A Gateway-based Defense System for Distributed Denial-of-Service Attacks in High-Speed Networks

Size: px
Start display at page:

Download "A Gateway-based Defense System for Distributed Denial-of-Service Attacks in High-Speed Networks"

Transcription

1 SUBMITTED TO IEEE TRANSACTIONS ON SYSTEM, MAN, AND CYBERNETICS 1 A Gateway-based Defense System for Distributed Denial-of-Service Attacks in High-Speed Networks Dong Xuan, Shengquan Wang, Ye Zhu, Riccardo Bettati, and Wei Zhao Abstract We describe a defense system to contain Distributed Denial-of-Service (DDoS) flooding attacks in highspeed networks. We aim at protecting TCP friendly traffic, which forms a large portion of Internet traffic. DDoS flooding attacks tend to establish large numbers of malicious traffic flows to congest network. These flows are marked as TCP flows, and use spoofed source identifiers to hide their identities. Current network equipment lacks the countermeasure abilities for such kind of DDoS attack. We describe a gateway-based countermeasure approach. A gateway is a device that is inserted in some point of the network. We envision the gateway devices that are deployed in the network to collaboratively perform the desired countermeasure functions, including detection of DDoS flooding attacks and access control of network traffic. Given the nature of DDoS attack in high speed networks and the limitation of defense resources, it is impossible for the gateway to work on the individual level of on-going traffic flows. We use a groupbased strategy where we partition the network under DDoS attack into several subnetworks, and handle the traffic from the same subnetworks as an aggregate. This approach is applied both in attack detection and access control. With this strategy, the system can be free from the overhead to handle individual flows, and focus on the groups of traffic flows. I. INTRODUCTION Recent events have shown how various forms of scripts and other forms of automation can be used to harness large numbers of largely unprotected resources on the Internet to mount security attacks on very large scales. The most prominent form of such attacks is the distributed denial of service (DDoS) attack. Given the large amounts of resources available to the attacker, critical components of a victim can be easily overwhelmed, and so the service provided by the victim effectively disrupted. These attacks typically exhaust link bandwidth, router processing capacity, and/or network stack resources, to achieve their objective of breaking network connectivity to the victims. Very little has been done to date in terms of early detec- Dong Xuan is with the Department of Computer Information and Science, the Ohio-State University, Columbus, OH xuan@cis.ohio-state.edu. Shengquan Wang, Ye Zhu, Riccardo Bettati, and Wei Zhao are with the Department of Computer Science, Texas A&M University, College Station, TX {swang, bettati, zhao}@cs.tamu.edu, zhuye@tamu.edu. tion and containment of this form of DDoS attacks. This is largely caused by the difficulties encountered in designing such systems. Difficulties arise from three aspects: First, it is difficult to maintain high friendly TCP traffic throughput under the DDoS attack. Current DDoS defense strategies based on packet dropping cannot avoid dropping significant numbers of TCP friendly packets due to the difficulty to separate TCP friendly traffic from malicious traffic in high-speed networks. Since TCP traffic is inherently responsive, additional dropping of TCP traffic significantly amplifies the effect caused by the DDoS attack. Second, DDoS flooding attacks are inherently difficult to detect. The attack flows hide their identities by using spoofed source identifiers and by marking themselves as TCP flows, although their dynamics is completely unresponsive. An individual attack flow looks like a friendly flow in terms of the network bandwidth consumption. Millions of such mini-flows (generated by using spoofed sources) make the network congested, however. Naturally, the attack flows aggregate together with the friendly TCP flows (they maybe come from the same sources). Finally, the large number of flows involved in massive DDoS attacks require large amounts of resources to be devoted to classifying, monitoring, and countering malicious flows. The limited system resources, such as the CPU processing capacity, buffer etc, are easily exhausted in detecting millions of the above attack flows from the friendly TCP flows. Individual malicious flows can operate significantly below the detection level of current monitoring technology. In this study, we aim at designing a defense system that contains DDoS flooding attacks in high-speed networks. The objectives are to (a) maximize friendly traffic throughput while reducing attack traffic as much as possible, (b) minimize the disturbance of the defense system on delay performance of friendly traffic, and (c) achieve high compatibility to the existing systems. We adopt the following two main strategies to achieve these objectives: A gateway-based defense strategy: We adopt a gateway based approach. In this context, a gateway is a device that is inserted in some point of the network. We envision the gateway devices that are deployed in the network to

