Port hopping for resilient networks

H.J.C. Lee, V.L.L. Thing
IEEE 60th Vehicular Technology Conference, 2004. VTC2004-Fall. 2004  
With the pervasiveness of the Internet, Denial-of-Service (DoS) and Distributed DoS (DDoS) attacks have become important threats to servers, hosts and devices that are connected. This paper addresses the problem of mitigating the DoS/DDoS attacks so as to ensure that legitimate traffic is given an acceptable level of quality of service. We proposed a new technique, called port hopping where the UDP/TCP port number used by the server varies as a function of time and a shared secret between the
more » ... ecret between the server and the client. The main strength of the mechanism lies in the simplification of both the detection and filtering of malicious attacks packets and that it does not require any change to existing protocols. This port hopping technique is compatible with the UDP and TCP protocols and can be implemented using the socket communications for the UDP protocol, and for setting up TCP communications. We performed both theoretical analysis and empirical studies through actual implementation to study the effectiveness of the scheme against DoS/DDoS flooding attacks. Our experiments show that the port hopping technique is effective in detecting and filtering malicious traffic, and hence improved the reliability of good traffic flow.
doi:10.1109/vetecf.2004.1404672 fatcat:ld3srngycrhc7fs4tp7stuvd6m