Title | Uninterrupted Video Surveillance in the Face of an Attack |
Publication Type | Conference Paper |
Year of Publication | 2018 |
Authors | Vempati, J, Dantu, R, Thompson, M |
Conference Name | 2018 17th IEEE International Conference On Trust, Security And Privacy In Computing And Communications/ 12th IEEE International Conference On Big Data Science And Engineering (TrustCom/BigDataSE) |
Date Published | Aug |
Keywords | attack mitigation techniques, authorisation, autoregressive processes, burst size parameters, Computer crime, computer network security, DDoS, DDoS attacks, differentiated services code point markdown, DiffServ networks, distributed denial of service attack, DSCP, DSCP Markdown approach, feedback control, feedback mechanisms, Internet, IP networks, Jitter, Mathematical model, micro-firewall, out-of-profile packets, parallel links technique, QoS, quality of service, real-time services, real-time systems, Resilient, Streaming media, system identification technique, uninterrupted video surveillance, video surveillance |
Abstract |
Distributed denial of service (DDoS) attacks continue to plague businesses and consumers alike, and due to an ever-growing digital landscape, these attacks are expected to grow in size and complexity. Current mitigation techniques ranging from hours to days are completely unacceptable given the cost and inconvenience these attacks place in our society. This paper puts forth three feedback control mechanisms to minimize the effects of DDoS attacks on real-time traffic. The first, called differentiated services code point (DSCP) Markdown, is a passive approach that uses micro firewall rules to lower the priority of out-of-profile packets while a second mechanism actively drops the out-of-profile packets based on rate and burst size parameters. The third technique uses parallel links when feedback is applied to stabilize the network after an attack has been detected. Results from all three techniques have shown to have a positive effect on real-time traffic. The first two approaches were able to stabilize network traffic in real-time, while the parallel links technique resulted in a slight delay. We validate the feedback mechanisms with our model that was generated using the system identification technique. Results show that the feedback architecture provides a fit accuracy with positive results. |
DOI | 10.1109/TrustCom/BigDataSE.2018.00121 |