2 SUBMITTED TO IEEE TRANSACTIONS ON SYSTEM, MAN, AND CYBERNETICS 2 collaboratively perform the desired countermeasure functions, including detection of DDoS flooding attacks and access control of network traffic. A group-based defense strategy: Given the nature of DDoS attack in high speed networks and the limitation of defense resources, it is impossible for the gateway to work on the individual level of on-going traffic flows. In this study, we adopt a group-based strategy. The basic idea is that we partition the network under DDoS attack into several subnetworks, and use the same treatments to the traffic from the same subnetworks. The idea is applied both in attack detection and access control. With this strategy, the system can be free from the overhead to handle individual flows, and focus on the groups of traffic flows. Besides the above main defense strategies, we adopt efficient defense approaches at each stage of DDoS defense. At the stage of attack detection, we design TCP-ACK based attack detection, and use statistical sampling to efficiently obtain the knowledge of the traffic under DDoS attack. At the stage of access control, we classify the traffic into different classes according to their geometry similarity and the damaged degree by DDoS attack. We design a multi-class RED control block with a Class-based Queueing (CBQ) scheduler to control the consumption of bandwidth, aiming to achieve the maximum possible throughput. The rest of the paper is organized as follows: Previous work related to our study is discussed in Section II. In Section III, we introduce the network model used in this paper. We also categorize DDoS flooding attacks, and identify the one we will address in this study. The defense system and gateway architecture are studied in Section IV and Section V respectively. Attack detection strategy and access control strategy are described in Section VI and Section VII respectively. We describe gateway cooperation in Section VIII. In Section IX, we discuss extension of the proposed system. We summarize the paper in Section X. II. PREVIOUS WORK Recent work on DoS can be categorized into one of the following three classes: Network Infrastructure Protection, DoS Detection, and DoS Response. We elaborate on each of them shortly, describe at least one example for each category. Network Infrastructure Protection: This line of work focuses on attack prevention and defense through a robust infrastructure. Work at the University of Michigan, for example, starts from an analysis of Internet routing instabilities [3], and studies the use of methods to prevent attackers from getting network information, and methods to automate back-tracing of DDoS attacks. BBN s Secure Broader Gateway Protocol (S-BGP) [2] architecture employs three security mechanisms to render BGP robust against attacks: A Public key Infrastructure is used to support the authentication of Autonomous Systems and BGP routers, and of various authorizations. A BGP transitive path attribute is employed to carry digital signatures (in attestation ) covering the routing information in BGP UPDATEs. IPsec is used to provide data and partial sequence integrity, and to enable BGP routers to authenticate each other for exchanges of BGP control traffic. Anderson et al. [7] addresses methods to render protocols enforceable. In such cases, behavioral properties must be checked in a no-trust relation. This can be done by having appropriate countermeasures to respond to misbehavior or by modifying protocols to carry enough status to verify correct operation. This work is mostly focusing on TCP. DoS Detection: BBN s Source Path Isolation Engine (SPIE) attempts to locate source of attacks by tracing back the path of packets. The result is a graph back to a set of origins, some of which may be the attackers. Work at Network Associates attempts to enhance the attack detection and response capacity via active network (AN) technology. The work is based on CITRA (Cooperative Intrusion Trace-back and Response Architecture) and the Intruder Detection and Isolation Protocol architecture [8]. Packets belonging to DDoS attacks do not have readily-identifiable flow signatures, some researchers developed the concept of Aggregate-based Congestion Control, which can be used to counter some formats of DDoS flooding attacks [5]. DoS Response: Mechanisms for response use a combination of (a) restricting the access of the attacker by limiting access to resources, (b) re-routing to isolate critical components, and (c) back-tracing and offensive attack suppression. A. Network Model III. MODELS In this work, we restrict ourselves to a single domain, and we focus our attention on domains that are not transit domains. This means that either sources or destinations of traffic flows belong to the domain. We also assume that the domain is fully within our jurisdiction. This means, for example, that we can deploy our gateways anywhere in the domain, and that gateways know the exact topology of the domain. B. DDoS Flooding Attack Model In this paper, we propose a defense system against DDoS flooding attacks. This form of DDoS attacks is caused by the attacker(s) breaking into a large number of

3 SUBMITTED TO IEEE TRANSACTIONS ON SYSTEM, MAN, AND CYBERNETICS 3 geographically dispersed machines, and harnessing their computing and communication resources for large-scale, coordinated attacks on victim sites. These attacks typically exhaust link bandwidth, router processing capacity, and/or network stack resources, to achieve their objective of breaking network connectivity to the victims. Network resources can be consumed by DDoS flooding attacks in two forms: A1: When the attack originates from only a few number of hosts, the individual attack flows must very aggressively consume bandwidth, and the attack flows can easily be identified by their bandwidth consumption behavior. A2: If more hosts are involved as sources of the attack, individual flows can be made to behave in a much more compliant fashion, and so can behave similarly to TCP or UDP flows expected in the system. The attacker can achieve this by frequently changing sources (i.e. using spoofed sources) to hide flow identities. If such flows are multiplexed with friendly traffic, it becomes very difficult to detect and drop the attack traffic to prevent losing a lot of friendly packets, which is not tolerant for TCP traffic. In addition, flows in a DDoS flooding attack tend to be non-responsive, i.e., they use UDP-style dynamics to congest the network. However, the attack traffic may be marked as: B1: TCP B2: UDP in the IP packet header. Some DDoS flooding attacks may spoof their sources, others may not, hence we can categorize the attacks as C1: spoofed-source attacks C2: non-spoofed-source attacks As mentioned above, we work in the network with a single domain. There are two possibilities of the distribution of the attack sources: D1: all attack sources are outside the network. D2: there may be some attack sources inside the network. We use a 4-tuple to represent the different cases of DDoS flooding attacks. For instance, A2, B1, C1, D1 represents the case in which attacks use an extraordinary large number of attack traffic with TCP header and spoofed source to congest the network, and the real attack sources are out of the attacked network. Obviously, there may be mixed cases. For example, attacks may use both TCP and UDP marked flows to congest the network. In this study, we work on Case A2, B1, C1, D1, where many hosts have been harassed into flooding the victim with non-responsive traffic marked as TCP, where the source addresses are spoofed, and where all sources are outside the considered network. We believe that this is one of the most typical and challenging cases. In Section IX, we will discuss how to extend our work to the other cases. IV. SYSTEM OVERVIEW In this section, we give the overview of the whole defense system to DDoS attacks k Fig. 1. A Part of a Network with Gateways The defense system centers around the gateway. A gateway is a device that is inserted in some point of the network. It is an external unit to the network existing equipments. With this strategy, no change is need to the current network equipments or network protocols, and high compatibility can be achieved. Figure 1 illustrates a part of a network with several gateways deployed. The basic functions of the gateways are attack detection and access control. Gateways in the network cooperate with each other to achieve high defense efficiency. They may share attack detection results, and work on different portion of the ongoing traffic. Given the nature of DDoS attack in high speed networks and the limitation of defense resources, it is impossible for the gateway to work on the individual level of on-going traffic flows. In this study, we adopt a group-based strategy. The basic idea is that we partition the network under DDoS attack into several subnetworks, and handle the traffic from the same subnetworks as an aggregate. Our idea of grouping can be applied to all stages of defense including attack detection and access control. With this strategy, the system can be free from the overhead to handle individual flows, and focus on the grouped traffic. In the following sections, we will first describe the architecture of the basic unit in our defense system, then introduce two main defense functions: attack detection and access control

