DDoS defense mechanisms: a state of the art research

Size: px
Start display at page:

Download "DDoS defense mechanisms: a state of the art research"

Transcription

1 DDoS defense mechanisms: a state of the art research C.J.H. Weeïnk c.j.h.weeink@student.utwente.nl ABSTRACT The tools for launching a Distributed Denial-of-Service (DDoS) attack are widely available but there is still a lack of effective mechanisms that defend against such attacks in a reasonable amount of time. This paper presents a research that analyzed the security techniques currently available to reduce the result of DDoS attacks and identifies the technique or combination of techniques that is the most promising. We concluded from our analysis that none of the techniques analyzed fully meet our requirements. A cooperative distributed defense technique with multiple local detection techniques is the most effective. Keywords DDoS, attacks, flooding, defend, traceback, overlay 1. INTRODUCTION With a typical Distributed Denial-of-Service (DDoS) attack, a large number of attacking hosts send useless network packets to crash a victim s computer or to jam his internet connection. If the magnitude of attack traffic is large enough, it has been observed to have noticeable impact in different areas of the Internet [Gar00]. The impact of DDoS attacks has been shown by attacks on Yahoo, CNN, Amazon and several other major sites in February 2000 [Gar00], on GRC.com in January 2002 [Gib02] and on the root DNS servers in In fact, DDoS attacks occur more frequently then reported, because a lot of companies are afraid of bad publicity and more DDoS attacks [GLLR06]. The reason that DDoS attacks occur that frequently is on one hand, the tools for launching a DDoS attack are widely available and on the other hand there still seems to be a lack of effective mechanisms that defend against such attacks in a reasonable amount of time. Therefore, it isn t weird that DDoS attacks are one of the major threats in the Internet and are one of the toughest security problems to solve. This paper presents a state of the art research that analyzes currently used Distributed Denial-of-Service (DDoS) attacks and defense techniques that can be used to prevent or reduce the consequences of such attacks. This is particularly interesting, because no real comparison of different DDoS defense mechanisms can be found in existing literature. The goal of this research is to provide an analysis of security mechanisms currently available to reduce the result of DDoS attacks and to identify which technique or combination of techniques is the most promising for the future. From the goal, we can derive the following research question: Which security methods are currently available to prevent, or reduce, the result of, DDoS attacks and which one is the most promising?. A literature study will be performed to reach the goal. We chose a literature study because this was the most feasible form of research to perform in the amount of time available. Based on the literature, we identify the different types of DDoS attacks that are currently performed and the characteristics of such attacks in general in chapter 2. The DDoS defense mechanisms, that we are going to compare, are listed in chapter 3 along with their advantages and disadvantages. Based on the characteristics from chapter 2, we determine in chapter 4 the requirements DDoS defense mechanisms need to meet in order to offer good protection. In chapter 4 we will also perform an analysis of the previous listed defense mechanisms based on the requirements, their advantages and disadvantages that have been identified earlier. We will conclude this paper with some future topics in chapter 5 and the conclusions in chapter DDOS ATTACKS In this chapter we will describe in section 2.1 how a DDoS attack is constructed in general, then we will discuss different types of DDoS attacks in section 2.2, followed by the characteristics of DDoS attacks in general in section Background In general the DDoS attack network is a hierarchical one. The network contains one or more attacking hosts, a number of handlers and a large number of agents. The attacking hosts are compromised machines that are used for scanning other vulnerable hosts to be added to the network and equip the vulnerable hosts with DDoS attack programs like Trinoo, Tribe Flood Network (TFN), Stacheldraht and Shaft [DM04]. Each attacking host controls a number of handlers, which on their turn control a large number of agents. Handler Attacker Handler Agent Agent Agent Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission. 6th Twente Student Conference on IT, Enschede, 2nd February, 2007 Copyright 2007, University of Twente, Faculty of Electrical Engineering, Mathematics and Computer Science Victim Figure 1. DDoS attack network With the attack network, an attacking host can start an attack by sending an attack command to the handlers. The attack command contains information about the victim and the type

2 and duration of the attack. If the handlers have received the attack command, they will propagate it to the agents, which send the attack data packets to the victim. Currently available DDoS attack tools can launch multiple attacks against multiple victims at the same time and use various types of attack packets. A typical DDoS attack network is listed in Figure 1, a more detailed description of a DDoS attack network can be found in [DLD00]. 2.2 Attack types DDoS attacks can be classified into two categories: bandwidth depletion and resource depletion attacks, according to [ZP04], [DM04] and [DM03]. A bandwidth depletion attack is designed to flood the victim s network with unwanted traffic that prevents legitimate traffic from reaching the victim s system. Bandwidth attacks can be divided in flood attacks and amplification attacks. With flood attacks, attacking hosts send a large amount of traffic directly to the victim in order to jam his internet connection. Instead of sending the attack traffic directly to the victim, amplification attacks use legacy intermediate hosts to amplify and reflect attack traffic for a certain victim [DM04]. Such legacy intermediate hosts are called reflectors and can be any host that returns a packet when it receives one [Pax01]. A resource depletion attack is an attack that is designed to tie up the resources of a victim s system. This type of attack can be divided in protocol exploit attacks and malformed packet attacks. Protocol exploit attacks try to tie up the resources of a victim s system by exploiting a certain feature of a protocol, or a bug in a certain protocol implementation. Malformed packet attacks try to crash a victim s system by sending incorrect data packets. 2.3 Characteristics From the information gathered so far, we are able to extract a couple of general characteristics of DDoS attacks. These characteristics are used in the next chapter to identify the requirements that DDoS defense mechanisms should meet. The most important characteristic of DDoS attacks is that they send a large amount of traffic to the victim, in the hope that the victim cannot handle it and will be overwhelmed. During a DDOS attack, a single agent only sends a small amount of packets which may be small enough not to be marked as suspicious. Because there a large number of agents, together they cause the victim to receive a lot of traffic. For defense mechanisms it is difficult to distinguish attack packets from normal packets, as the amount of packets send to the victim is the only thing that counts. If the packets exploit certain Internet protocols or if they are malformed, it is easier to detect them as are violating certain protocol rules. However, this detection should take place at several nodes in a network, which is hard to do in the Internet. A lot of DDoS attacks use spoofed IP addresses to hide the identity of the attacker or the attacking hosts, or in the case of a reflector attack to specify the victim s address. DDoS attack traffic that has been generated by widely available tools often has some identifying characteristics, which make it possible to perform a statistical analysis on the traffic. But as these tools evolve, they will become more advanced and identifying them will become harder [ZP04]. In comparison with other Internet threats and attacks, like viruses, DDoS attacks do not infiltrate the victim s computer. Rather, they try to overwhelm the network connections of the victim, making the level of defense on the victim s computer irrelevant [GW00]. 3. DDOS DEFENSE MECHANISMS In this section we will discuss the various DDoS defense mechanisms that we will analyze in this paper. For each mechanism a description and its advantages and disadvantages will be listed. While quite a few mechanisms based on IP traceback are available, we won t discuss all of them in this paper because the major drawback of path reconstruction is that a high number of routers have to participate in packet marking. D-WARD [MPR02] extends MULTOPS [GP01] with UDP and ICMP attack detection and is constructed similar as MULTOPS. Because D-WARD can detect a broader range of DDoS attacks and has less collateral damage [MPR02], we will not consider MULTOPS in this paper. 3.1 Secure Overlay Service (SOS) The Secure Overlay Service (SOS) by [KMR04] introduces a secure overlay network around a target to be protected. The target is protected by the network around it, which is aggressively blocking all traffic to the target that hasn t been marked as approved. The list of nodes which are approved by the filter are kept secret, these nodes are the servlets. If a sender wants to send packets to a destination that is protected by a secure overlay network, he must authenticate itself at an access point of the secure overlay network. If the sender is authenticated successfully, the access point routes the packets to a beacon. The only function of a beacon is to route a packet to a servlet known to the beacon or to another beacon if it doesn t know the servlet for the target. A servlet decides, based on a hash function, which beacons are allowed to communicate with it. As a single access point, beacon or secret servlet doesn t provide a strong protection, redundancy should be added to the network. An advantage of this approach is that it is possible for the architecture to heal itself. If a node is attacked, it can exit the overlay and the path determination algorithm will provide a new path in the secure overlay. Another advantage is that it is possible to create a route to the target which isn t known to an external attacker who wants to attack that target. A major disadvantage of this system is that the security of the system is determined at its border. If an attacker manages to authenticate himself successfully at an access point, he can perform a DDoS attack to a victim protected by the secure overlay, because the nodes after an access point assume that the packets they receive are authenticated and are from a valid sender. Another disadvantage is that the path from the sender to the target is rerouted through the nodes in the overlay network. In some cases this can cause the latency to be ten times larger than it would have been in the case of a direct connection [KMR04]. 3.2 Pi The Pi technique described by [YPS03] adds a fingerprint to each data packet of the path traversed through the Internet. Packets that are received via the same path contain the same path fingerprint. While the data packets traverse the Internet, each router they visit updates a certain part of the fingerprint. When the data packets arrive at the victim, a filter checks if the fingerprints are

