On Filtering of DDoS Attacks Based on Source Address Prefixes

G. Pack, Jaeyoung Yoon, Eli Collins, Cristian Estan
{"title":"On Filtering of DDoS Attacks Based on Source Address Prefixes","authors":"G. Pack, Jaeyoung Yoon, Eli Collins, Cristian Estan","doi":"10.1109/SECCOMW.2006.359537","DOIUrl":null,"url":null,"abstract":"Distributed denial of service (DDoS) attacks are a grave threat to Internet services and even to the network itself. Widely distributed \"zombie\" computers subverted by malicious hackers are used to orchestrate massive attacks. Any defense against such flooding attacks must solve the hard problem of distinguishing the packets that are part of the attack from legitimate traffic, so that the attack can be filtered out without much collateral damage. We explore one technique that can be used as part of DDoS defenses: using ACL rules that distinguish the attack packets from the legitimate traffic based on source addresses in packets. One advantage of this technique is that the ACL rules can be deployed in routers deep inside the network where the attack isn't large enough to cause loss of legitimate traffic due to congestion. The most important disadvantage is that the ACL rules can also cause collateral damage by discarding some legitimate traffic. We use simulations to study this damage how it is influenced by various factors. Our technique is much better than uninformed dropping due to congestion, but it produces larger collateral damage than more processing-intensive approaches. For example it can reduce the attack size by a factor of 3 while also dropping between 2% and 10% of the legitimate traffic. We recommend the use of source address prefix based filtering in combination with other techniques, for example as a coarse pre-filter that ensures that devices performing the processing-intensive filtering are not overwhelmed","PeriodicalId":156828,"journal":{"name":"2006 Securecomm and Workshops","volume":"25 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2006-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"27","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2006 Securecomm and Workshops","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/SECCOMW.2006.359537","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 27

Abstract

Distributed denial of service (DDoS) attacks are a grave threat to Internet services and even to the network itself. Widely distributed "zombie" computers subverted by malicious hackers are used to orchestrate massive attacks. Any defense against such flooding attacks must solve the hard problem of distinguishing the packets that are part of the attack from legitimate traffic, so that the attack can be filtered out without much collateral damage. We explore one technique that can be used as part of DDoS defenses: using ACL rules that distinguish the attack packets from the legitimate traffic based on source addresses in packets. One advantage of this technique is that the ACL rules can be deployed in routers deep inside the network where the attack isn't large enough to cause loss of legitimate traffic due to congestion. The most important disadvantage is that the ACL rules can also cause collateral damage by discarding some legitimate traffic. We use simulations to study this damage how it is influenced by various factors. Our technique is much better than uninformed dropping due to congestion, but it produces larger collateral damage than more processing-intensive approaches. For example it can reduce the attack size by a factor of 3 while also dropping between 2% and 10% of the legitimate traffic. We recommend the use of source address prefix based filtering in combination with other techniques, for example as a coarse pre-filter that ensures that devices performing the processing-intensive filtering are not overwhelmed
基于源地址前缀的DDoS攻击过滤研究
分布式拒绝服务(DDoS)攻击是对Internet服务甚至网络本身的严重威胁。被恶意黑客破坏的广泛分布的“僵尸”电脑被用来策划大规模攻击。任何针对此类泛洪攻击的防御都必须解决将属于攻击的数据包与合法流量区分开来的难题,以便在没有太多附带损害的情况下过滤掉攻击。我们探索了一种可以作为DDoS防御一部分的技术:使用ACL规则,根据数据包中的源地址区分攻击数据包和合法流量。这种技术的一个优点是,ACL规则可以部署在网络深处的路由器中,在这些路由器中,攻击不会大到导致由于拥塞而导致合法流量的损失。最大的缺点是ACL规则也会导致一些合法流量被丢弃,从而造成附带损害。我们使用模拟来研究这种损害是如何受到各种因素的影响的。我们的技术比由于拥塞而导致的不知情丢弃要好得多,但它比更多的处理密集型方法产生更大的附带损害。例如,它可以将攻击规模减少3倍,同时减少2%到10%的合法流量。我们建议将基于源地址前缀的过滤与其他技术结合使用,例如作为粗预过滤器,以确保执行处理密集型过滤的设备不会不堪重负
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信