4 SUBMITTED TO IEEE TRANSACTIONS ON SYSTEM, MAN, AND CYBERNETICS 4 V. GATEWAY ARCHITECTURE As mentioned above, the gateway is the basic unit in our proposed defense system. The basic functionality of the gateway is to perform attack detection and traffic access control. Figure 2 shows the basic architecture of one Access Control Module Network Traffic DB Classifier Traffic Sampling Checking RED RED RED Sampling Rules Signaling Module Fig. 2. The Gateway Architecture Scheduler Attack Detection Module gateway. There are three modules within a gateway: Attack Detection Module (AD Module, in short): This module is responsible for obtaining the knowledge of the network traffic suffering DDoS attack. As mentioned above, given the limited resources, it is impossible for a gateway to get individual flow information. We propose a way to know the overall knowledge of traffic under DDoS attack, such as the percentage of traffic belonging to the bad traffic. The knowledge will be used by the Traffic Access Control module. The module will select a portion of the on-going traffic to perform attack detection. Accordingly, this module can be further divided into the traffic sampling sub-module and the checking sub-module. The traffic is sampled and selected by the traffic sampling submodule, and queued at the buffer between the two submodules for checking. The traffic handled by this module is copied from the on-going traffic, hence there is little disturbance on the on-going friendly traffic introduced by this module. Traffic Access Control Module (TAC Module, in short): This module takes response actions on the on-going traffic based on the knowledge obtained by the AD module. The response actions can be packet dropping, and forwarding. Recall that we aim to protect TCP traffic. We overall reserve a limited amount of bandwidth for UDP traffic, and do comprehensive control on TCP traffic. The control is based on equations of RED and TCP. The results of detection, i.e, the overall situation of defection by DDoS attack of each group, are used in BW assignment to maximize the total friendly TCP traffic throughput. Signaling Module (SIG Module, in short) : This module provides communication channels among gateways. Gateways cooperate with each other via these channels by exchanging networking information and coordination rules. It is not necessary for a gateway to have all above three modules. Some gateways may just have the Detection Module and the Signaling Modules, which stick to attack defense. Some may just have Access Control And Signaling Modules, focusing on access control. Cooperation among gateways is introduced to make sure gateways work on the different and proper portions of the on-going traffic. Eventually, the individual gateways countermeasure behavior together with their cooperation construct the working scenario of the whole defense system. VI. ATTACK DETECTION The main purpose of attack detection is to obtain the knowledge of the traffic that may be under DDoS attack. In the following, we will first introduce the basic strategy for attack detection, and then discuss how to adopt this technology in high speed networks. A. TCP-ACK based Attack Detection As mentioned early, we aim at protecting friendly TCP flows. Once under an attack, there may be millions of low-bandwidth, unresponsive flows marked as TCP traffic present. Thus, a successful classification mechanism has to be in place. In this study, we decide to keep track of the TCP friendly flows rather than the attack flows. We identify the friendly TCP flows based on the TCP semantics. There are two special characteristics in TCP semantics which are different from UDP. One is that a TCP flow (connection) experiences a three-stage of handshaking in the flow (connection) establishment. An unresponsive attack flow with a spoofed source, although marked as a TCP flow, cannot establish a real TCP flow (connection). The reason is that its source unlikely gets the SYN-ACK packet from the receiver which destines to the spoofed source rather than its real source. Unfortunately, it will be very difficult for the gateway to monitor the three-stage connection establishment for the individual flows. The other special point in TCP semantics is that within an established TCP flow (connection), the sender and receiver keep exchanging ACK packets (maybe piggy bagged in data packets) to confirm the success of transmission. The matching degree of ACK packets between the sender and the receiver of a flow can be used to decide whether the flow is a friendly one or not. In this study, we rely on detecting the matching degree of ACK packets to identify the friendly traffic. We call this approach as the TCP-ACK based attack detection.

5 SUBMITTED TO IEEE TRANSACTIONS ON SYSTEM, MAN, AND CYBERNETICS 5 B. Discussion The TCP-ACK based approach can be applied to identify whether an individual flow is a friendly TCP flow or not. Ideally, the gateway can keep track of all the individual flows, and do attack detection flow by flow. However, in high speed networks, there are thousands of flows passing through a gateway. The approach may not be feasible for the following reasons: The overhead for the gateway to keep and manage perflow information is very large. The gateway has to use a very large table to keep per-flow information, and spend the significant processing power to do table management (i.e. lookup, add and delete). The overhead for the gateway to read and examine each packet header is significant, given the large number of packets passing through the gateway. To reduce both storage and process overheads mentioned above, we adopt the following schemes: Flow aggregation (or grouping): instead of working on individual flows, our scheme works on groups of flows. According to the TCP semantics, for an individual TCP flow, there is a profile on ACK amount. For a group of TCP flows, we can also get a profile on their ACK amount. We can use this profile to estimate the overall damage of a group of flows that may be under DDoS attack. With this scheme, the gateway need only use the limited size of table to keep flow information, and the overhead of table management is also reduced. The problem is that the precise degree of estimation to the overall damage of a group of flows decreases as the number of flows (i.e. population) in the group increases. An interesting issue is that given the group number 1, how to group the traffic to achieve the maximum fairness among groups in terms of the preciseness degree of estimation. We design a heuristic grouping algorithm. The basic idea of the algorithm is to let each group have the similar amount of traffic, i.e. the traffic population 2. To one gateway, the routes of the on-going traffic construct a tree rooted at the gateway itself. Our algorithm assigns the group number recursively to subtrees driven by the total traffic population of sub-trees. The more the population of a sub-tree is, the larger group number the sub-tree can be assigned 3. 1 The group number means the number of groups that the traffic can be split. Generally speaking, the group number is much smaller than the number of flows in the network. It may be determined by the processing power and storage of the gateway which can be used in attack detection. 2 In this study, we use traffic population to represent the amount of traffic in some time unit, say, second, it is equivalent to traffic arriving rate. 3 In our algorithm, the information about the traffic population of the networks with the certain degree of granularity assume to be available. We believe that the information can be obtained with much less over- Traffic sampling: We can use the statistical sampling technology to examine a subset of packets that are randomly selected, rather than to examine every packet in the traffic. With this scheme, the overhead of packet header reading can be reduced. As long as the sample size is sufficient large, a desired degree of confidence can be maintained. VII. ACCESS CONTROL Attack detection itself is not the final goal of the defense system. Once the detection is done, the system should take action based on the detection results. As mentioned above, the group-based approach is also applied here. We classify the traffic into different groups (or classes) and assign different bandwidth to achieve the overall maximum TCP throughput. In the following, we will first introduce how to classify traffic, and then concentrate on how to control traffic by using RED and CBQ technologies. A. Classification The goal of traffic classification is to put the traffic sharing the certain degree of similarities together. Since within the same class, the traffic will be treated uniformly, it is very important to make sure that the traffic in the same class share the certain degree of similarities. The similarities include: Damaging similarity: The damage degree of DDoS attack of the traffic in the same class should be similar. It is unfair to group the traffic with very low level damaged degree together with the traffic seriously damaged by DDoS attack. Geometry similarity: We will use TCP-equation based solution to control the bandwidth consumption of the traffic. The solution requires that the traffic should share some geometry similarities. By this way, the delay and other behaviors can be approximated to be same. In this study, we use the notation of the overall variance in (1) to describe the damaging similarity. The smaller variance, the higher degree of the damaging similarity of a group. On the contrary to the damaging similarity, it is difficult to quantize the similarity of geometry. In this study, we determine that only the traffic from brother-nodes can be grouped into one class. In reality, the number of classes that the traffic can be grouped into is fixed. It may be determined by the number of RED queues at the output link of the gateway. In this case, with the above consideration about similarity, the problem of classification can be defined as follows: head than the one in attack detection.