3 on a packet marking list and drops the marked packets if that is the case. The packet marking list is constructed during a learning phase, where an algorithm running at the victim determines if a certain marking has to be added to the packet marking list or not. An advantage of this technique is that different filters can be implemented and used at the same time, offering protection to different types of attacks. A major disadvantage of this approach is that a lot of nodes in the Internet must be deployed with the packet marking algorithm. Because that means that a lot of network administrators should add this algorithm to their routers, this is unlikely to happen. Another disadvantage of this approach is that a machine close to the victim has to decide which packets should be dropped and which not. If the attack traffic volume is big enough, it will be possible to fill the network connection of that machine. As a result, the level of quality of legitimate traffic will be affected if the number of attackers increases or if the amount of attack traffic increases. A third disadvantage is that the Pi filter doesn t automatically calculate the severity of the attack. If the severity of the attack increases, the victim has to change the acceptance threshold of the filter. If the victim doesn t do this, a lot of legitimate packets will also be dropped. 3.3 D-WARD D-WARD as described by [MPR02] is an autonomous DDoS defense system that filters DDoS attack packets close at the source. In order to offer a good protection, D-WARD needs to be installed on all gateways that connect the deploying network with the Internet. The system monitors the two-way traffic between the deploying network and the Internet, looking for communication difficulties like a reduction in the number of response packets or an increase of the packet arrival times. The observed values are periodically compared with a predefined model. When anomalies are detected, the system will respond by rate limiting the outgoing suspicious flow in proportion to its aggressiveness. If subsequent observation confirms the hypothesis, the rate of the flow will be limited more, if that is not the case the rate will be increased slowly. The quality of flows that are not marked as suspicious will stay at a good level. An advantage of this system is that it offers protection against DDoS attacks both from the Internet to the protected network as from the protected network to the Internet. Another advantage of this system is that it can autonomously run on different nodes, which connect the network to the Internet. That means, that if DDoS attack traffic is routed via different gateways, the D-WARD system has to handle less packets then it would have had if it was processed in a single point of the network. But at the same time this is also a disadvantage in that D- WARD must be deployed at one border router, which is very unlikely in today s Internet structure. Another advantage of this system is that only a small amount (1% - 1.5%) of good traffic is being dropped [MPR02]. However if legitimate connections are made during the beginning of the attack, they may suffer poor quality because the DDoS attack traffic hasn t been limited properly yet. Another disadvantage is that D-WARD can t recognize flooding periods of a pulsing attack as one attack, rather the system sees it as separate attacks. Neither does the system provide good protection against DDoS attacks that use UDP. As the system currently only detects UDP attacks that use spoofed IP addresses or generates high-rate floods. 3.4 Cooperative DDoS detection approach The cooperative DDoS detection approach by [ZP04] describes a technique that uses multiple distributed systems to detect DDoS attacks by looking for anomalies in network traffic profiles constructed by certain algorithms. A single detection node communicates with its neighbors via a gossip-based protocol [GBR02]. The neighbors of a certain node are determined by the overlay network that is constructed. An advantage of this approach is that if one of the detection systems is hit by a DDoS attack itself, the nodes in the network can reorganize themselves in such a way that the attacked detection system is circumvented in the communication. The detection systems are deployed on the gateways that connect the deploying network with the Internet, to monitor a certain part of the network. The system keeps track of destinations whose traffic occupies more than a certain fraction of the capacity of the outgoing link. If a certain detection node detects anomalies in the traffic statistics, it sends the detection information for a certain destination to a couple of neighbor nodes in the overlay network. At any time it will send the information to the node that is on the path to the destination, other nodes will receive the information with a certain probability. An advantage of this technique is that the communication overhead is kept low, while maintaining a high accuracy. Only detection systems that are next on the path to the destination receive the information immediately with a high priority, other nodes receive the same information after a while. Another advantage of this technique is that compromised detection nodes have little impact on the total detection. If a detection node sends malicious information to hide an ongoing attack, only a small number of other nodes will receive this information. As these nodes combine the malicious information with received information from other nodes in the network, the combined information will not trigger the attack notification to other nodes. A disadvantage of this system is that a single detection node doesn t know a lot of the topology of the detection network, it only knows its direct neighbors. If a single node knows more about the topology, the number of messages exchanged can be decreased even more. Another disadvantage of this technique is that it hasn t been tested with real network data yet, only simulations. Therefore, it is unknown how this technique will perform in a real environment. 3.5 IP traceback-based packet filtering The IP traceback-based packet filtering technique by [MJ03] is a technique that uses IP traceback to reconstruct the attack paths to decide which packets should be dropped. A set of upstream routers, which are passed by traffic before the gateway of the victim s network is reached, collaboratively inspect packets going through them. A module running on the victim or on the border gateway of the victim site decides if certain packets are part of a DDoS attack and reconstructs the attack path based on the traceback information in the data packet headers. The module running on the victim, will report the decision to the upstream routers. During the inspection of the data packets

4 passing through these routers, certain packets will be dropped if the path fingerprint matches one of the fingerprints reported from the victim s module. The communication between the module running on the victim and the upstream routers is about 5%. Given today s fast network connections, this is an acceptable fraction and as such, it can be seen as an advantage. While this technique does improve the throughput of legitimate traffic, a lot of legitimate traffic is still being dropped. This is a major disadvantage, as a result one has to use other, more effective techniques combined with this technique to provide an effective defense. Another major disadvantage of this technique is that it requires a lot of Internet routers to participate in the path marking of the packets, just like the Pi method mentioned previously. 3.6 Pushback The Pushback technique, as discussed by [IB02], is a technique where routers work together to handle the congestion created by DDoS attacks by applying rate limits on links going to congested routers. If the Pushback algorithm detects congestion on an outgoing link from the router it is running on, it will apply a rate limit to that link and drop packets that satisfy the congestion signature. At the same time, information about traffic that matches the signature, will be send to upstream routers telling them to rate-limit that traffic. The major advantage of Pushback is that it tries to prevent scarce upstream bandwidth from being wasted on packets that will be dropped downstream. In order to do so, Pushback can control the rate-limit itself. If it finds congestion on a link, it will ask the other routers to apply a rate limit, but if the congestion is gone, it will send a cancel message to the routers on the incoming links. Another advantage of this technique is that at each round only one message is send to each router that has an outgoing connection to the router that is the sender of the message. Because the messages could also be sent from nodes other than neighboring routers, these messages are secured via a TTL number of 255. This is sufficient, because any message coming from an attacker will have a lower TTL. If an attacker has compromised a router, there are more serious concerns to be resolved. A disadvantage of this technique is that a certain number of routers should be deployed with it. If a router doesn t have Pushback deployed, it will discard the Pushback messages. As a result, it doesn t put a rate limit on its outgoing connection, something where the sender of the message did ask for. Another disadvantage is that administrators of network domains have to create an agreement on how Pushback between their domains has to be realized in order to provide a more effective defense. 4. ANALISYS In this section we will analyze the DDoS defense mechanisms introduced in section 3. In section 4.1 we will determine the requirements which the techniques have to meet in order to be effective. In section 4.2 we will discuss all the DDoS defense mechanisms described in chapter 3 based on the requirements. We conclude this section by a comparison of the best technique or combination of techniques. 4.1 Requirements In order for a DDoS defense mechanism to be effective, it should meet a couple of requirements. Based on the characteristics of DDoS attacks discussed in section 2.2, we will discuss the requirements for DDoS defense mechanisms in this section. The major requirement that an effective DDoS defense mechanism should meet, is that it should be able to reduce the attack traffic volume to such a level that it becomes manageable again. This requirement is very important because, if DDoS defense mechanisms don t reduce the attack volume enough, the victim will still have problems coping with the huge amount of traffic. Another major requirement is that the false ratios should be low. If the false positives ratio is high, a lot of legitimate packets will be recognized as being attack packets and will be dropped. If the false negatives ratio is high, a lot of attack packets will be recognized as being legitimate traffic and will still be sent to the victim. It is important to keep these values as low as possible in order to provide a good quality of service to legitimate clients. The third requirement is that the performance impact should be low. This includes both the time it takes to process a packet, as well as the resources needed to perform the processing. We included this as a requirement, because a defense mechanism may be very good, but if it takes very long to process a packet, the victim can t provide a good service. The fourth requirement is that not most or all routers in a network should be deployed with the defense mechanism. A subset of all the routers in a network must be able to provide an effective defense. In our opinion this is an important requirement as it is infeasible to equip all routers with a certain defense structure for a couple of reasons. The most important reason is that it is unlikely that administrators of connected network domains are going to create an agreement on how a DDoS defense mechanism between their domains has to be realized, due to the fact that they would have to create an agreement for each connected network. The final requirement is that the DDoS defense mechanism must be transparent to users. This means that legitimate clients must not have to manually perform an action in order to have their data be recognized by the system. Neither should the network administrators have to configure the defense mechanism again after or at the beginning of a DDoS attack, as this would be too time consuming. 4.2 Mechanisms We will now discuss all the DDoS defense mechanisms described in chapter 3 based on the requirements described in the previous section Secure Overlay Service (SOS) The Secure Overlay Service (SOS) described in [KMR04] reduces the attack traffic very good if the attacker is outside the SOS network. If a packet hasn t been authenticated on an access point, it will be dropped on all overlay nodes. However, if an attacker managed to authenticate himself to the access point, all his packets are sent to the victim without any filtering. In that case the number of false negatives is very high. Also, if the number of the different types of overlay nodes is small, an attacker can easily prevent legitimate traffic from reaching the target by successfully attacking any of these nodes.

