%0 Conference Proceedings %T Path Attestation Scheme to Avert DDoS Flood Attacks %+ Department of Computer Science and Engineering %A Bhattacharjee, Raktim %A Sanand, S. %A Raghavan, S. V. %< avec comité de lecture %( Lecture Notes in Computer Science %B 9th International IFIP TC 6 Networking Conference (NETWORKING) %C Chennai, India %Y Mark Crovella; Laura Marie Feeney; Dan Rubenstein; S. V. Raghavan %I Springer %3 NETWORKING 2010 %V LNCS-6091 %P 397-408 %8 2010-05-11 %D 2010 %R 10.1007/978-3-642-12963-6_32 %K DDoS mitigation %K Unspoofable Identity %K Cascaded Filters %Z Computer Science [cs]/Digital Libraries [cs.DL]Conference papers %X DDoS mitigation schemes are increasingly becoming relevant in the Internet. The main hurdle faced by such schemes is the \nearly indistinguishable" line between malicious tra c and genuine tra c. It is best tackled with a paradigm shift in connection handling by attest- ing the path. We therefore propose the scheme called \Path Attestation Scheme" coupled with a metric called \Con dence Index" to tackle the problem of distinguishing malicious and genuine tra c in a progressive manner, with varying levels of certainty. We support our work through an experimental study to establish the stability of Internet topology by using 134 di erent global Internet paths over a period of 16 days. Our Path Attestation Scheme was able to successfully distinguish between malicious and genuine tra c, 85% of the time. The scheme presupposes support from a fraction of routers in the path. %G English %2 https://inria.hal.science/hal-01059127/document %2 https://inria.hal.science/hal-01059127/file/main.pdf %L hal-01059127 %U https://inria.hal.science/hal-01059127 %~ IFIP-LNCS %~ IFIP %~ IFIP-LNCS-6091 %~ IFIP-TC %~ IFIP-TC6 %~ IFIP-NETWORKING %~ IFIP-2010