6 SUBMITTED TO IEEE TRANSACTIONS ON SYSTEM, MAN, AND CYBERNETICS 6 Given the number of classes G, and the bad traffic ratio e j for traffic group j, classify the traffic into different classes G i to minimize the variance of traffic: σ 2 = 1 P i G j G i (e i e j ) 2 P j, (1) where G is the set of class IDs, G i is the set of traffic for class i, P is the total population, e i is the average bad traffic ratio, i.e., P = P j, (2) i G j G i j G e i = i P j e j. (3) j G i P j TABLE I GROUPS GENERATED BY THE GROUPING ALGORITHM 23, , 29, , 32, 33, 34 35, 36, 37, 38 39, 40, , 44, 45, , 50 51, 52, 53, 54 55, 56, , 60, 61, 62 63, , 68, 69, 70 71, , 76, , 80, 81, , 85, 86 Note that the bad traffic ratio e j and the population P j for traffic group j are obtained in the Attack Detection module of the gateway. The classifier in the Access Control Module uses the information to classify the traffic into different classes. The problem is NP-hard. We design a heuristic classification algorithm, which is polynomial. The basic idea of this algorithm is that we sort the child-nodes of each node in the increasing order of the bad traffic ratio, and then recursively assign the class numbers to each node to get the minimum variance. Since we have sorted the child-nodes of each node, it is easy to prove that our algorithm is polynomial. The detail of the algorithm is in Appendix A. The measurement of the classification algorithm is the variance of traffic (the variance in short) which is defined in (1). For the purpose of comparison, we introduce the low-bound and the up-bound for the variance. They are obtained by randomly generating a large number 4 of classification plans. The low-bound is the minimum variance among ones resulted by these randomly generated plans. The up-bound is the average value of the variances resulted by these plans. The variance resulted by our classification algorithm should be smaller than the up-bound, and close to the low-bound k Fig. 3. Network Topology for Simulation variance Classification Alg Low-bound Up-bound The number of classes Fig. 4. Classification Results In the following, we will evaluate the performance of the classification algorithm. For the purpose of evaluation, we generate a 4-ary tree shown in Figure 3. The traffic from each leaf has population randomly generated between 1, 600kbps and 32, 000kbps. With the grouping algorithm, the tree is grouped as Table I. In Table I, all traffic from sources in same row will form one group. For example, Traffic from source 23, 26 forms one group. In the following, we use this grouped tree as the input of the classification algorithms. Figure 4 shows the evaluation data of our algorithm with the two bounds. We can find that as expected, the variance resulted by our algorithm is very close to the low-bound, and much smaller than the up-bound. Note that our algorithms performance turns to be better as the number of groups increases. It can be explained by the fact that as the class number increases, the algorithm has more freedom to classify the traffic to achieve its objective. 4 In our simulation, the number is 1000.

7 SUBMITTED TO IEEE TRANSACTIONS ON SYSTEM, MAN, AND CYBERNETICS 7 B. TCP-Equation Based Access Control The overall goal of access control is to achieve maximum TCP throughput under DDoS attack. The problem this step faces is how to smartly drop traffic to achieve the goal. In this study, we design a multi-class RED control block attached with a CBQ scheduler (see the Access Control module of the gateway in Figure 2). The block is composed of several RED queues. Different queues will have different bandwidth assignment. The bandwidth assignment determines the drop probability of the traffic. The total TCP throughput will be the sum of the throughput of all the classes of traffic. We can express it as follows: T total = p 1 (1 δ 1 )(1 e 1 ) + p 2 (1 δ 2 )(1 e 2 ) p n (1 δ n )(1 e n ). (4) p is defined as the vector of arriving rate of different classes of traffic, p 1 p 2.. (5) p n ē is defined as the vector of arriving probability of the bad traffic in different classes of traffic, e 1 e 2.. (6) e n δ is defined as the optimal vector of drop probability of different classes of traffic, δ 1 δ 2.. (7) δ n Among the above three vectors, vector p and ē are the results of classification. δ is what we want to determine at this step. An intuitive way to determine the drop probability is to let the traffic with small e i have the small drop probability. While this way is easy, it may not be able to achieve the high overall TCP throughput. The reason is that TCP traffic is responsive. The dynamic behavior of TCP traffic to packet loss should be considered. Ideally, the maximum throughput should be achieved at the stable point of the system. If the system is stable, a longterm (in other words, stable) maximum throughput can be achieved, and also the overall delay performance of the TCP traffic will be less disturbed by packet dropping performed by the gateway. Both of these are the main objectives of our work. To gain the advantages of the stability, we have to derive the stable conditions of systems. The basic idea of deriving these conditions is that first to describe the application traffic behavior into differential equations, then obtain the transfer functions of the system, finally use the control method to analyze the whole system. The differential equations to describe TCP behavior have been derived in [6]. The equations are listed as follows: dw i (t) dt dq i (t) dt = 1 R i (t) W i(t)w i (t R i (t)) δ i (t R i (t)), (8) 2R i (t) n = Ci r W i (t) + R i (t), (9) i=1 where for class i traffic, W i (t) is the TCP window function, R i (t) is TCP round trip time function, δ i (t) is RED drop probability function, q i (t) is RED queue length function and Ci r is the bandwidth for the friendly TCP traffic of each class 5. (8) describes the TCP congestion control mechanism - multiplicative decrease and additive increase. (9) describes the RED queue change. Based on the above two equations, we can get stable conditions and stable points as follows: Stable conditions: According to [1], stable conditions are listed as follows: where L red tcp i L red tcp i (R + i Cr i )3 (2N i )2 2N i w g = 0.1 min{ (R i + )2 Ci r, wg 2 + 1, (10) K2 1 R + i }, (11) is RED curve slop, one of RED parameters, R i + is the upper bound of round trip time, Ni is the lower bound of flow numbers, K = log(1 α), α is the average factor in calculating the average queue length, and is the sample time. Stable points: The stable points can be got from the differential equations (8) and (9) [1] as long as the bad traffic can be regarded as stable: W 2 i δ i = 2, (12) 5 In fact, C r i = C i p ie i, where C i is the bandwidth assigned to i-th class of traffic.