5 The performance impact of the overlay network on the data packets is quite high compared to a direct connection, the latency increases by a factor The latency of a packet is determined by the number of nodes participating in the SOS, the speed of the links between the different nodes, and the number of hops a packet has to take. Combined, these factors make it possible that the latency of packets can become very high. However, if shortcuts are used in the routing algorithm, it is possible to decrease the latency to about a factor of 2. The performance of the healing capability of the network is quite good however. If a couple of nodes are under attack and leave the network, the network can recover itself in about 10 seconds. As stated before, the more nodes in the network, the better the protection will be. This however will also lead to an increased latency, as we saw before. Because the overlay nodes don t have to be routers necessarily, the deployment of SOS is not restricted to a certain number of nodes and can be determined by the administrator of the network domain. The only requirement on the deployment, is that the nodes should be located as close to the Internet core as possible, because higher speeds can then be achieved. Maintenance of the overlay nodes is easy to perform, as one can simply take down a certain node, as the overlay will recover itself. The transparency of the system is a different story however. Where the victim only needs to configure a couple of routers so that they accept traffic from a couple of servlets and drop the rest, clients of the victim s service need to authenticate them. Depending on the type of authentication used, it may require a lot of user intervention Pi The Pi technique described in [YPS03] doesn t reduce the traffic that good. A packet is only dropped if its identifier is on a packet marking list, otherwise it is allowed to pass to the victim. The packet marking list is constructed during a learning phase, so if an attacker starts sending attack traffic after the learning phase, the attack packets will still be received by the victim. Because the Pi marking algorithm overwrites a couple of bits of the IP Identification field in the packet s IP header, the attacker should at least be a certain number of hops away, to make sure that all bits in the IP Identification field have been overwritten. If an attacker is less than that number of hops away, some of the bits provided by the attacker make it to the victim, allowing the attacker to use markings that are not on the list. If one of those two conditions is met, too much attack traffic is seen as legitimate traffic, which doesn t comply with our requirement that the false ratios should be low. The performance impact of this technique is quite low, so this does meet our requirements. Each router that has to update a small number of bits of the IP Identification field just has to execute a small number of bit-wise operations. The performance impact at the victim or its gateway is also quite low, as it just has to iterate through the packet marking list to see if a certain packet should be dropped or not. Our deployment requirement isn t met either. This technique requires a lot of routers to participate, if less than half of all routers participate, the performance is too low to be effective [YPS03]. If a lot of routers participate, the performance doesn t improve that much either. This is due to the probability that a certain bit of the IP Identification field is overwritten by a router has been written before by another router. If the number of routers increases, this probability also increases. Neither is this technique very transparent to users and network administrators. The victim first has to go through a learning phase in which it has to determine which packets may pass and which not. The network administrators also have to specify a couple of settings at each router. These settings include the number of bits that are written, and at which router the marking should stop (by specifying the minimum number of routers there should be between the victim and the last router to mark the packet). The number of bits written at each router should also be the same on all routers that participate in this technique D-WARD The D-WARD technique described in [MPR02] reduces the attack traffic volume very well. During the beginning of an attack, a lot of attack traffic will still make it to the victim, because D-WARD is still gathering statistics of the attack traffic. However, during this phase it does already reduce the volume a bit based on the amount of traffic received so far. If the newly gathered statistics confirm the attack again, the attack flow will be reduced very fast. Due to the detection phase at the beginning of an attack, a lot of attack traffic will not yet be detected being attack traffic in the beginning. So in the beginning of an attack, it doesn t meet our requirement of low false ratios. A couple of seconds after the beginning of an attack, if the detection phase has ended, the ratios will be at an acceptable level around 1%. However, if a protocol contains a lot of asymmetry, like UDP does, it is harder for D-WARD to detect an attack, as a result more attack traffic will reach the victim than it would have with more symmetric protocols. As a result we can say that it doesn t meet the requirement as it fails at a couple of important points. The impact of the performance does meet our requirements. The latency added by this technique is in the range of a couple of milliseconds and the memory usage is less than a couple of megabytes, even during heavy attacks. Because this technique has to see all traffic that passes along, it has to be deployed on the border routers of the network. Because D-WARD runs autonomously on a single router and doesn t contain the ability to cooperate with other D-WARD systems, there is a problem deploying this technique in today s networks as most of them have multiple gateways. Nonetheless, D-WARD doesn t require a lot of routers participating in the defense and as such it does meet our requirement. D-WARD does also meet our final requirement that it should be transparent to users. The administrator of the deploying network domain only has to specify the set of IP addresses that should be protected Cooperative DDoS detection approach The Cooperative DDoS detection approach described in [ZP04] reduces the attack traffic quite well. Just as the D-WARD technique described above, this technique also has a detection phase in which it gathers statistics about the attack. If a certain node detects an attack, it will start to take counter measures and in about a minute more nodes will start to do the same so that the attack traffic rapidly reduces. Again, during the detection phase a lot of attack packets will still make it to the victim. If the detection phase is over however, not much packets will be incorrectly marked because of the cooperative element. This does meet our requirement that the false ratios should be low. The performance impact is also quite low. During a DDoS attack the nodes exchanges a small amount of messages each

6 round. If a node detects a DDoS attack, it will directly send a message to its neighbor nodes on the path to the victim. All other neighbors will receive the same message immediately with a certain probability. The latency added by the detection algorithm depends on the algorithm used, but we assume that an algorithm will be chosen that only requires a small amount of time and resources. Based on this assumption, we can say that the performance requirement is met by this technique. Because this technique uses an overlay network, not every router in the network has to be deployed with a detection system, so it does meet our deployment requirement. Because the nodes of the overlay don t have to be physical neighbors and because they use their own protocol, legacy routers don t provide any difficulties for the deployment. This technique is also very transparent. The only thing that has to be configured on a node is the set of addresses that form the neighbors of a certain node. So it does also meet our final requirement IP traceback-based packet filtering The IP traceback-based packet filtering technique in [MJ03] reduces the attack traffic quite good too. Because the module on the victim reconstructs the attack path and reports this path to be blocked to the upstream routers if a DDoS attack is being detected, legitimate traffic traveling via those paths will also suffer a lot of collateral damage. Because of the collateral damage, a lot of legitimate packets will be detected as being attack traffic, which increases the false negative ratio. As a result, it doesn t meet our requirement that the false ratios should be low. The performance of this system is not that bad anyway. Just 5% of the available bandwidth is used for communication between the different modules, resulting in a slightly slower attack path reconstruction that normally would happen in an IP traceback algorithm. Because packets are dropped if they are not in a list, the performance of the filtering algorithm in the upper stream routers is good too, meeting our requirement. The deployment of this technique is also a problem just like the Pi technique described in section Because the module running on the victim s site has to reconstruct the path, a lot of routers need to participate in marking the packets. Otherwise a lot of so-called gaps will occur in the mark, allowing the attacker to have influence in the decision to drop a packet or not. So our deployment requirement isn t met either. Neither does this technique meet our transparency requirement, as a user has to specify the markings that should be blocked Pushback The Pushback technique described in [IB02] reduces the attack traffic quite good. However, if the attacking hosts are distributed equally across the different incoming links, Pushback can hardly tell the difference between legitimate and attack packets, increasing the false positives ratio. As a result it doesn t meet our requirement that the false ratios should be low. The performance impact on the other hand is very low. Because Pushback was implemented on a software router, a lot of the actions happened at kernel level. As a result, the performance wasn t degraded very much. On a hardware router the performance can be a lot worse, because traffic is handled on a couple of fast-switching paths. One can overcome this problem by using the information report functionality which is built into a lot of routers already, a dedicated machine can then execute the Pushback algorithm. Assuming that hardware routers use a dedicated machine to execute this technique, it does meet our requirement that the performance impact should be low. The deployment of this technique is a bit problematic, because Pushback requires a lot of routers to participate. If a lot of routers participate, the rate-limiting and dropping of packets can happen as far from the victim as possible. Otherwise it might be possible that Pushback lowers the quality of its connection with the Internet. Because Pushback basically requires all routers to be deployed with it, it doesn t meet our deployment requirement. 4.3 Comparison Based on the information discussed in section 4.2, we can conclude that none of the techniques listed fully meet our requirements. Techniques like Pi, IP traceback-based packet filtering and Pushback, require a lot of routers to participate in the defense in order to be effective. Such techniques are unlikely to be deployed in practice, because that would mean that a lot of network domain administrators would have to create agreements how the techniques between their domains have to be realized, in order to provide an effective defense. Techniques that rely on a single authentication point, like SOS, are also unlikely to be deployed, because if an attacker manages to authenticate himself, all his traffic will be assumed as being legitimate and will make it to the victim. On the other hand, techniques that build large-scale, selforganizing and resilient overlay networks on top of the Internet, can deliver attack information with speed and reliability between the nodes of the overlay network [ZP04]. In today s networks, finding a larger network with a single entry point is very rare. As a consequence, detection mechanisms that only autonomously run on a single access point and inspect the data they receive are very error prone because they can t get a total view of all the traffic going in and out [MPR02]. A single detection point is also an easy target for attackers. If they manage to successfully attack it, the defense of the whole network will be gone. That s why it is better to have a distributed defense system that is deployed on different points in the network, as it can also cover diverse choices of agents and victims [MR04]. If nodes of the distributed system also have the possibility to communicate with each other, errors will be reduced even more [ZP04]. Based on this information, a technique that would fulfill most of the requirements will be a cooperative distributed defense mechanism, like the Cooperative DDoS detection approach, that uses multiple lightweight local detection techniques, like D- WARD. The Cooperative DDoS detection approach hasn t been tested in practice yet, so it is possible that it doesn t perform that good as it did in the simulations. Even if it doesn t perform that well in practice, a cooperative distributed defense mechanism is still the best solution, as we pointed out above. The D-WARD technique on the other hand has a problem with asymmetric protocols. Because we recommend using multiple lightweight local detection techniques, it s necessary to add a technique which doesn t have this problem, in order to make an effective local detection technique. 5. FUTURE WORK In this section we will discuss the items that we can expect to happen in the future related to the techniques and attacks discussed in this paper. While attackers don t sit still and keep evolving their tools, researchers don t sit still either. As we discussed in this paper,

