Mitigating Distributed Denial-of-Service Attacks: Application-Defense and Network-Defense Methods

Zhang Fu
{"title":"Mitigating Distributed Denial-of-Service Attacks: Application-Defense and Network-Defense Methods","authors":"Zhang Fu","doi":"10.1109/EC2ND.2011.18","DOIUrl":null,"url":null,"abstract":"Summary form only given. Distributed Denial of Service (DDoS) attacks can be so powerful that they can easily deplete the computing resources or bandwidth of the potential targets. Based on the types of the targets, DDoS attacks can be addressed in two levels: application-level and network-level. Taking the network-based applications into consideration, a weak point is that they commonly open some known communication port(s), making themselves targets for denial of service (DoS) attacks. Considering adversaries that can eavesdrop and launch directed DoS attacks to the applications' open ports, solutions based on pseudorandom port-hopping have been suggested [1], [5], where applications defend the attacks to the communication ports by changing them periodically. As port-hopping needs the communicating parties to \"hop\" in a synchronized manner, these solutions suggest acknowledgment-based protocols between a client-server pair or assume the presence of synchronized clocks. Acknowledgments, if lost, can cause a port to be open for longer time and thus be vulnerable to DoS attacks, time servers for synchronizing clocks can become targets to DoS attack themselves. Following this line of research, in [2] we proposed a solution for port-hopping in the presence of clock-drifts, which are common in networking. The solution basically consists of two algorithms: H O P ER AA and B IG W HEEL. H O P ER AA enables each client to interact with the server independently of the other clients, B IG W HEEL enables a server to communicate with multiple clients in a port-hopping manner, without synchronizing with each client individually, which supports multi-party applications as well. Anti-DDoS solutions in the application-level, such as port-hopping, are ineffective when the DDoS attacks aim to congest the victim's network. Victims may need the help from network-based (i.e. in the router level) solutions to solve the problem. Among the network-based solutions against DDoS attacks, network-capability mechanism is a novel approach [6]. A capability is a ticket-like token, checkable by routers, that a server can issue for legitimate traffic. Still, malicious hosts may swamp a server with requests for capability establishment, essentially causing possible Denial-of-Capability (DoC). In [4] we proposed an algorithm to mitigate DoC attacks. With this algorithm, the legitimate hosts can get service with guaranteed probability. The algorithm divides the server's capacity for handling capability requests into quotas. Quotas are allocated based on a sink tree architecture. Randomization and Bloom filters are used as tools against threats (attacking scenarios). Issues on fault-tolerance and the deployment of the approach proposed were also addressed in [4]. The algorithm is not only suitable for solving DoC problem, but also suitable for general authentication-based solution against DDoS attacks, since legitimate hosts always need to get the secret for generating authentication tokens before sending data packets to the server. Mitigating DDoS attacks are challenging not only for the targets of the attacks, but also for the network, as large volume of illegitimate traffic share the same network resources as legitimate traffic and can furthermore causes congestion phenomena and performance degradation. Considering malicious traffic, we would like ideally to disallow it completely from consuming network resources. To achieve that, the malicious traffic should be controlled as close to the source(s) as possible. It is observed that there is a trade-off between the protection level of the network and the efficiency/overhead of the protecting method. By building on earlier work and improving on distribution of control aspects, in [3] we proposed a proactive method, called CluB, to mitigate DDoS attacks. The method balances the effectiveness-overhead trade-off by addressing the issue of granularity of control in the network. CluB can collaborate with different routing policies in the network, including contemporary data gram options. In [3] we estimated the effectiveness of the method and also studied a set of factors for tuning the granularity of control.","PeriodicalId":404689,"journal":{"name":"2011 Seventh European Conference on Computer Network Defense","volume":"77 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2011-09-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"10","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2011 Seventh European Conference on Computer Network Defense","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/EC2ND.2011.18","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 10