8 SUBMITTED TO IEEE TRANSACTIONS ON SYSTEM, MAN, AND CYBERNETICS 8 W i = R ic r i N i, (13) where W i is the window size, and R i is the round trip time when the system is stable. N i is the number of TCP friendly flows in the class 6. Observing the above equations, we can find the drop probabilities δ i have very clear relationship with the assigned bandwidth C i. It is very nature that higher bandwidth assigned to the class of traffic, less drop probability the class will get. Having derived the system stable conditions, now we consider some constraint system conditions: Apparently, the sum of the bandwidth assigned to all the classes of traffic should be no greater than the total bandwidth available. Hence, we have n C i βc, (14) i=0 where C i is the bandwidth assigned to i-th class of traffic, C is the link bandwidth and β is a parameter 7. Since δ i is the traffic loss rate or drop probability for the i-th class of traffic, we have 0 δ i 1, (15) for i = 0, 1,...n. Now our problem turns to find the optimal traffic drop vector δ to maximize the total TCP throughput expressed in equation (4) under the constraints of inequalities (10) (15). It is a constrained optimization NLP problem. We can use Lagrange Multiplier and non-negative Kuhn- Tucker conditions to solve it. By solving the defined optimization NLP problem, we can get the optimal drop probability for each class of traffic, and the link bandwidth assignment to each class of traffic. The RED and CBQ scheduler can work based on these parameters to achieve our objectives. Note the traffic is dynamic, vectors p and ē may change, accordingly, the drop probability and bandwidth assignment need adjusted. VIII. GATEWAY COOPERATION As mentioned above, due to the limitation of the gateway capacity, it is necessary for gateways to cooperate with each other to achieve the high defense performance. Cooperation is needed among gateways to achieve the following goals: Reducing duplication of processing the on-going traffic among gateways. 6 N i can be estimated at the stage of attack detection. 7 β can be a value between 0 and 1. It is related to the overall percentage of the bad traffic in the whole traffic passing through this gateway. Selecting the proper portion of the on-going traffic to process. Sharing the detection results among gateways. There are two schemes to reduce duplication. One scheme is to explicitly mark the IP header once a packet is selected to be further-checked. The successive gateways need not select the marked packet, and duplication can be avoid. While this scheme is effective in term of duplication reduction (in fact, it can avoid duplication), it is not compatible to the existing IP protocols. Furthermore, the overhead in writing packets is significant. We prefer the second scheme, in which the explicit coordination approach is used. With this scheme, the carefully designed rules in the attack detection module (i.e. the sampling rules in Figure 2) coordinate different gateways to select different portions of the on-going traffic. The rules also direct the classifier to class the undetected portion of traffic into one specific class. The access control module leaves certain amount of bandwidth for this portion of traffic. The following example shows how the sampling rules can reduce duplication among gateways. The rules guarantee Gateway I and J to select the different portions of the traffic based on the source address information. At Gateway I: If the last digital of an incoming packet s source address is X, the packet will be selected. At Gateway J: If the last digital of an incoming packet s source address is Y, the packet will be selected. While cooperation among gateways can reduce duplication, it can also help individual gateways to make smart selection on the portion of the on-going traffic. For example, one gateway can inform its neighboring gateways to select the traffic that the gateway has no enough capacity to handle. Cooperation in this example belongs to the dynamic explicit coordination approach. With this approach, the defense load can be distributed dynamically among gateways depending on the dynamic network situation. Cooperation at this point can also be in a static manner. The following distance-based traffic selection falls into this category. To reduce bandwidth consumption of attack traffic is our basic approach to DDoS flooding attacks. Different attack traffic may have different targets with different paths, accordingly, having different potential bandwidth consumption damage. Generally speaking, the attack traffic with a longer path will consume more bandwidth and cause more damage than the traffic with a shorter path. Hence, it is beneficial for the gateway to process more packets with longer remaining paths from the gateway to the destinations of the packets, as opposed to ones with shorter remaining paths among the on-going traffic. Gateways can also exchange the detected traffic information to complement the locally obtained database. It

