Title :
Eagle Eyes: Protocol Independent Packet Marking Scheme to Filter Attack Packets and Reduce Collateral Damage During Flooding Based DoS and DDoS Attacks
Author :
Saurabh, Saket ; Sairam, Ashok Singh
Author_Institution :
Dept. of Comput. Sci., Indian Inst. of Technol. Patna, Patna, India
Abstract :
Defences against Denial and Distributed Denial of Service (DDoS) attacks commonly responds to flooding by dropping excess traffic. Such rate limiting schemes drop all excess-traffic when the request arrival rate goes above a certain empirically calculated threshold. Flooding based DoS/DDoS attacks like TCP SYN Attack does not exhibit any special signature except that their arrival-rate is high enough to overwhelm the victim. Hence it is very difficult to differentiate between legitimate and attack traffic as they share the same signature. As a result, rate limiting schemes cause heavy collateral damage by dropping out legitimate traffic [15]. In this paper we propose a novel packet marking mechanism which not only mitigates DoS/DDoS attacks by filtering but also reduces collateral damage significantly by selectively dropping attack packets based on its packet mark while allowing the legitimate traffic to be processed smoothly. Our packet mark contains fingerprint of the path in each single packet which allows us in identifying attack packets coming from various sources even in case of IP spoofing. Our scheme does not require any protocol specific knowledge and can generically filter out attack packets for all kinds of flooding attacks. We have extensively evaluated our packet marking scheme. Results show effectiveness of our scheme in filtering attack traffic. Our scheme inflicts extremely low collateral damage to legitimate traffic while quickly detecting and selectively filtering attack traffic.
Keywords :
IP networks; computer network security; protocols; telecommunication traffic; Eagle Eyes; IP spoofing; TCP SYN attack; attack packet filtering; attack traffic filtering; collateral damage reduction; distributed denial of service attacks; dropping attack packets; excess traffic dropping; flooding based DDoS Attacks; protocol independent packet marking scheme; rate limiting schemes; Computer crime; IP networks; Internet; Limiting; Routing; Servers; Topology; Anomaly Detection; DDoS; TCP SYN Attack; collateral damage; packet marking; selective filtering;
Conference_Titel :
Computer and Communication Technology (ICCCT), 2012 Third International Conference on
Conference_Location :
Allahabad
Print_ISBN :
978-1-4673-3149-4
DOI :
10.1109/ICCCT.2012.35