DocumentCode
1245975
Title
Defending against distributed denial-of-service attacks with max-min fair server-centric router throttles
Author
Yau, David K Y ; Lui, John C S ; Liang, Feng ; Yam, Yeung
Author_Institution
Dept. of Comput. Sci., Purdue Univ., West Lafayette, IN, USA
Volume
13
Issue
1
fYear
2005
Firstpage
29
Lastpage
42
Abstract
Our work targets a network architecture and accompanying algorithms for countering distributed denial-of-service (DDoS) attacks directed at an Internet server. The basic mechanism is for a server under stress to install a router throttle at selected upstream routers. The throttle can be the leaky-bucket rate at which a router can forward packets destined for the server. Hence, before aggressive packets can converge to overwhelm the server, participating routers proactively regulate the contributing packet rates to more moderate levels, thus forestalling an impending attack. In allocating the server capacity among the routers, we propose a notion of level-k max-min fairness. We first present a control-theoretic model to evaluate algorithm convergence under a variety of system parameters. In addition, we present packet network simulation results using a realistic global network topology, and various models of good user and attacker distributions and behavior. Using a generator model of web requests parameterized by empirical data, we also evaluate the impact of throttling in protecting user access to a web server. First, for aggressive attackers, the throttle mechanism is highly effective in preferentially dropping attacker traffic over good user traffic. In particular, level-k max-min fairness gives better good-user protection than recursive pushback of max-min fair rate limits proposed in the literature. Second, throttling can regulate the experienced server load to below its design limit - in the presence of user dynamics - so that the server can remain operational during a DDoS attack. Lastly, we present implementation results of our prototype on a Pentium III/866 MHz machine. The results show that router throttling has low deployment overhead in time and memory.
Keywords
Internet; minimax techniques; telecommunication congestion control; telecommunication network routing; telecommunication network topology; telecommunication services; telecommunication traffic; Internet server; Pentium III/866 MHz machine; Web server; distributed denial-of-service attack; dropping attacker traffic; global network topology; leaky-bucket rate; max-min fair server-centric router throttle; packet network simulation; server capacity allocation; upstream router; Computer crime; Computer science; IP networks; Network servers; Network topology; Protection; Stress; Telecommunication traffic; Traffic control; Web server; Congestion control; distributed denial of service; network security; router throttling;
fLanguage
English
Journal_Title
Networking, IEEE/ACM Transactions on
Publisher
ieee
ISSN
1063-6692
Type
jour
DOI
10.1109/TNET.2004.842221
Filename
1402469
Link To Document