9 SUBMITTED TO IEEE TRANSACTIONS ON SYSTEM, MAN, AND CYBERNETICS 9 is particularly useful among the gateways who are on the same path of the attack traffic. Recall that some gateways in our system may not have the attack detection module. Sharing detection information is particular useful for this type of gateways. IX. EXTENSIONS In this study, we do not discuss the issue of gateway deployment. The interested readers can refer the work reported in [4]. Recall that in Section III, we used a 4-tuple to model DDoS flooding attacks. In this study, we focus on containing the attack in case A2, B1, C1, D1, where attacks use an extraordinary large amount of attack traffic with TCP headers and spoofed sources to congest the network, and the real attack sources are out of the attacked network. We believe that this is one of the most typical and challenging cases. In this section, for the sake of space limitation, we discuss how to extend our work to DDoS flooding attacks which use UDP or mixed traffic i.e. UDP and TCP traffic to congest the network. In cases where attackers use pure UDP traffic, that is, traffic marked as UDP, to congest the network, at least 80 percent of the TCP friendly traffic can be easily separated from the attack traffic. Also, since UDP flows are not responsive flows, the friendly UDP flows are tolerant to some degree of packet losses. Hence, packet dropping can be relatively easy to perform on the UDP flows (both attack and friendly flows) to control their bandwidth consumption. Also, the defense system can monitor the bandwidth usage of individual UDP flows to identify the attack traffic. In cases that attackers use the mixed traffic, i.e. UDP and TCP traffic to congest the network, we have to handle both the TCP and UDP attacks. Due to the resource limitation, the defense system may have to spend most of its capacity on protecting TCP flows by: (1) discriminating TCP and UDP traffic via strictly limiting the bandwidth usage of UDP traffic, say in any cases, only up to 10 percent of bandwidth can be used for UDP traffic. In this way, the bandwidth for TCP traffic can be guaranteed; (2) adopting the approaches proposed in this study to protect friendly TCP traffic. X. CONCLUSION We have proposed a defense system for DDoS flooding attack. The individual gateways countermeasure behavior together with their cooperation construct the working scenario of the whole defense system. Our designed system is compatible in the sense that it adopts the gateway-based approach, and no changes are needed to the existing systems and network protocols. The system is efficient and feasible in high speed networks in the sense that it adopts the group-based approach, and the system is free from the overhead to handle individual flows. In this study we propose several efficient defense approaches at each stage of DDoS defense. At the stage of attack detection, we design TCP-ACK based attack detection, and use statistical sampling to efficiently obtain the knowledge of the traffic under DDoS attack. At the stage of access control, we classify the traffic into different classes according to their geometry similarity and the damaged degree by DDoS attack. We design a multi-class RED control block with a Class-based Queuing (CBQ) scheduler to control the consumption of bandwidth, aiming to achieve the maximum possible throughput. Currently, we are implementing the prototype in the Linux environment. We are also investigating how to integrate the current existing detection technologies such spoof-source filtering schemes into our defense system. REFERENCES [1] C.V. Hollot, Vishal Misra, Don Towsley and Wei-Bo Gong, A Control Theoretic Analysis of RED, Proceedings of IEEE Infocom, [2] S. Kent, C. Lynn, J. Mikkelson, and K. Seo, Secure Border Gateway Protocol (S-BGP)-Real Worked Performance and Deployment Issues, in Proceedings of the Network and Distributed System Security Symposium (NDSS2000), Feb [3] G. Labovitz, G. Robert malan and F. Jahanian, Origins of Internet Routing Instability, in Proceedings of IEEE Infocom 99. [4] B. Li, M. J. Golin, G. F. Italiano and X. Deng, On the optimal placement of web proxies in the Internet, in Proceedings of IEEE Infocom 99. [5] R. Matajan, S. Bellovin, S. Floyd, J. Ioannidis, V. Paxson and S. Shanker, Controlling high bandwidth aggregates in the network, submitted to ACM SIGCOMM [6] Vishal Misra, Weibo Gong, Don Towsley, Fluid-based Analysis of a Network of AQM Routers Supporting TCP Flows with an Application to RED, in Proceedings of ACM SIGCOMM, [7] S. Savage, N. Gardwell, D. Wetherall and T. Anderson, TCP Congestion Control with a Misbehaving Receiver Review, ACM Computer Communications Review, v29, no5, October [8] D. Schnackenberg, K. Djahandari and D. Sterne, Infrastructure for Intrusion detection and Response, in Proceedings of the DARPA Information Survivability Conference and Exposition (DISCEX) [9] Defense Information Systems Agency, Network Warfare Simulation, URL:

10 SUBMITTED TO IEEE TRANSACTIONS ON SYSTEM, MAN, AND CYBERNETICS 10 APPENDIX A: THE ALGORITHM OF CLASSIFICATION Input: tree T with root ROOT, traffic population P i and bad traffic ratio e i going through node i, and class number CN. Output: classified tree CT and variance V AR. 1. sort tree T, such that for each father node, all his children s e i s are ordered increasingly; 2. each node is initialized with class number 0; 3. call Classif ication(root, CN, CT, V AR) 4. return CT and V AR. Fig. 5. The Algorithm of Classification Classification(i, CN i, CT, V AR) 1. if i is not a leaf 1.1. assign each child j with class number CN j, such that j C i CN j = CN i and only brother nodes can be grouped together (C i is the set of children of node i); 1.2. for each class number assignment for each child j RET = Classification(j, CN j, CT, V AR); if RET = FALSE goto 1.2; else continue; compute the current variance cur V AR, set V AR = min{cur V AR, V AR} and update its corresponding CT ; 2. if i is a leaf 2.1. if CN i > 1 return FALSE; else return T RU E; Fig. 6. Procedure Classification

A Gateway-based Defense System for Distributed DoS Attacks in High-Speed Networks

A Gateway-based Defense System for Distributed DoS Attacks in High-Speed Networks Proceedings of the 2001 IEEE Workshop on Information Assurance and Security W1A2 0900 United States Military Academy, West Point, NY, 5 6 June 2001 A Gateway-based Defense System for Distributed DoS Attacks

More information

Performance Analysis of AQM Schemes in Wired and Wireless Networks based on TCP flow

Performance Analysis of AQM Schemes in Wired and Wireless Networks based on TCP flow International Journal of Soft Computing and Engineering (IJSCE) Performance Analysis of AQM Schemes in Wired and Wireless Networks based on TCP flow Abdullah Al Masud, Hossain Md. Shamim, Amina Akhter

More information

Flexible Deterministic Packet Marking: An IP Traceback Scheme Against DDOS Attacks

Flexible Deterministic Packet Marking: An IP Traceback Scheme Against DDOS Attacks Flexible Deterministic Packet Marking: An IP Traceback Scheme Against DDOS Attacks Prashil S. Waghmare PG student, Sinhgad College of Engineering, Vadgaon, Pune University, Maharashtra, India. prashil.waghmare14@gmail.com

More information

Firewalls and Intrusion Detection

Firewalls and Intrusion Detection Firewalls and Intrusion Detection What is a Firewall? A computer system between the internal network and the rest of the Internet A single computer or a set of computers that cooperate to perform the firewall

More information

Provider-Based Deterministic Packet Marking against Distributed DoS Attacks

Provider-Based Deterministic Packet Marking against Distributed DoS Attacks Provider-Based Deterministic Packet Marking against Distributed DoS Attacks Vasilios A. Siris and Ilias Stavrakis Institute of Computer Science, Foundation for Research and Technology - Hellas (FORTH)