7 not all techniques were tested in a realistic environment, while a couple of techniques used traces recorded during network traffic experiments, others were tested with small-scale experiments. However, no large-scale test beds are currently available to perform an extensive analysis. But it is possible that this will change in the near future, as the US National Science Foundation is currently funding development of a large-scale cyber security test bed and has sponsored research efforts to design measurement methodology for security systems evaluation [MR04]. Such a test bed also enables a more thorough analysis of DDoS defense methods, because it is then possible to compare the performance of the different methods in the same environment. The techniques we discussed here, also require some further research. For example, the Cooperative DDoS detection approach has only been tested on simulations. While the results are quite promising, it hasn t been tested in practice yet, further research is needed to see if it works in practice. The D-WARD technique also needs further research as it can t properly handle asymmetry that might occur, at the beginning of an attack or in legitimate UDP traffic. 6. CONCLUSIONS The goal of this research was to analyze the security mechanisms currently available to reduce the result of DDoS attacks and to identify which technique or combination of techniques is the most promising for the future. We first identified a couple of DDoS defense mechanisms available and discussed them with their advantages and disadvantages in chapter 3. Based on the requirements DDoS defense mechanisms should fulfill, we performed an analysis in chapter 4. The conclusion we draw from our analysis in chapter 4, is that none of the techniques listed fully meet our requirements. As a result a combination of different mechanisms should be used in order to meet our requirements from section 4.1. From the comparison in section 4.3 we learned that a cooperative distributed defense mechanism is the most effective for defending against DDoS attacks. The new technique should consist of the Cooperative DDoS detection approach, which uses multiple lightweight local detection techniques, like D- WARD. However, both of these techniques still require an amount of future research as we described in chapter 5. To conclude, as long as the defense of computers in the Internet will be bad, it will be possible to perform DDoS attacks [GW00]. While it is hard to achieve a completely safe Internet, all small pieces can make a difference. While a couple of DDoS defense mechanisms can be deployed very easily, it isn t completely free of problems as we have shown in this paper. Most of these problems arise from the fact that the Internet is deployed as a lot of small networks maintained by different companies in different countries. REFERENCES [Gar00] L. Garber, Denial-of-service attacks rip the internet, Computer, vol. 33:4, pp , [Gib02] S. Gibson, Distributed Reflection Denial of Service: Description and Analysis of a Potent, Increasingly Prevalent, and Worrisome Internet Attack, February 22, 2002, Retrieved September 17, 2006, from [GLLR06] L. A. Gordon, M. P. Loeb, W. Lucyshyn, and R. Richardson, 2006 CSI/FBI Computer Crime and Security Survey, Computer Security Institute [DM04] C. Douligeris and A. Mitrokotsa, DDoS attacks and defense mechanisms: classification and state-of-theart, Computer Networks, vol. 44:5, pp , [DLD00] S. Dietrich, N. Long, and D. Dittrich, Analyzing Distributed Denial of Service Tools: The Shaft Case, in Proceedings of the 14th USENIX Conference on System Administration, New Orleans, Louisiana, United States of America, 2000, pp [DM03] C. Douligeris and A. Mitrokotsa, DDoS attacks and defense mechanisms: a classification, in Proceedings of the 3rd IEEE International Symposium on Signal Processing and Information Technology, Darmstadt, Germany, 2003, pp [Pax01] V. Paxson, An analysis of using reflectors for distributed denial-of-service attacks, ACM Computer Communications Review, vol. 31:3, pp , [ZP04] G. Zhang and M. Parashar, Cooperative Mechanisms for Protection against Distributed Network Attacks, p. 14, [GW00] X. Geng and A. B. Whinston, Defeating distributed denial of service attacks, IT Professional, vol. 2:4, pp , [MPR02] J. Mirkovic, G. Prier, and P. Reiher, Attacking DDoS at the source, in Proceedings of the 10th IEEE International Conference on Network Protocols, Paris, France, 2002, pp [GP01] T. M. Gil and M. Poletto, MULTOPS: a datastructure for bandwidth attack detection, in Proceedings of the 10th USENIX Security Symposium, Washington, D.C., United States of America, 2001, pp [KMR04] A. D. Keromytis, V. Misra, and D. Rubenstein, SOS: an architecture for mitigating DDoS attacks, IEEE Journal on Selected Areas in Communications, vol. 22:1, pp , [YPS03] A. Yaar, A. Perrig, and D. Song, Pi: a path identification mechanism to defend against DDoS attacks, in Proceedings of the 2003 IEEE Symposium on Security and Privacy, Berkeley, California, United States of America, 2003, pp [GBR02] I. Gupta, K. P. Birman, and R. van Renesse, Fighting fire with fire: using randomized gossip to combat stochastic scalability limits, Special Issue Journal Quality and Reliability Engineering International: Secure, Reliable Computer and Network Systems, vol. 18:3, pp , May/June [MJ03] [IB02] S. Minho and X. Jun, IP traceback-based intelligent packet filtering: a novel technique for defending against Internet DDoS attacks, IEEE Transactions on Parallel and Distributed Systems, vol. 14:9, pp , J. Ioannidis and S. M. Bellovin, Implementing Pushback: Router-Based Defense Against DDoS Attacks, in Proceedings of the 9th Symposium of Network and Distributed Systems Security, San Diego, California, United States of America, [MR04] J. Mirkovic and P. Reiher, A taxonomy of DDoS attack and DDoS defense mechanisms, SIGCOMM Computer Communication Review, vol. 34:2, pp , 2004.

Your projected and optimistically projected grades should be in the grade center soon o Projected: Your current weighted score /30 * 100

Your projected and optimistically projected grades should be in the grade center soon o Projected: Your current weighted score /30 * 100 You should worry if you are below this point Your projected and optimistically projected grades should be in the grade center soon o Projected: Your current weighted score /0 * 100 o Optimistic: (Your

More information

Distributed Denial of Service (DDoS)

Distributed Denial of Service (DDoS) Distributed Denial of Service (DDoS) Defending against Flooding-Based DDoS Attacks: A Tutorial Rocky K. C. Chang Presented by Adwait Belsare (adwait@wpi.edu) Suvesh Pratapa (suveshp@wpi.edu) Modified by

More information

DDoS PREVENTION TECHNIQUE

DDoS PREVENTION TECHNIQUE http://www.ijrst.com DDoS PREVENTION TECHNIQUE MADHU MALIK ABSTRACT A mobile ad hoc network (MANET) is a spontaneous network that can be established with no fixed infrastructure. This means that all its

More information

A TWO LEVEL ARCHITECTURE USING CONSENSUS METHOD FOR GLOBAL DECISION MAKING AGAINST DDoS ATTACKS

A TWO LEVEL ARCHITECTURE USING CONSENSUS METHOD FOR GLOBAL DECISION MAKING AGAINST DDoS ATTACKS ISSN: 2229-6948 (ONLINE) ICTACT JOURNAL OF COMMUNICATION TECHNOLOGY, JUNE 2010, VOLUME: 01, ISSUE: 02 DOI: 10.21917/ijct.2010.0013 A TWO LEVEL ARCHITECTURE USING CONSENSUS METHOD FOR GLOBAL DECISION MAKING

