programa 6
Programa 6yito24
 
Programa 6
Programa 6Programa 6
Programa 6yito24
 
Programa 5
Programa 5Programa 5
Programa 5yito24
 
Programa 4
Programa 4Programa 4
Programa 4yito24
 
Programa 3
Programa 3Programa 3
Programa 3yito24
 
Programa 2
Programa 2Programa 2
Programa 2yito24
 
Programa 1
Programa 1Programa 1
Programa 1yito24
 
Water rocket project
Water rocket projectWater rocket project
Water rocket projectyito24
 
Proyecto goniometro
Proyecto goniometroProyecto goniometro
Proyecto goniometroyito24
 

More from yito24 (17)

Start
StartStart
Start
 
Settings
SettingsSettings
Settings
 
Maze
MazeMaze
Maze
 
Lab
LabLab
Lab
 
Dibujo
DibujoDibujo
Dibujo
 
Organización de computadoras
Organización de computadorasOrganización de computadoras
Organización de computadoras
 
Programación en matlab
Programación en matlabProgramación en matlab
Programación en matlab
 
Marco teorico
Marco teoricoMarco teorico
Marco teorico
 
Programa 6
Programa 6Programa 6
Programa 6
 
Programa 6
Programa 6Programa 6
Programa 6
 
Programa 5
Programa 5Programa 5
Programa 5
 
Programa 4
Programa 4Programa 4
Programa 4
 
Programa 3
Programa 3Programa 3
Programa 3
 
Programa 2
Programa 2Programa 2
Programa 2
 
Programa 1
Programa 1Programa 1
Programa 1
 
Water rocket project
Water rocket projectWater rocket project
Water rocket project
 
Proyecto goniometro
Proyecto goniometroProyecto goniometro
Proyecto goniometro
 

Recently uploaded

DiskStorage_BasicFileStructuresandHashing.pdf
DiskStorage_BasicFileStructuresandHashing.pdfDiskStorage_BasicFileStructuresandHashing.pdf
DiskStorage_BasicFileStructuresandHashing.pdfChristalin Nelson
 
ICS 2208 Lecture Slide Notes for Topic 6
ICS 2208 Lecture Slide Notes for Topic 6ICS 2208 Lecture Slide Notes for Topic 6
ICS 2208 Lecture Slide Notes for Topic 6Vanessa Camilleri
 
How to Uninstall a Module in Odoo 17 Using Command Line
How to Uninstall a Module in Odoo 17 Using Command LineHow to Uninstall a Module in Odoo 17 Using Command Line
How to Uninstall a Module in Odoo 17 Using Command LineCeline George
 
Decoding the Tweet _ Practical Criticism in the Age of Hashtag.pptx
Decoding the Tweet _ Practical Criticism in the Age of Hashtag.pptxDecoding the Tweet _ Practical Criticism in the Age of Hashtag.pptx
Decoding the Tweet _ Practical Criticism in the Age of Hashtag.pptxDhatriParmar
 
Shark introduction Morphology and its behaviour characteristics
Shark introduction Morphology and its behaviour characteristicsShark introduction Morphology and its behaviour characteristics
Shark introduction Morphology and its behaviour characteristicsArubSultan
 
MS4 level being good citizen -imperative- (1) (1).pdf
MS4 level   being good citizen -imperative- (1) (1).pdfMS4 level   being good citizen -imperative- (1) (1).pdf
MS4 level being good citizen -imperative- (1) (1).pdfMr Bounab Samir
 
Sulphonamides, mechanisms and their uses
Sulphonamides, mechanisms and their usesSulphonamides, mechanisms and their uses
Sulphonamides, mechanisms and their usesVijayaLaxmi84
 
PART 1 - CHAPTER 1 - CELL THE FUNDAMENTAL UNIT OF LIFE
PART 1 - CHAPTER 1 - CELL THE FUNDAMENTAL UNIT OF LIFEPART 1 - CHAPTER 1 - CELL THE FUNDAMENTAL UNIT OF LIFE
PART 1 - CHAPTER 1 - CELL THE FUNDAMENTAL UNIT OF LIFEMISSRITIMABIOLOGYEXP
 
Mythology Quiz-4th April 2024, Quiz Club NITW
Mythology Quiz-4th April 2024, Quiz Club NITWMythology Quiz-4th April 2024, Quiz Club NITW
Mythology Quiz-4th April 2024, Quiz Club NITWQuiz Club NITW
 
Tree View Decoration Attribute in the Odoo 17
Tree View Decoration Attribute in the Odoo 17Tree View Decoration Attribute in the Odoo 17
Tree View Decoration Attribute in the Odoo 17Celine George
 