More information

MONITORING OF TRAFFIC OVER THE VICTIM UNDER TCP SYN FLOOD IN A LAN

MONITORING OF TRAFFIC OVER THE VICTIM UNDER TCP SYN FLOOD IN A LAN MONITORING OF TRAFFIC OVER THE VICTIM UNDER TCP SYN FLOOD IN A LAN Kanika 1, Renuka Goyal 2, Gurmeet Kaur 3 1 M.Tech Scholar, Computer Science and Technology, Central University of Punjab, Punjab, India

More information

Comparing Two Models of Distributed Denial of Service (DDoS) Defences

Comparing Two Models of Distributed Denial of Service (DDoS) Defences Comparing Two Models of Distributed Denial of Service (DDoS) Defences Siriwat Karndacharuk Computer Science Department The University of Auckland Email: skar018@ec.auckland.ac.nz Abstract A Controller-Agent

More information

Quality of Service using Traffic Engineering over MPLS: An Analysis. Praveen Bhaniramka, Wei Sun, Raj Jain

Quality of Service using Traffic Engineering over MPLS: An Analysis. Praveen Bhaniramka, Wei Sun, Raj Jain Praveen Bhaniramka, Wei Sun, Raj Jain Department of Computer and Information Science The Ohio State University 201 Neil Ave, DL39 Columbus, OH 43210 USA Telephone Number: +1 614-292-3989 FAX number: +1

More information

A Novel Packet Marketing Method in DDoS Attack Detection

A Novel Packet Marketing Method in DDoS Attack Detection SCI-PUBLICATIONS Author Manuscript American Journal of Applied Sciences 4 (10): 741-745, 2007 ISSN 1546-9239 2007 Science Publications A Novel Packet Marketing Method in DDoS Attack Detection 1 Changhyun

More information

Large-Scale IP Traceback in High-Speed Internet

Large-Scale IP Traceback in High-Speed Internet 2004 IEEE Symposium on Security and Privacy Large-Scale IP Traceback in High-Speed Internet Jun (Jim) Xu Networking & Telecommunications Group College of Computing Georgia Institute of Technology (Joint

More information

Tackling Congestion to Address Distributed Denial of Service: A Push-Forward Mechanism

Tackling Congestion to Address Distributed Denial of Service: A Push-Forward Mechanism Tackling Congestion to Address Distributed Denial of Service: A Push-Forward Mechanism Srinivasan Krishnamoorthy and Partha Dasgupta Computer Science and Engineering Department Arizona State University

More information

Prediction of DDoS Attack Scheme

Prediction of DDoS Attack Scheme Chapter 5 Prediction of DDoS Attack Scheme Distributed denial of service attack can be launched by malicious nodes participating in the attack, exploit the lack of entry point in a wireless network, and

More information

Application of Netflow logs in Analysis and Detection of DDoS Attacks

Application of Netflow logs in Analysis and Detection of DDoS Attacks International Journal of Computer and Internet Security. ISSN 0974-2247 Volume 8, Number 1 (2016), pp. 1-8 International Research Publication House http://www.irphouse.com Application of Netflow logs in

More information

Security vulnerabilities in the Internet and possible solutions

Security vulnerabilities in the Internet and possible solutions Security vulnerabilities in the Internet and possible solutions 1. Introduction The foundation of today's Internet is the TCP/IP protocol suite. Since the time when these specifications were finished in

More information

Comparative Analysis of Congestion Control Algorithms Using ns-2

Comparative Analysis of Congestion Control Algorithms Using ns-2 www.ijcsi.org 89 Comparative Analysis of Congestion Control Algorithms Using ns-2 Sanjeev Patel 1, P. K. Gupta 2, Arjun Garg 3, Prateek Mehrotra 4 and Manish Chhabra 5 1 Deptt. of Computer Sc. & Engg,

More information

CHAPTER 1 INTRODUCTION

CHAPTER 1 INTRODUCTION 21 CHAPTER 1 INTRODUCTION 1.1 PREAMBLE Wireless ad-hoc network is an autonomous system of wireless nodes connected by wireless links. Wireless ad-hoc network provides a communication over the shared wireless

More information

Dr. Arjan Durresi Louisiana State University, Baton Rouge, LA 70803 durresi@csc.lsu.edu. DDoS and IP Traceback. Overview

Dr. Arjan Durresi Louisiana State University, Baton Rouge, LA 70803 durresi@csc.lsu.edu. DDoS and IP Traceback. Overview DDoS and IP Traceback Dr. Arjan Durresi Louisiana State University, Baton Rouge, LA 70803 durresi@csc.lsu.edu Louisiana State University DDoS and IP Traceback - 1 Overview Distributed Denial of Service

More information

Defending against Flooding-Based Distributed Denial-of-Service Attacks: A Tutorial

Defending against Flooding-Based Distributed Denial-of-Service Attacks: A Tutorial Defending against Flooding-Based Distributed Denial-of-Service Attacks: A Tutorial Rocky K. C. Chang The Hong Kong Polytechnic University Presented by Scott McLaren 1 Overview DDoS overview Types of attacks

More information

Design and Experiments of small DDoS Defense System using Traffic Deflecting in Autonomous System

Design and Experiments of small DDoS Defense System using Traffic Deflecting in Autonomous System Design and Experiments of small DDoS Defense System using Traffic Deflecting in Autonomous System Ho-Seok Kang and Sung-Ryul Kim Konkuk University Seoul, Republic of Korea hsriver@gmail.com and kimsr@konkuk.ac.kr

More information

Analysis of IP Network for different Quality of Service

Analysis of IP Network for different Quality of Service 2009 International Symposium on Computing, Communication, and Control (ISCCC 2009) Proc.of CSIT vol.1 (2011) (2011) IACSIT Press, Singapore Analysis of IP Network for different Quality of Service Ajith

More information

How To Protect Your Network From A Ddos Attack On A Network With Pip (Ipo) And Pipi (Ipnet) From A Network Attack On An Ip Address Or Ip Address (Ipa) On A Router Or Ipa

How To Protect Your Network From A Ddos Attack On A Network With Pip (Ipo) And Pipi (Ipnet) From A Network Attack On An Ip Address Or Ip Address (Ipa) On A Router Or Ipa Defenses against Distributed Denial of Service Attacks Adrian Perrig, Dawn Song, Avi Yaar CMU Internet Threat: DDoS Attacks Denial of Service (DoS) attack: consumption (exhaustion) of resources to deny