More information

Distributed Denial-of-Service Attack Prevention using Route-Based Distributed Packet Filtering. Heejo Lee

Distributed Denial-of-Service Attack Prevention using Route-Based Distributed Packet Filtering. Heejo Lee CERIAS Security Seminar Jan. 17, 2001 Distributed Denial-of-Service Attack Prevention using Route-Based Distributed Packet Filtering Heejo Lee heejo@cerias.purdue.edu Network Systems Lab and CERIAS This

More information

Distributed Denial of Service

Distributed Denial of Service Distributed Denial of Service John Ioannidis ji@research.att.com AT&T Labs Research Joint work with Steve Bellovin, Matt Blaze (AT&T), Sally Floyd, Vern Paxson, Scott Shenker (ICIR), Ratul Mahajan (University

More information

TO DETECT AND RECOVER THE AUTHORIZED CLI- ENT BY USING ADAPTIVE ALGORITHM

TO DETECT AND RECOVER THE AUTHORIZED CLI- ENT BY USING ADAPTIVE ALGORITHM TO DETECT AND RECOVER THE AUTHORIZED CLI- ENT BY USING ADAPTIVE ALGORITHM Anburaj. S 1, Kavitha. M 2 1,2 Department of Information Technology, SRM University, Kancheepuram, India. anburaj88@gmail.com,

More information

An Efficient and Practical Defense Method Against DDoS Attack at the Source-End

An Efficient and Practical Defense Method Against DDoS Attack at the Source-End An Efficient and Practical Defense Method Against DDoS Attack at the Source-End Yanxiang He Wei Chen Bin Xiao Wenling Peng Computer School, The State Key Lab of Software Engineering Wuhan University, Wuhan

More information

DoS Attacks. Network Traceback. The Ultimate Goal. The Ultimate Goal. Overview of Traceback Ideas. Easy to launch. Hard to trace.

DoS Attacks. Network Traceback. The Ultimate Goal. The Ultimate Goal. Overview of Traceback Ideas. Easy to launch. Hard to trace. DoS Attacks Network Traceback Eric Stone Easy to launch Hard to trace Zombie machines Fake header info The Ultimate Goal Stopping attacks at the source To stop an attack at its source, you need to know

More information

TRACEBACK OF DOS OVER AUTONOMOUS SYSTEMS

TRACEBACK OF DOS OVER AUTONOMOUS SYSTEMS TRACEBACK OF DOS OVER AUTONOMOUS SYSTEMS Mohammed Alenezi 1 and Martin J Reed 2 1 School of Computer Science and Electronic Engineering, University of Essex, UK mnmale@essex.ac.uk 2 School of Computer

More information

Denial of Service. Serguei A. Mokhov SOEN321 - Fall 2004

Denial of Service. Serguei A. Mokhov SOEN321 - Fall 2004 Denial of Service Serguei A. Mokhov SOEN321 - Fall 2004 Contents DOS overview Distributed DOS Defending against DDOS egress filtering References Goal of an Attacker Reduce of an availability of a system

More information

Inter-domain routing validator based spoofing defence system

Inter-domain routing validator based spoofing defence system University of Wollongong Research Online Faculty of Informatics - Papers (Archive) Faculty of Engineering and Information Sciences 2010 Inter-domain routing validator based spoofing defence system Lei

More information

International Journal of Scientific & Engineering Research, Volume 7, Issue 12, December ISSN

International Journal of Scientific & Engineering Research, Volume 7, Issue 12, December ISSN International Journal of Scientific & Engineering Research, Volume 7, Issue 12, December-2016 360 A Review: Denial of Service and Distributed Denial of Service attack Sandeep Kaur Department of Computer

More information

Correlation Based Approach with a Sliding Window Model to Detect and Mitigate Ddos Attacks

Correlation Based Approach with a Sliding Window Model to Detect and Mitigate Ddos Attacks Journal of Computer Science Original Research Paper Correlation Based Approach with a Sliding Window Model to Detect and Mitigate Ddos Attacks 1 Ayyamuthukumar, D. and 2 S. Karthik 1 Department of CSE,

More information

Combining Speak-up with DefCOM for Improved DDoS Defense

Combining Speak-up with DefCOM for Improved DDoS Defense Combining Speak-up with DefCOM for Improved DDoS Defense Mohit Mehta, Kanika Thapar, George Oikonomou Computer and Information Sciences University of Delaware Newark, DE 19716, USA Jelena Mirkovic Information

More information

DDOS Attack Prevention Technique in Cloud

DDOS Attack Prevention Technique in Cloud DDOS Attack Prevention Technique in Cloud Priyanka Dembla, Chander Diwaker CSE Department, U.I.E.T Kurukshetra University Kurukshetra, Haryana, India Email: priyankadembla05@gmail.com Abstract Cloud computing

More information

Experience with SPM in IPv6

Experience with SPM in IPv6 Experience with SPM in IPv6 Mingjiang Ye, Jianping Wu, and Miao Zhang Department of Computer Science, Tsinghua University, Beijing, 100084, P.R. China yemingjiang@csnet1.cs.tsinghua.edu.cn {zm,jianping}@cernet.edu.cn

More information

Basic Concepts in Intrusion Detection

Basic Concepts in Intrusion Detection Technology Technical Information Services Security Engineering Roma, L Università Roma Tor Vergata, 23 Aprile 2007 Basic Concepts in Intrusion Detection JOVAN GOLIĆ Outline 2 Introduction Classification

More information

CSE 565 Computer Security Fall 2018

CSE 565 Computer Security Fall 2018 CSE 565 Computer Security Fall 2018 Lecture 19: Intrusion Detection Department of Computer Science and Engineering University at Buffalo 1 Lecture Outline Intruders Intrusion detection host-based network-based

More information

Denial of Service (DoS)

Denial of Service (DoS) Flood Denial of Service (DoS) Comp Sci 3600 Security Outline Flood 1 2 3 4 5 Flood 6 7 8 Denial-of-Service (DoS) Attack Flood The NIST Computer Security Incident Handling Guide defines a DoS attack as:

More information

HOW TO CHOOSE A NEXT-GENERATION WEB APPLICATION FIREWALL

HOW TO CHOOSE A NEXT-GENERATION WEB APPLICATION FIREWALL HOW TO CHOOSE A NEXT-GENERATION WEB APPLICATION FIREWALL CONTENTS EXECUTIVE SUMMARY 1 WEB APPLICATION SECURITY CHALLENGES 2 INSIST ON BEST-IN-CLASS CORE CAPABILITIES 3 HARNESSING ARTIFICIAL INTELLIGENCE

More information

A Survey on Different IP Traceback Techniques for finding The Location of Spoofers Amruta Kokate, Prof.Pramod Patil

A Survey on Different IP Traceback Techniques for finding The Location of Spoofers Amruta Kokate, Prof.Pramod Patil www.ijecs.in International Journal Of Engineering And Computer Science ISSN: 2319-7242 Volume 4 Issue 12 Dec 2015, Page No. 15132-15135 A Survey on Different IP Traceback Techniques for finding The Location

More information

NISCC Technical Note 06/02: Response to Distributed Denial of Service (DDoS) Attacks

NISCC Technical Note 06/02: Response to Distributed Denial of Service (DDoS) Attacks NISCC Technical Note 06/02: Response to Distributed Denial of Service (DDoS) Attacks Background This NISCC technical note is intended to provide information to enable organisations in the UK s Critical

More information

Chair for Network Architectures and Services Department of Informatics TU München Prof. Carle. Network Security. Chapter 8

Chair for Network Architectures and Services Department of Informatics TU München Prof. Carle. Network Security. Chapter 8 Chair for Network Architectures and Services Department of Informatics TU München Prof. Carle Network Security Chapter 8 System Vulnerabilities and Denial of Service Attacks System Vulnerabilities and

More information

A Novel DDoS Attack Defending Framework with Minimized Bilateral Damages

A Novel DDoS Attack Defending Framework with Minimized Bilateral Damages A Novel DDoS Attack Defending Framework with Minimized Bilateral Damages Yu Chen*, Wei-Shinn Ku, Kazuya Sakai, Christopher DeCruze Dept. of Electrical & Computer Engineering, SUNY - Binghamton, Binghamton,

More information

EFFECT OF HALF-OPEN CONNECTION LIFETIME IN DEFENDING AGAINST DDOS ATTACK

EFFECT OF HALF-OPEN CONNECTION LIFETIME IN DEFENDING AGAINST DDOS ATTACK International Journal on Information Sciences and Computing, Vol.3, No.2, July 2009 33 EFFECT OF HALF-OPEN CONNECTION LIFETIME IN DEFENDING AGAINST DDOS ATTACK 1 2 S.Meenakshi, Dr.S.K.Srivatsa, 1 Assistant

