Title :
Defending against distributed denial-of-service attacks with max-min fair server-centric router throttles
Author :
Yau, David K Y ; Lui, John C S ; Liang, Feng
Author_Institution :
Dept. of Comput. Sci., Purdue Univ., West Lafayette, IN, USA
fDate :
6/24/1905 12:00:00 AM
Abstract :
We present a network architecture and accompanying algorithms for countering distributed denial-of-service (DDoS) attacks directed at an Internet server. The basic mechanism is for a server under stress to install a router throttle at selected upstream routers. The throttle can be the leaky-bucket rate at which a router can forward packets destined for the server. Hence, before aggressive packets can converge to overwhelm the server, participating routers proactively regulate the contributing packet rates to more moderate levels, thus forestalling an impending attack. In allocating the server capacity among the routers, we propose a notion of level-k max-min fairness. We present a control-theoretic model to evaluate algorithm convergence under a variety of system parameters. In addition, we present packet network simulation results using a realistic global network topology, and various models of good user and attacker distributions and behavior. Using a generator model of Web requests parameterized by empirical data, we also evaluate the impact of throttling in protecting user access to a Web server. First, for aggressive attackers, the throttle mechanism is highly effective in preferentially dropping attacker traffic over good user traffic. In particular, level-k max-min fairness gives better good-user protection than recursive pushback of max-min fair rate limits proposed in the literature. Second, throttling can regulate the experienced server load to below its design limit - in the presence of user dynamics - so that the server can remain operational during a DDoS attack.
Keywords :
Internet; digital simulation; file servers; minimax techniques; network topology; packet switching; performance evaluation; security of data; telecommunication network routing; telecommunication security; telecommunication traffic; DDoS attack; Internet server; Web requests; Web server; aggressive attackers; algorithm convergence; attacker behavior; attacker distribution; attacker traffic; control-theoretic model; distributed denial-of-service attacks; general mathematical model; generator model; global network topology; good user traffic; good-user protection; leaky-bucket rate; level-k max-min fairness; max-min fair server-centric router throttles; network architecture; packet forwarding; packet network simulation results; packet rates; server capacity allocation; system parameters; upstream routers; user behavior; user distribution; user dynamics; Computer crime; IP networks; Network servers; Network topology; Protection; Routing; Stress; Telecommunication traffic; Traffic control; Web server;
Conference_Titel :
Quality of Service, 2002. Tenth IEEE International Workshop on
Print_ISBN :
0-7803-7426-6
DOI :
10.1109/IWQoS.2002.1006572