text-only page produced automatically by LIFT Text Transcoder Skip all navigation and go to page contentSkip top navigation and go to directorate navigationSkip top navigation and go to page navigation
National Science Foundation
Search  
Awards
design element
Search Awards
Recent Awards
Presidential and Honorary Awards
About Awards
Grant Policy Manual
Grant General Conditions
Cooperative Agreement Conditions
Special Conditions
Federal Demonstration Partnership
Policy Office Website


Award Abstract #0430228
Collaborative Research: DefCOM - Distributed Defense against DDoS Attacks


NSF Org: CNS
Division of Computer and Network Systems
divider line
divider line
Initial Amendment Date: September 2, 2004
divider line
Latest Amendment Date: June 24, 2008
divider line
Award Number: 0430228
divider line
Award Instrument: Standard Grant
divider line
Program Manager: Karl N. Levitt
CNS Division of Computer and Network Systems
CSE Directorate for Computer & Information Science & Engineering
divider line
Start Date: September 1, 2004
divider line
Expires: February 28, 2009 (Estimated)
divider line
Awarded Amount to Date: $185130
divider line
Investigator(s): B. David Saunders saunders@udel.edu (Principal Investigator)
Jelena Mirkovic (Former Principal Investigator)
divider line
Sponsor: University of Delaware
210 Hullihen Hall
Newark, DE 19716 302/831-2136
divider line
NSF Program(s): CYBER TRUST
divider line
Field Application(s): 0000912 Computer Science
divider line
Program Reference Code(s): HPCC,9251,9218,9215,9150,7254
divider line
Program Element Code(s): 7371

ABSTRACT

Collaborative Research: DefCOM - Distributed Defense against DDoS



Jelena Mirkovic, University of Delaware

Peter Reiher, UCLA

Award 0430228

Abstract

This project investigates a distributed cooperative solution to the problem of distributed denial-of-service attacks. The proposed defense system, DefCOM, combines the advantages of victim-end defenses (accurate attack detection) and source-end defenses (efficient response and precise separation of the legitimate traffic from the attack traffic). It also enlists the help of backbone routers to control attack traffic in partial deployment scenarios where many potential sources do not deploy a source-end defense.

DefCOM nodes will be deployed in source, victim and core networks, and will cooperate via an overlay to detect and stop attacks. Overlay communication will ensure effective operation even if DefCOM nodes are sparsely and non-contiguously deployed. DefCOM's response to attacks is twofold: defense nodes reduce the attack traffic, freeing the victim's resources; and they also cooperate to detect legitimate traffic within the suspicious stream and ensure its correct delivery to the victim. Because networks deploying defense nodes directly benefit from their operation, DefCOM has a workable economic model to spur its deployment. DefCOM further offers a framework for existing security systems to join the overlay and cooperate in the defense. These features create excellent motivation for wide deployment, and the possibility of a large impact on the DDoS threat.


PUBLICATIONS PRODUCED AS A RESULT OF THIS RESEARCH

(Showing: 1 - 3 of 3).

G. Oikonomou, J. Mirkovic, P. Reiher and M. Robinson.  "A Framework for Collaborative DDoS Defense,"  Proceedings of ACSAC,  2006,  p. 33.

M. Mehta, K. Thapar, G. Oikonomou and J. Mirkovic.  "Combining Speak-up with DefCOM for Improved DDoS Defense,"  Proceedings of ICC,  2008, 

M. Natu and J. Mirkovic.  "Fine-Grained Capabilities for Flooding DDoS Defense Using Client Reputations,"  Proceedings of the Large-Scale Attack and Defense Workshop,  2007, 


(Showing: 1 - 3 of 3).

 

Please report errors in award information by writing to: awardsearch@nsf.gov.

 

 

Print this page
Back to Top of page
  Web Policies and Important Links | Privacy | FOIA | Help | Contact NSF | Contact Web Master | SiteMap  
National Science Foundation
The National Science Foundation, 4201 Wilson Boulevard, Arlington, Virginia 22230, USA
Tel: (703) 292-5111, FIRS: (800) 877-8339 | TDD: (800) 281-8749
Last Updated:
April 2, 2007
Text Only


Last Updated:April 2, 2007