DocumentCode
2277819
Title
Attack diagnosis: throttling distributed denial-of-service attacks close to the attack sources
Author
Chen, Ruiliang ; Park, Jung-Min
Author_Institution
Bradley Dept. of Electr. & Comput. Eng., Virginia Polytech. Inst. & State Univ., Blacksburg, VA, USA
fYear
2005
fDate
17-19 Oct. 2005
Firstpage
275
Lastpage
280
Abstract
Attack mitigation schemes actively throttle attack traffic generated in distributed denial-of-service (DDoS) attacks. This paper presents attack diagnosis (AD), a novel attack mitigation scheme that combines the concepts of Pushback and packet marking. AD´s architecture is inline with the ideal DDoS attack countermeasure paradigm, in which attack detection is performed near the victim host and attack mitigation is executed close to the attack sources. AD is a reactive defense that is activated by a victim host after an attack has been detected. A victim activates AD by sending AD-related commands to its upstream routers. On receipt of such commands, the AD-enabled upstream routers deterministically mark each packet destined for the victim with the information of the input interface that processed that packet. By collecting the router interface information recorded in the packet markings, the victim can trace back the attack traffic to the attack sources. Once the traceback is complete, the victim issues messages that command AD-enabled routers to filter attack packets close to the source. The AD commands can be authenticated by the TTL field of the IP header without relying on any global key distribution infrastructure in Internet. Although AD can effectively filter traffic generated by a moderate number of attack sources, it is not effective against large-scale attacks. To address this problem, we propose an extension to AD called parallel attack diagnosis (PAD) that is capable of throttling traffic coming from a large number of attack sources simultaneously. AD and PAD are analyzed and evaluated using a realistic network topology based on the Skitter Internet map. Both schemes are shown to be robust against IP spoofing and incur low false positive ratios.
Keywords
IP networks; Internet; security of data; telecommunication network topology; telecommunication security; telecommunication services; DDoS attack; IP header; Internet protocol; PAD; Skitter Internet map; TTL field; attack diagnosis; attack mitigation scheme; counter-measure paradigm; distributed denial-of-service; global key distribution infrastructure; packet marking; parallel attack diagnosis; pushback marking; realistic network topology; transistor-transistor logic; Atherosclerosis; Computer crime; IP networks; Information filtering; Information filters; Internet; Large-scale systems; Network topology; Robustness; Telecommunication traffic;
fLanguage
English
Publisher
ieee
Conference_Titel
Computer Communications and Networks, 2005. ICCCN 2005. Proceedings. 14th International Conference on
ISSN
1095-2055
Print_ISBN
0-7803-9428-3
Type
conf
DOI
10.1109/ICCCN.2005.1523866
Filename
1523866
Link To Document