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 - I-LEARN SMART WORLD - CẢ NĂM - CÓ FILE NGHE (BẢN...
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 - I-LEARN SMART WORLD - CẢ NĂM - CÓ FILE NGHE (BẢN...BÀI TẬP BỔ TRỢ TIẾNG ANH 8 - I-LEARN SMART WORLD - CẢ NĂM - CÓ FILE NGHE (BẢN...
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 - I-LEARN SMART WORLD - CẢ NĂM - CÓ FILE NGHE (BẢN...Nguyen Thanh Tu Collection
 
Grade Three -ELLNA-REVIEWER-ENGLISH.pptx
Grade Three -ELLNA-REVIEWER-ENGLISH.pptxGrade Three -ELLNA-REVIEWER-ENGLISH.pptx
Grade Three -ELLNA-REVIEWER-ENGLISH.pptxkarenfajardo43
 
An Overview of the Calendar App in Odoo 17 ERP
An Overview of the Calendar App in Odoo 17 ERPAn Overview of the Calendar App in Odoo 17 ERP
An Overview of the Calendar App in Odoo 17 ERPCeline George
 
BIOCHEMISTRY-CARBOHYDRATE METABOLISM CHAPTER 2.pptx
BIOCHEMISTRY-CARBOHYDRATE METABOLISM CHAPTER 2.pptxBIOCHEMISTRY-CARBOHYDRATE METABOLISM CHAPTER 2.pptx
BIOCHEMISTRY-CARBOHYDRATE METABOLISM CHAPTER 2.pptxSayali Powar
 
4.9.24 School Desegregation in Boston.pptx
4.9.24 School Desegregation in Boston.pptx4.9.24 School Desegregation in Boston.pptx
4.9.24 School Desegregation in Boston.pptxmary850239
 
Blowin' in the Wind of Caste_ Bob Dylan's Song as a Catalyst for Social Justi...
Blowin' in the Wind of Caste_ Bob Dylan's Song as a Catalyst for Social Justi...Blowin' in the Wind of Caste_ Bob Dylan's Song as a Catalyst for Social Justi...
Blowin' in the Wind of Caste_ Bob Dylan's Song as a Catalyst for Social Justi...DhatriParmar
 
Employablity presentation and Future Career Plan.pptx
Employablity presentation and Future Career Plan.pptxEmployablity presentation and Future Career Plan.pptx
Employablity presentation and Future Career Plan.pptxryandux83rd
 

Recently uploaded (20)

DiskStorage_BasicFileStructuresandHashing.pdf
DiskStorage_BasicFileStructuresandHashing.pdfDiskStorage_BasicFileStructuresandHashing.pdf
DiskStorage_BasicFileStructuresandHashing.pdf
 
ICS 2208 Lecture Slide Notes for Topic 6
ICS 2208 Lecture Slide Notes for Topic 6ICS 2208 Lecture Slide Notes for Topic 6
ICS 2208 Lecture Slide Notes for Topic 6
 
How to Uninstall a Module in Odoo 17 Using Command Line
How to Uninstall a Module in Odoo 17 Using Command LineHow to Uninstall a Module in Odoo 17 Using Command Line
How to Uninstall a Module in Odoo 17 Using Command Line
 
Chi-Square Test Non Parametric Test Categorical Variable
Chi-Square Test Non Parametric Test Categorical VariableChi-Square Test Non Parametric Test Categorical Variable
Chi-Square Test Non Parametric Test Categorical Variable
 
Decoding the Tweet _ Practical Criticism in the Age of Hashtag.pptx
Decoding the Tweet _ Practical Criticism in the Age of Hashtag.pptxDecoding the Tweet _ Practical Criticism in the Age of Hashtag.pptx
Decoding the Tweet _ Practical Criticism in the Age of Hashtag.pptx
 
Shark introduction Morphology and its behaviour characteristics
Shark introduction Morphology and its behaviour characteristicsShark introduction Morphology and its behaviour characteristics
Shark introduction Morphology and its behaviour characteristics
 
MS4 level being good citizen -imperative- (1) (1).pdf
MS4 level   being good citizen -imperative- (1) (1).pdfMS4 level   being good citizen -imperative- (1) (1).pdf
MS4 level being good citizen -imperative- (1) (1).pdf
 
Sulphonamides, mechanisms and their uses
Sulphonamides, mechanisms and their usesSulphonamides, mechanisms and their uses
Sulphonamides, mechanisms and their uses
 
PART 1 - CHAPTER 1 - CELL THE FUNDAMENTAL UNIT OF LIFE
PART 1 - CHAPTER 1 - CELL THE FUNDAMENTAL UNIT OF LIFEPART 1 - CHAPTER 1 - CELL THE FUNDAMENTAL UNIT OF LIFE
PART 1 - CHAPTER 1 - CELL THE FUNDAMENTAL UNIT OF LIFE
 
