{"title":"Detecting DDoS Attacks Near The Edge with Router Canaries","authors":"Winston Howard, M. Borowczak","doi":"10.1109/ICCE-Berlin50680.2020.9352164","DOIUrl":null,"url":null,"abstract":"As consumers place more devices within their local networks the ability to detect and disrupt Distributed Denial of Service (DDoS) attacks must move closer to the edge in order to provide resilient and effective decentralized protection. To move detection from centralized entities towards the edge a distributed technique to detect DDoS attacks through the use of entropy-based canaries located near edge devices (e.g., switches, and routers) is proposed. The benefit of this approach is that a set of infrastructure devices could prevent attacks using hijacked devices from ever leaving local networks. In order to evaluate this approach an open-source Python software package was built on top of the Common Open Research Emulator (CORE) in order to simulate and assess these entropy-based canaries. This distributed entropy-based detection technique, based on prior centralized entropy-techniques, is able to achieve 100% detection rate even when attacker-node comprise only 25% of the total nodes. While these distributed entropy-based canaries can rapidly detect simulated DDoS attacks with high accuracy these preliminary results motivate future investigation using more diverse typologies and real-world data.","PeriodicalId":438631,"journal":{"name":"2020 IEEE 10th International Conference on Consumer Electronics (ICCE-Berlin)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2020-11-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2020 IEEE 10th International Conference on Consumer Electronics (ICCE-Berlin)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICCE-Berlin50680.2020.9352164","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1
Abstract
As consumers place more devices within their local networks the ability to detect and disrupt Distributed Denial of Service (DDoS) attacks must move closer to the edge in order to provide resilient and effective decentralized protection. To move detection from centralized entities towards the edge a distributed technique to detect DDoS attacks through the use of entropy-based canaries located near edge devices (e.g., switches, and routers) is proposed. The benefit of this approach is that a set of infrastructure devices could prevent attacks using hijacked devices from ever leaving local networks. In order to evaluate this approach an open-source Python software package was built on top of the Common Open Research Emulator (CORE) in order to simulate and assess these entropy-based canaries. This distributed entropy-based detection technique, based on prior centralized entropy-techniques, is able to achieve 100% detection rate even when attacker-node comprise only 25% of the total nodes. While these distributed entropy-based canaries can rapidly detect simulated DDoS attacks with high accuracy these preliminary results motivate future investigation using more diverse typologies and real-world data.
随着消费者在本地网络中放置越来越多的设备,检测和破坏分布式拒绝服务(DDoS)攻击的能力必须更接近边缘,以便提供弹性和有效的分散保护。为了将检测从集中式实体移动到边缘,提出了一种分布式技术,通过使用位于边缘设备(例如交换机和路由器)附近的基于熵的金丝雀来检测DDoS攻击。这种方法的好处是,一组基础设施设备可以防止利用被劫持的设备离开本地网络进行攻击。为了评估这种方法,在Common Open Research Emulator (CORE)之上构建了一个开源Python软件包,以模拟和评估这些基于熵的金丝雀。这种基于分布式熵的检测技术,基于先前的集中式熵技术,即使攻击者节点仅占总节点的25%,也能够实现100%的检测率。虽然这些基于分布式熵的金丝雀可以快速、高精度地检测模拟DDoS攻击,但这些初步结果激发了未来使用更多样化的类型学和真实世界数据的研究。