How does one protect themselves against coremelt attacks
Coremelt, a new attack mechanism, where attackers only send traffic between each other, and not towards a victim host. As a result, none of the attack traffic is unwanted. The Coremelt attack is powerful because among N attackers, there are O(N2) connections, which cause significant damage in the core of the network.
The Coremelt attack is a DDoS attack in which large number of subverted sources communicate with each other in such a way that the traffic of each sourcedestination pair traverses through a target core link of the network and the aggregated traffic flows exceeds the link capacity. It has been shown that such an attack can disrupt the operation of the entire Internet by deploying only an averagesize botnet . Conventional authenticity-based mitigation methods fail against the Coremelt attack due to the use of legitimate looking traffic by the botnet. Also, the distributed nature of the subverted sources makes defense techniques such as path tracking or IP traceback more complex.
Step by step
Solved in 2 steps