More information

EXPERIMENTAL STUDY OF FLOOD TYPE DISTRIBUTED DENIAL-OF- SERVICE ATTACK IN SOFTWARE DEFINED NETWORKING (SDN) BASED ON FLOW BEHAVIORS

EXPERIMENTAL STUDY OF FLOOD TYPE DISTRIBUTED DENIAL-OF- SERVICE ATTACK IN SOFTWARE DEFINED NETWORKING (SDN) BASED ON FLOW BEHAVIORS EXPERIMENTAL STUDY OF FLOOD TYPE DISTRIBUTED DENIAL-OF- SERVICE ATTACK IN SOFTWARE DEFINED NETWORKING (SDN) BASED ON FLOW BEHAVIORS Andry Putra Fajar and Tito Waluyo Purboyo Faculty of Electrical Engineering,

More information

DDoS and Traceback 1

DDoS and Traceback 1 DDoS and Traceback 1 Denial-of-Service (DoS) Attacks (via Resource/bandwidth consumption) malicious server legitimate Tecniche di Sicurezza dei Sistemi 2 TCP Handshake client SYN seq=x server SYN seq=y,

More information

Various Anti IP Spoofing Techniques

Various Anti IP Spoofing Techniques Various Anti IP Spoofing Techniques Sonal Patel, M.E Student, Department of CSE, Parul Institute of Engineering & Technology, Vadodara, India Vikas Jha, Assistant Professor, Department of CSE, Parul Institute

More information

Provider-based deterministic packet marking against distributed DoS attacks

Provider-based deterministic packet marking against distributed DoS attacks Journal of Network and Computer Applications 3 (27) 858 876 www.elsevier.com/locate/jnca Provider-based deterministic packet marking against distributed DoS attacks Vasilios A. Siris,, Ilias Stavrakis

More information

StackPi: New Packet Marking and Filtering Mechanisms for DDoS and IP Spoofing Defense

StackPi: New Packet Marking and Filtering Mechanisms for DDoS and IP Spoofing Defense 1 StackPi: New Packet Marking and Filtering Mechanisms for DDoS and IP Spoofing Defense Abraham Yaar Adrian Perrig Dawn Song Carnegie Mellon University {ayaar, perrig, dawnsong }@cmu.edu Abstract Today

More information

ANALYSIS AND EVALUATION OF DISTRIBUTED DENIAL OF SERVICE ATTACKS IDENTIFICATION METHODS

ANALYSIS AND EVALUATION OF DISTRIBUTED DENIAL OF SERVICE ATTACKS IDENTIFICATION METHODS ANALYSIS AND EVALUATION OF DISTRIBUTED DENIAL OF SERVICE ATTACKS IDENTIFICATION METHODS Saulius Grusnys, Ingrida Lagzdinyte Kaunas University of Technology, Department of Computer Networks, Studentu 50,

More information

Simulation Environment for Investigation of Cooperative Distributed Attacks and Defense

Simulation Environment for Investigation of Cooperative Distributed Attacks and Defense Simulation Environment for Investigation of Cooperative Distributed Attacks and Defense Igor Kotenko, Alexander Ulanov Computer Security Research Group, St. Petersburg Institute for Informatics and Automation

More information

Analysis of Black-Hole Attack in MANET using AODV Routing Protocol

Analysis of Black-Hole Attack in MANET using AODV Routing Protocol Analysis of Black-Hole Attack in MANET using Routing Protocol Ms Neha Choudhary Electronics and Communication Truba College of Engineering, Indore India Dr Sudhir Agrawal Electronics and Communication

More information

Prof. N. P. Karlekar Project Guide Dept. computer Sinhgad Institute of Technology

Prof. N. P. Karlekar Project Guide Dept. computer Sinhgad Institute of Technology Volume 4, Issue 7, July 2014 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Advance Deterministic

More information

A hybrid IP Trace Back Scheme Using Integrate Packet logging with hash Table under Fixed Storage

A hybrid IP Trace Back Scheme Using Integrate Packet logging with hash Table under Fixed Storage Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 2, Issue. 12, December 2013,

More information

A Rate-Limiting System to Mitigate Denial of Service Attacks

A Rate-Limiting System to Mitigate Denial of Service Attacks Emmanuel Guiton TKK:n Tietoverkkolaboratorio Instructor: L.Sc. Jarmo Mölsä Supervisor: Prof. Jorma Jormakka A Rate-Limiting System to Mitigate Denial of Service Attacks Contents Overall information Intents

More information

Chapter 7. Denial of Service Attacks

Chapter 7. Denial of Service Attacks Chapter 7 Denial of Service Attacks DoS attack: An action that prevents or impairs the authorized use of networks, systems, or applications by exhausting resources such as central processing units (CPU),

More information

To Filter or to Authorize: Network-Layer DoS Defense against Multimillion-node Botnets. Xiaowei Yang Duke Unversity

To Filter or to Authorize: Network-Layer DoS Defense against Multimillion-node Botnets. Xiaowei Yang Duke Unversity To Filter or to Authorize: Network-Layer DoS Defense against Multimillion-node Botnets Xiaowei Yang Duke Unversity Denial of Service (DoS) flooding attacks Send packet floods to a targeted victim Exhaust

More information

Denial of Service and Distributed Denial of Service Attacks

Denial of Service and Distributed Denial of Service Attacks Denial of Service and Distributed Denial of Service Attacks Objectives: 1. To understand denial of service and distributed denial of service. 2. To take a glance about DoS techniques. Distributed denial

More information

Denial of Service, Traceback and Anonymity

Denial of Service, Traceback and Anonymity Purdue University Center for Education and Research in Information Assurance and Security Denial of Service, Traceback and Anonymity Clay Shields Assistant Professor of Computer Sciences CERIAS Network

More information

Computer Security: Principles and Practice

Computer Security: Principles and Practice Computer Security: Principles and Practice Chapter 8 Denial of Service First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Denial of Service denial of service (DoS) an action

More information

Queuing Algorithms Performance against Buffer Size and Attack Intensities

Queuing Algorithms Performance against Buffer Size and Attack Intensities Queuing Algorithms Performance against Buffer Size and Attack Intensities Santosh Kumar 1, Abhinav Bhandari 2, A.L. Sangal 3 and Krishan Kumar Saluja 4 1-3 Computer Science and Engineering, Dr. B. R. Ambedkar

More information

Configuring attack detection and prevention 1

Configuring attack detection and prevention 1 Contents Configuring attack detection and prevention 1 Overview 1 Attacks that the device can prevent 1 Single-packet attacks 1 Scanning attacks 2 Flood attacks 3 TCP fragment attack 4 Login DoS attack

More information

Routing Security DDoS and Route Hijacks. Merike Kaeo CEO, Double Shot Security

Routing Security DDoS and Route Hijacks. Merike Kaeo CEO, Double Shot Security Routing Security DDoS and Route Hijacks Merike Kaeo CEO, Double Shot Security merike@doubleshotsecurity.com DISCUSSION POINTS Understanding The Growing Complexity DDoS Attack Trends Packet Filters and

More information

Comparing Chord, CAN, and Pastry Overlay Networks for Resistance to DoS Attacks

Comparing Chord, CAN, and Pastry Overlay Networks for Resistance to DoS Attacks Comparing Chord, CAN, and Pastry Overlay Networks for Resistance to DoS Attacks Hakem Beitollahi Hakem.Beitollahi@esat.kuleuven.be Geert Deconinck Geert.Deconinck@esat.kuleuven.be Katholieke Universiteit

More information

Detection of Spoofing Attacks Using Intrusive Filters For DDoS

Detection of Spoofing Attacks Using Intrusive Filters For DDoS IJCSNS International Journal of Computer Science and Network Security, VOL.8 No.10, October 2008 339 Detection of Spoofing Attacks Using Intrusive Filters For DDoS V.Shyamaladevi Asst.Prof.Dept of IT KSRCT

More information

CSE Computer Security (Fall 2006)

CSE Computer Security (Fall 2006) CSE 543 - Computer Security (Fall 2006) Lecture 18 - Network Security November 7, 2006 URL: http://www.cse.psu.edu/~tjaeger/cse543-f06/ 1 Denial of Service Intentional prevention of access to valued resource

More information

Configuring attack detection and prevention 1

Configuring attack detection and prevention 1 Contents Configuring attack detection and prevention 1 Overview 1 Attacks that the device can prevent 1 Single-packet attacks 1 Scanning attacks 2 Flood attacks 3 TCP fragment attack 4 Login DoS attack

More information

Our Narrow Focus Computer Networking Security Vulnerabilities. Outline Part II

Our Narrow Focus Computer Networking Security Vulnerabilities. Outline Part II Our Narrow Focus 15-441 15-441 Computer Networking 15-641 Lecture 22 Security: DOS Peter Steenkiste Fall 2016 www.cs.cmu.edu/~prs/15-441-f16 Yes: Creating a secure channel for communication (Part I) Protecting

More information

Low-rate and High-rate Distributed DoS Attack Detection Using Partial Rank Correlation

Low-rate and High-rate Distributed DoS Attack Detection Using Partial Rank Correlation Low-rate and High-rate Distributed DoS Attack Detection Using Partial Rank Correlation Monowar H. Bhuyan and Abhishek Kalwar Dept. of Computer Science & Engg. Kaziranga University, Jorhat-785006, Assam

More information

Survey of Several IP Traceback Mechanisms and Path Reconstruction

Survey of Several IP Traceback Mechanisms and Path Reconstruction Available online at www.worldscientificnews.com WSN 40 (2016) 12-22 EISSN 2392-2192 Survey of Several IP Traceback Mechanisms and Path Reconstruction Dr. M. Newlin Rajkumar 1,a, R. Amsarani 2,b, M. U.