Mythology Quiz-4th April 2024, Quiz Club NITW
Mythology Quiz-4th April 2024, Quiz Club NITWMythology Quiz-4th April 2024, Quiz Club NITW
Mythology Quiz-4th April 2024, Quiz Club NITW
 
Paradigm shift in nursing research by RS MEHTA
Paradigm shift in nursing research by RS MEHTAParadigm shift in nursing research by RS MEHTA
Paradigm shift in nursing research by RS MEHTA
 
Tree View Decoration Attribute in the Odoo 17
Tree View Decoration Attribute in the Odoo 17Tree View Decoration Attribute in the Odoo 17
Tree View Decoration Attribute in the Odoo 17
 
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 - I-LEARN SMART WORLD - CẢ NĂM - CÓ FILE NGHE (BẢN...
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 - I-LEARN SMART WORLD - CẢ NĂM - CÓ FILE NGHE (BẢN...BÀI TẬP BỔ TRỢ TIẾNG ANH 8 - I-LEARN SMART WORLD - CẢ NĂM - CÓ FILE NGHE (BẢN...
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 - I-LEARN SMART WORLD - CẢ NĂM - CÓ FILE NGHE (BẢN...
 
Grade Three -ELLNA-REVIEWER-ENGLISH.pptx
Grade Three -ELLNA-REVIEWER-ENGLISH.pptxGrade Three -ELLNA-REVIEWER-ENGLISH.pptx
Grade Three -ELLNA-REVIEWER-ENGLISH.pptx
 
prashanth updated resume 2024 for Teaching Profession
prashanth updated resume 2024 for Teaching Professionprashanth updated resume 2024 for Teaching Profession
prashanth updated resume 2024 for Teaching Profession
 
An Overview of the Calendar App in Odoo 17 ERP
An Overview of the Calendar App in Odoo 17 ERPAn Overview of the Calendar App in Odoo 17 ERP
An Overview of the Calendar App in Odoo 17 ERP
 
BIOCHEMISTRY-CARBOHYDRATE METABOLISM CHAPTER 2.pptx
BIOCHEMISTRY-CARBOHYDRATE METABOLISM CHAPTER 2.pptxBIOCHEMISTRY-CARBOHYDRATE METABOLISM CHAPTER 2.pptx
BIOCHEMISTRY-CARBOHYDRATE METABOLISM CHAPTER 2.pptx
 
4.9.24 School Desegregation in Boston.pptx
4.9.24 School Desegregation in Boston.pptx4.9.24 School Desegregation in Boston.pptx
4.9.24 School Desegregation in Boston.pptx
 
Blowin' in the Wind of Caste_ Bob Dylan's Song as a Catalyst for Social Justi...
Blowin' in the Wind of Caste_ Bob Dylan's Song as a Catalyst for Social Justi...Blowin' in the Wind of Caste_ Bob Dylan's Song as a Catalyst for Social Justi...
Blowin' in the Wind of Caste_ Bob Dylan's Song as a Catalyst for Social Justi...
 
Employablity presentation and Future Career Plan.pptx
Employablity presentation and Future Career Plan.pptxEmployablity presentation and Future Career Plan.pptx
Employablity presentation and Future Career Plan.pptx
 

The need for a multi perspective approach to solve the d do-s problem.

  • 1. Article Name: The Need for a Multi-Perspective Approach to Solve the DDoS Problem. Author: Jorge Hernandez-Herrero and Jon A. Solworth Bells Labs Technical Journal Distribute denial of service. Distributed denial of service (DDoS) attacks are a common event in today’s Internet, affecting small and large organizations. Criminal organizations use DDoS as the means to carry out extortion. Before engaging a set of compromised hosts in a DDoS attack, attackers must create a DDoS botnet or agent network, coordinate attack activities among them and execute the attack. The distribution and size of attack sources, spoofing, and the use of reflectors make trace back a challenging task. In order to deploy a DDoS solution successfully, it must either be mandated or offer valuable incentives. Another solution for the DDoS attacks is to do a Blackhole routing. Blackhole routing discards all traffic to the victim including legitimate traffic hence, the network and service sub problems are not solved. A benefit of this technique is that it eliminates collateral damage since the filtering of the network address is precise. In essence, solving the DDoS problem requires dealing with a missing piece of functionality in the TCP/IP protocol stack. While the IP layer unifies and identifies the network elements connected to the Internet, it lacks authentication and authorization concepts that can prevent unwanted network traffic.