Abstract

Summary form only given. Distributed Denial of Service (DDoS) attacks can be so powerful that they can easily deplete the computing resources or bandwidth of the potential targets. Based on the types of the targets, DDoS attacks can be addressed in two levels: application-level and network-level. Taking the network-based applications into consideration, a weak point is that they commonly open some known communication port(s), making themselves targets for denial of service (DoS) attacks. Considering adversaries that can eavesdrop and launch directed DoS attacks to the applications' open ports, solutions based on pseudorandom port-hopping have been suggested [1], [5], where applications defend the attacks to the communication ports by changing them periodically. As port-hopping needs the communicating parties to "hop" in a synchronized manner, these solutions suggest acknowledgment-based protocols between a client-server pair or assume the presence of synchronized clocks. Acknowledgments, if lost, can cause a port to be open for longer time and thus be vulnerable to DoS attacks, time servers for synchronizing clocks can become targets to DoS attack themselves. Following this line of research, in [2] we proposed a solution for port-hopping in the presence of clock-drifts, which are common in networking. The solution basically consists of two algorithms: H O P ER AA and B IG W HEEL. H O P ER AA enables each client to interact with the server independently of the other clients, B IG W HEEL enables a server to communicate with multiple clients in a port-hopping manner, without synchronizing with each client individually, which supports multi-party applications as well. Anti-DDoS solutions in the application-level, such as port-hopping, are ineffective when the DDoS attacks aim to congest the victim's network. Victims may need the help from network-based (i.e. in the router level) solutions to solve the problem. Among the network-based solutions against DDoS attacks, network-capability mechanism is a novel approach [6]. A capability is a ticket-like token, checkable by routers, that a server can issue for legitimate traffic. Still, malicious hosts may swamp a server with requests for capability establishment, essentially causing possible Denial-of-Capability (DoC). In [4] we proposed an algorithm to mitigate DoC attacks. With this algorithm, the legitimate hosts can get service with guaranteed probability. The algorithm divides the server's capacity for handling capability requests into quotas. Quotas are allocated based on a sink tree architecture. Randomization and Bloom filters are used as tools against threats (attacking scenarios). Issues on fault-tolerance and the deployment of the approach proposed were also addressed in [4]. The algorithm is not only suitable for solving DoC problem, but also suitable for general authentication-based solution against DDoS attacks, since legitimate hosts always need to get the secret for generating authentication tokens before sending data packets to the server. Mitigating DDoS attacks are challenging not only for the targets of the attacks, but also for the network, as large volume of illegitimate traffic share the same network resources as legitimate traffic and can furthermore causes congestion phenomena and performance degradation. Considering malicious traffic, we would like ideally to disallow it completely from consuming network resources. To achieve that, the malicious traffic should be controlled as close to the source(s) as possible. It is observed that there is a trade-off between the protection level of the network and the efficiency/overhead of the protecting method. By building on earlier work and improving on distribution of control aspects, in [3] we proposed a proactive method, called CluB, to mitigate DDoS attacks. The method balances the effectiveness-overhead trade-off by addressing the issue of granularity of control in the network. CluB can collaborate with different routing policies in the network, including contemporary data gram options. In [3] we estimated the effectiveness of the method and also studied a set of factors for tuning the granularity of control.
减轻分布式拒绝服务攻击:应用程序防御和网络防御方法
只提供摘要形式。分布式拒绝服务(DDoS)攻击非常强大,可以很容易地耗尽潜在目标的计算资源或带宽。根据目标类型的不同,DDoS攻击可以分为应用层和网络层两种。考虑到基于网络的应用程序,一个弱点是它们通常打开一些已知的通信端口,使自己成为拒绝服务攻击的目标。考虑到攻击者可以窃听并对应用程序的开放端口发起定向DoS攻击,已经提出了基于伪随机端口跳的解决方案[1],[5],其中应用程序通过定期更改通信端口来防御攻击。由于端口跳转需要通信各方以同步的方式“跳转”,因此这些解决方案建议在客户机-服务器对之间使用基于确认的协议,或者假设存在同步时钟。确认如果丢失,可能会导致端口打开更长时间,从而容易受到DoS攻击,用于同步时钟的时间服务器本身也可能成为DoS攻击的目标。沿着这条研究路线,在[2]中,我们提出了一种在网络中常见的时钟漂移情况下的端口跳变解决方案。该方案主要由两种算法组成:H O P ER AA和B IG W HEEL。hlaa允许每个客户端独立于其他客户端与服务器进行交互,hlh允许服务器以端口跳转的方式与多个客户端进行通信,而无需单独与每个客户端同步,这也支持多方应用程序。当DDoS攻击的目的是阻塞网络时,应用层的Anti-DDoS解决方案(如跳端口)是无效的。受害者可能需要基于网络(即路由器级别)的解决方案来解决问题。在针对DDoS攻击的基于网络的解决方案中,网络能力机制是一种新颖的方法[6]。功能是一种类似票证的令牌,可由路由器检查,服务器可以为合法流量发出该令牌。但是,恶意主机可能会用建立功能的请求淹没服务器,从而导致可能的拒绝功能(DoC)。在[4]中,我们提出了一种算法来减轻DoC攻击。通过该算法,合法主机获得服务的概率有保证。该算法将服务器处理能力请求的能力划分为配额。配额是基于汇树架构分配的。随机化和布隆过滤器被用作对抗威胁(攻击场景)的工具。在[4]中也讨论了容错问题和所提出方法的部署。该算法不仅适用于解决DoC问题,也适用于一般的基于身份验证的DDoS攻击解决方案,因为合法主机在向服务器发送数据包之前总是需要获取生成身份验证令牌的秘密。缓解DDoS攻击不仅对攻击对象具有挑战性,而且对网络也具有挑战性,因为大量的非法流量与合法流量共享相同的网络资源,从而导致拥塞现象和性能下降。考虑到恶意流量,我们希望在理想情况下完全禁止它消耗网络资源。为了实现这一目标,恶意流量应该被控制在尽可能靠近源的地方。可以观察到,在网络的保护级别和保护方法的效率/开销之间存在权衡。通过建立早期的工作和改进控制方面的分布,在[3]中,我们提出了一种称为CluB的主动方法来减轻DDoS攻击。该方法通过解决网络中控制粒度的问题来平衡效率和开销的权衡。CluB可以与网络中的不同路由策略协作,包括现代数据图选项。在[3]中,我们估计了该方法的有效性,并研究了一组用于调整控制粒度的因素。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信