More information

Integrated Access Management Solutions. Access Televentures

Integrated Access Management Solutions. Access Televentures Integrated Access Management Solutions Access Televentures Table of Contents OVERCOMING THE AUTHENTICATION CHALLENGE... 2 1 EXECUTIVE SUMMARY... 2 2 Challenges to Providing Users Secure Access... 2 2.1

More information

Towards Traffic Anomaly Detection via Reinforcement Learning and Data Flow

Towards Traffic Anomaly Detection via Reinforcement Learning and Data Flow Towards Traffic Anomaly Detection via Reinforcement Learning and Data Flow Arturo Servin Computer Science, University of York aservin@cs.york.ac.uk Abstract. Protection of computer networks against security

More information

Defending against Flooding-Based Distributed Denial-of-Service Attacks: A Tutorial

Defending against Flooding-Based Distributed Denial-of-Service Attacks: A Tutorial Defending against Flooding-Based Distributed Denial-of-Service Attacks: A Tutorial Paper by Rocky K C Chang, The Hong Kong Polytechnic University Published in the October 2002 issue of IEEE Communications

More information

NETWORK SECURITY. Ch. 3: Network Attacks

NETWORK SECURITY. Ch. 3: Network Attacks NETWORK SECURITY Ch. 3: Network Attacks Contents 3.1 Network Vulnerabilities 3.1.1 Media-Based 3.1.2 Network Device 3.2 Categories of Attacks 3.3 Methods of Network Attacks 03 NETWORK ATTACKS 2 3.1 Network

More information

Multivariate Correlation Analysis based detection of DOS with Tracebacking

Multivariate Correlation Analysis based detection of DOS with Tracebacking 1 Multivariate Correlation Analysis based detection of DOS with Tracebacking Jasheeda P Student Department of CSE Kathir College of Engineering Coimbatore jashi108@gmail.com T.K.P.Rajagopal Associate Professor

More information

Protecting Against Application DDoS A acks with BIG-IP ASM: A Three- Step Solution

Protecting Against Application DDoS A acks with BIG-IP ASM: A Three- Step Solution Protecting Against Application DDoS A acks with BIG-IP ASM: A Three- Step Solution Today's security threats increasingly involve application-layer DDoS attacks mounted by organized groups of attackers

More information

Single Packet IP Traceback in AS-level Partial Deployment Scenario

Single Packet IP Traceback in AS-level Partial Deployment Scenario Single Packet IP Traceback in AS-level Partial Deployment Scenario Chao Gong, Trinh Le, Turgay Korkmaz, Kamil Sarac Department of Computer Science, University of Texas at San Antonio 69 North Loop 64 West,

More information

Intrusion Detection System For Denial Of Service Flooding Attacks In Sip Communication Networks

Intrusion Detection System For Denial Of Service Flooding Attacks In Sip Communication Networks Intrusion Detection System For Denial Of Service Flooding Attacks In Sip Communication Networks So we are proposing a network intrusion detection system (IDS) which uses a Keywords: DDoS (Distributed Denial

More information

Protecting the Platforms. When it comes to the cost of keeping computers in good working order, Chapter10

Protecting the Platforms. When it comes to the cost of keeping computers in good working order, Chapter10 Chapter10 Protecting the Platforms Painting: The art of protecting flat surfaces from the weather and exposing them to the critic. Ambrose Bierce (1842 1914) When it comes to the cost of keeping computers

More information

CLASSIFICATION OF LINK BASED IDENTIFICATION RESISTANT TO DRDOS ATTACKS

CLASSIFICATION OF LINK BASED IDENTIFICATION RESISTANT TO DRDOS ATTACKS CLASSIFICATION OF LINK BASED IDENTIFICATION RESISTANT TO DRDOS ATTACKS 1 S M ZAHEER, 2 V.VENKATAIAH 1 M.Tech, Department of CSE, CMR College Of Engineering & Technology, Kandlakoya Village, Medchal Mandal,

More information

The GenCyber Program. By Chris Ralph

The GenCyber Program. By Chris Ralph The GenCyber Program By Chris Ralph The Mission of GenCyber Provide a cybersecurity camp experience for students and teachers at the K-12 level. The primary goal of the program is to increase interest

More information

Detection and Removal of Black Hole Attack in Mobile Ad hoc Network

Detection and Removal of Black Hole Attack in Mobile Ad hoc Network Detection and Removal of Black Hole Attack in Mobile Ad hoc Network Harmandeep Kaur, Mr. Amarvir Singh Abstract A mobile ad hoc network consists of large number of inexpensive nodes which are geographically

More information

Collaborative Peer to Peer Defense Mechanism for DDoS Attacks

Collaborative Peer to Peer Defense Mechanism for DDoS Attacks Available online at www.sciencedirect.com Procedia Computer Science 5 (2011) 157 164 The 2nd International Conference on Ambient Systems, Networks and Technologies (ANT) Collaborative Peer to Peer Defense

More information

(Submit to Bright Internet Global Summit - BIGS)

(Submit to Bright Internet Global Summit - BIGS) Reviewing Technological Solutions of Source Address Validation (Submit to Bright Internet Global Summit - BIGS) Jongbok Byun 1 Business School, Sungkyunkwan University Seoul, Korea Christopher P. Paolini

More information

Using Threat Analytics to Protect Privileged Access and Prevent Breaches

Using Threat Analytics to Protect Privileged Access and Prevent Breaches Using Threat Analytics to Protect Privileged Access and Prevent Breaches Under Attack Protecting privileged access and preventing breaches remains an urgent concern for companies of all sizes. Attackers

More information

DENIAL OF SERVICE ATTACKS

DENIAL OF SERVICE ATTACKS DENIAL OF SERVICE ATTACKS Ezell Frazier EIS 4316 November 6, 2016 Contents 7.1 Denial of Service... 2 7.2 Targets of DoS attacks... 2 7.3 Purpose of flood attacks... 2 7.4 Packets used during flood attacks...

More information

INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY

INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY Gayatri Chavan,, 2013; Volume 1(8): 832-841 T INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY A PATH FOR HORIZING YOUR INNOVATIVE WORK RECTIFIED PROBABILISTIC PACKET MARKING

More information

A Survey on DDoS Attack and Defense Strategies: From Traditional Schemes to Current Techniques

A Survey on DDoS Attack and Defense Strategies: From Traditional Schemes to Current Techniques Interdisciplinary Information Sciences Vol. 19, No. 2 (2013) 173 200 #Graduate School of Information Sciences, Tohoku University ISSN 1340-9050 print/1347-6157 online DOI 10.4036/iis.2013.173 A Survey

More information

CSE Computer Security

CSE Computer Security CSE 543 - Computer Security Lecture 22 - Denial of Service November 15, 2007 URL: http://www.cse.psu.edu/~tjaeger/cse543-f07/ 1 Denial of Service Intentional prevention of access to valued resource CPU,

More information

EE 122: Network Security

EE 122: Network Security Motivation EE 122: Network Security Kevin Lai December 2, 2002 Internet currently used for important services - financial transactions, medical records Could be used in the future for critical services

More information

Optimization of Firewall Rules

Optimization of Firewall Rules Optimization of Firewall Rules Tihomir Katić Predrag Pale Faculty of Electrical Engineering and Computing University of Zagreb Unska 3, HR 10000 Zagreb, Croatia tihomir.katic@fer.hr predrag.pale@fer.hr

More information

Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures

Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures By Chris Karlof and David Wagner Lukas Wirne Anton Widera 23.11.2017 Table of content 1. Background 2. Sensor Networks vs. Ad-hoc

More information

Cloudflare Advanced DDoS Protection

Cloudflare Advanced DDoS Protection Cloudflare Advanced DDoS Protection Denial-of-service (DoS) attacks are on the rise and have evolved into complex and overwhelming security challenges. 1 888 99 FLARE enterprise@cloudflare.com www.cloudflare.com

More information

this security is provided by the administrative authority (AA) of a network, on behalf of itself, its customers, and its legal authorities

this security is provided by the administrative authority (AA) of a network, on behalf of itself, its customers, and its legal authorities INFRASTRUCTURE SECURITY this security is provided by the administrative authority (AA) of a network, on behalf of itself, its customers, and its legal authorities Goals * prevent or mitigate resource attacks

More information

CS244 Advanced Topics in Computer Networks Midterm Exam Monday, May 2, 2016 OPEN BOOK, OPEN NOTES, INTERNET OFF

CS244 Advanced Topics in Computer Networks Midterm Exam Monday, May 2, 2016 OPEN BOOK, OPEN NOTES, INTERNET OFF CS244 Advanced Topics in Computer Networks Midterm Exam Monday, May 2, 2016 OPEN BOOK, OPEN NOTES, INTERNET OFF Your Name: Answers SUNet ID: root @stanford.edu In accordance with both the letter and the

More information

Distributed Systems. 29. Firewalls. Paul Krzyzanowski. Rutgers University. Fall 2015

Distributed Systems. 29. Firewalls. Paul Krzyzanowski. Rutgers University. Fall 2015 Distributed Systems 29. Firewalls Paul Krzyzanowski Rutgers University Fall 2015 2013-2015 Paul Krzyzanowski 1 Network Security Goals Confidentiality: sensitive data & systems not accessible Integrity:

More information

INTERNATIONAL JOURNAL OF COMPUTER ENGINEERING & TECHNOLOGY (IJCET)

INTERNATIONAL JOURNAL OF COMPUTER ENGINEERING & TECHNOLOGY (IJCET) INTERNATIONAL JOURNAL OF COMPUTER ENGINEERING & TECHNOLOGY (IJCET) Proceedings of the 2 nd International Conference on Current Trends in Engineering and Management ICCTEM -2014 ISSN 0976 6367(Print) ISSN

More information

IP Mobility vs. Session Mobility

IP Mobility vs. Session Mobility IP Mobility vs. Session Mobility Securing wireless communication is a formidable task, something that many companies are rapidly learning the hard way. IP level solutions become extremely cumbersome when

More information

Firewalls Network Security: Firewalls and Virtual Private Networks CS 239 Computer Software March 3, 2003

Firewalls Network Security: Firewalls and Virtual Private Networks CS 239 Computer Software March 3, 2003 Firewalls Network Security: Firewalls and Virtual Private Networks CS 239 Computer Software March 3, 2003 A system or combination of systems that enforces a boundary between two or more networks - NCSA

More information

The Protocols that run the Internet

The Protocols that run the Internet The Protocols that run the Internet Attack types in the Internet Seminarvortrag Sommersemester 2003 Jens Gerken Content Internet Attacks Introduction Network Service Attacks Distributed Denial of Service

More information

A Study on Intrusion Detection Techniques in a TCP/IP Environment

A Study on Intrusion Detection Techniques in a TCP/IP Environment A Study on Intrusion Detection Techniques in a TCP/IP Environment C. A. Voglis and S. A. Paschos Department of Computer Science University of Ioannina GREECE Abstract: The TCP/IP protocol suite is the

More information

Multicast EECS 122: Lecture 16

Multicast EECS 122: Lecture 16 Multicast EECS 1: Lecture 16 Department of Electrical Engineering and Computer Sciences University of California Berkeley Broadcasting to Groups Many applications are not one-one Broadcast Group collaboration

More information

Analysis. Group 5 Mohammad Ahmad Ryadh Almuaili

Analysis. Group 5 Mohammad Ahmad Ryadh Almuaili Analysis Group 5 Mohammad Ahmad Ryadh Almuaili Outline Introduction Previous Work Approaches Design & Implementation Results Conclusion References WHAT IS DDoS? DDoS: Distributed denial of service attack

More information

R (2) Implementation of following spoofing assignments using C++ multi-core Programming a) IP Spoofing b) Web spoofing.

R (2) Implementation of following spoofing assignments using C++ multi-core Programming a) IP Spoofing b) Web spoofing. R (2) N (5) Oral (3) Total (10) Dated Sign Experiment No: 1 Problem Definition: Implementation of following spoofing assignments using C++ multi-core Programming a) IP Spoofing b) Web spoofing. 1.1 Prerequisite:

More information

Denial of Service. EJ Jung 11/08/10

Denial of Service. EJ Jung 11/08/10 Denial of Service EJ Jung 11/08/10 Pop Quiz 3 Write one thing you learned from today s reading Write one thing you liked about today s reading Write one thing you disliked about today s reading Announcements

More information

1 Connectionless Routing

1 Connectionless Routing UCSD DEPARTMENT OF COMPUTER SCIENCE CS123a Computer Networking, IP Addressing and Neighbor Routing In these we quickly give an overview of IP addressing and Neighbor Routing. Routing consists of: IP addressing

More information

Network Security. Chapter 0. Attacks and Attack Detection

Network Security. Chapter 0. Attacks and Attack Detection Network Security Chapter 0 Attacks and Attack Detection 1 Attacks and Attack Detection Have you ever been attacked (in the IT security sense)? What kind of attacks do you know? 2 What can happen? Part

More information

MITIGATION OF DENIAL OF SERVICE ATTACK USING ICMP BASED IP TRACKBACK. J. Gautam, M. Kasi Nivetha, S. Anitha Sri and P. Madasamy

MITIGATION OF DENIAL OF SERVICE ATTACK USING ICMP BASED IP TRACKBACK. J. Gautam, M. Kasi Nivetha, S. Anitha Sri and P. Madasamy MITIGATION OF DENIAL OF SERVICE ATTACK USING ICMP BASED IP TRACKBACK J. Gautam, M. Kasi Nivetha, S. Anitha Sri and P. Madasamy Department of Information Technology, Velammal College of Engineering and

More information

CSE 565 Computer Security Fall 2018

CSE 565 Computer Security Fall 2018 CSE 565 Computer Security Fall 2018 Lecture 18: Network Attacks Department of Computer Science and Engineering University at Buffalo 1 Lecture Overview Network attacks denial-of-service (DoS) attacks SYN

More information

SENSS Against Volumetric DDoS Attacks

SENSS Against Volumetric DDoS Attacks SENSS Against Volumetric DDoS Attacks Sivaram Ramanathan 1, Jelena Mirkovic 1, Minlan Yu 2 and Ying Zhang 3 1 University of Southern California/Information Sciences Institute 2 Harvard University 3 Facebook

More information

On the State of the Inter-domain and Intra-domain Routing Security

On the State of the Inter-domain and Intra-domain Routing Security On the State of the Inter-domain and Intra-domain Routing Security Mingwei Zhang April 19, 2016 Mingwei Zhang Internet Routing Security 1 / 54 Section Internet Routing Security Background Internet Routing

More information

To Study and Explain the Different DDOS Attacks In MANET

To Study and Explain the Different DDOS Attacks In MANET To Study and Explain the Different DDOS Attacks In MANET Narender Kumar 1, Dr. S.B.L. Tripathi 2, Surbie Wattal 3 1 Research Scholar, CMJ University, Shillong, Meghalaya (India) 2 Ph.D. Research Guide,

More information

Intelligent Programmatic Peering Summary Report

Intelligent Programmatic Peering Summary Report Intelligent Programmatic Peering Summary Report Alliance for Telecommunications Industry Solutions December 2016 i Abstract The TOPS Council s Intelligent Programmatic Peering Landscape Team (IPLT) completed

More information

A New Logging-based IP Traceback Approach using Data Mining Techniques

A New Logging-based IP Traceback Approach using Data Mining Techniques using Data Mining Techniques Internet & Multimedia Engineering, Konkuk University, Seoul, Republic of Korea hsriverv@gmail.com, kimsr@konuk.ac.kr Abstract IP Traceback is a way to search for sources of

More information

Foundations of Network and Computer Security

Foundations of Network and Computer Security Foundations of Network and Computer Security John Black Lecture #17 Oct 27 th 2005 CSCI 6268/TLEN 5831, Fall 2005 Backscatter Technique CAIDA (San Diego) owns large block of IP address space They have

More information

Early Detection System for Distributed Denial of Service Attacks

Early Detection System for Distributed Denial of Service Attacks Early Detection System for Distributed Denial of Service Attacks Thaneswaran Velauthapillai Submitted in total fulfilment of the requirements of the degree of Doctor of Philosophy Department of Computing

More information

International Journal of Intellectual Advancements and Research in Engineering Computations

International Journal of Intellectual Advancements and Research in Engineering Computations ISSN:2348-2079 Volume-6 Issue-2 International Journal of Intellectual Advancements and Research in Engineering Computations Local flow packet marking for network coding in manets P. Vasanthakumar, Mrs.

More information

Blackhole Attack Detection in Wireless Sensor Networks Using Support Vector Machine

Blackhole Attack Detection in Wireless Sensor Networks Using Support Vector Machine International Journal of Wireless Communications, Networking and Mobile Computing 2016; 3(5): 48-52 http://www.aascit.org/journal/wcnmc ISSN: 2381-1137 (Print); ISSN: 2381-1145 (Online) Blackhole Attack

More information