More information

Passive Queue Management

Passive Queue Management , 2013 Performance Evaluation of Computer Networks Objectives Explain the role of active queue management in performance optimization of TCP/IP networks Learn a range of active queue management algorithms

More information

Using Fuzzy Logic Control to Provide Intelligent Traffic Management Service for High-Speed Networks ABSTRACT:

Using Fuzzy Logic Control to Provide Intelligent Traffic Management Service for High-Speed Networks ABSTRACT: Using Fuzzy Logic Control to Provide Intelligent Traffic Management Service for High-Speed Networks ABSTRACT: In view of the fast-growing Internet traffic, this paper propose a distributed traffic management

More information

A TWO LEVEL ARCHITECTURE USING CONSENSUS METHOD FOR GLOBAL DECISION MAKING AGAINST DDoS ATTACKS

A TWO LEVEL ARCHITECTURE USING CONSENSUS METHOD FOR GLOBAL DECISION MAKING AGAINST DDoS ATTACKS ICTACT JOURNAL ON COMMUNICATION TECHNOLOGY, JUNE 2010, ISSUE: 02 A TWO LEVEL ARCHITECTURE USING CONSENSUS METHOD FOR GLOBAL DECISION MAKING AGAINST DDoS ATTACKS S.Seetha 1 and P.Raviraj 2 Department of

More information

Low-rate TCP-targeted Denial of Service Attack Defense

Low-rate TCP-targeted Denial of Service Attack Defense Low-rate TCP-targeted Denial of Service Attack Defense Johnny Tsao Petros Efstathopoulos University of California, Los Angeles, Computer Science Department Los Angeles, CA E-mail: {johnny5t, pefstath}@cs.ucla.edu

More information

A Passive Method for Estimating End-to-End TCP Packet Loss

A Passive Method for Estimating End-to-End TCP Packet Loss A Passive Method for Estimating End-to-End TCP Packet Loss Peter Benko and Andras Veres Traffic Analysis and Network Performance Laboratory, Ericsson Research, Budapest, Hungary {Peter.Benko, Andras.Veres}@eth.ericsson.se

More information

A Novel Distributed Denial of Service (DDoS) Attacks Discriminating Detection in Flash Crowds

A Novel Distributed Denial of Service (DDoS) Attacks Discriminating Detection in Flash Crowds International Journal of Research Studies in Science, Engineering and Technology Volume 1, Issue 9, December 2014, PP 139-143 ISSN 2349-4751 (Print) & ISSN 2349-476X (Online) A Novel Distributed Denial

More information

NEW TECHNIQUES FOR THE DETECTION AND TRACKING OF THE DDOS ATTACKS

NEW TECHNIQUES FOR THE DETECTION AND TRACKING OF THE DDOS ATTACKS NEW TECHNIQUES FOR THE DETECTION AND TRACKING OF THE DDOS ATTACKS Iustin PRIESCU, PhD Titu Maiorescu University, Bucharest Sebastian NICOLAESCU, PhD Verizon Business, New York, USA Rodica NEAGU, MBA Outpost24,

More information

Online Identification of Multi-Attribute High-Volume Traffic Aggregates Through Sampling

Online Identification of Multi-Attribute High-Volume Traffic Aggregates Through Sampling Online Identification of Multi-Attribute High-Volume Traffic Aggregates Through Sampling Yong Tang Shigang Chen Department of Computer & Information Science & Engineering University of Florida, Gainesville,

More information

Defending DDoS Attacks Using Traffic Differentiation and Distributed Deployment

Defending DDoS Attacks Using Traffic Differentiation and Distributed Deployment Defending DDoS Attacks Using Traffic Differentiation and Distributed Deployment Rohan Patil, Aditya Kumat, Karan Bulbule, Maitreya Natu Student author, College of Engineering, Pune, India Tata Research

More information

CS 356 Lecture 16 Denial of Service. Spring 2013

CS 356 Lecture 16 Denial of Service. Spring 2013 CS 356 Lecture 16 Denial of Service Spring 2013 Review Chapter 1: Basic Concepts and Terminology Chapter 2: Basic Cryptographic Tools Chapter 3 User Authentication Chapter 4 Access Control Lists Chapter

More information

Per-Flow Queuing Allot's Approach to Bandwidth Management

Per-Flow Queuing Allot's Approach to Bandwidth Management White Paper Per-Flow Queuing Allot's Approach to Bandwidth Management Allot Communications, July 2006. All Rights Reserved. Table of Contents Executive Overview... 3 Understanding TCP/IP... 4 What is Bandwidth

More information

An Efficient Filter for Denial-of-Service Bandwidth Attacks

An Efficient Filter for Denial-of-Service Bandwidth Attacks An Efficient Filter for Denial-of-Service Bandwidth Attacks Samuel Abdelsayed, David Glimsholt, Christopher Leckie, Simon Ryan and Samer Shami Department of Electrical and Electronic Engineering ARC Special

More information

An Efficient Distributed Algorithm to Identify and Traceback DDoS Traffic

An Efficient Distributed Algorithm to Identify and Traceback DDoS Traffic Ó The Author 26. Published by Oxford University Press on behalf of The British Computer Society. All rights reserved. For Permissions, please email: journals.permissions@oxfordjournals.org doi:1.193/comjnl/bxl26

More information

An Anomaly-Based Method for DDoS Attacks Detection using RBF Neural Networks

An Anomaly-Based Method for DDoS Attacks Detection using RBF Neural Networks 2011 International Conference on Network and Electronics Engineering IPCSIT vol.11 (2011) (2011) IACSIT Press, Singapore An Anomaly-Based Method for DDoS Attacks Detection using RBF Neural Networks Reyhaneh

More information

Preventing Resource Exhaustion Attacks in Ad Hoc Networks

Preventing Resource Exhaustion Attacks in Ad Hoc Networks Preventing Resource Exhaustion Attacks in Ad Hoc Networks Masao Tanabe and Masaki Aida NTT Information Sharing Platform Laboratories, NTT Corporation, 3-9-11, Midori-cho, Musashino-shi, Tokyo 180-8585

More information

Distributed Denial of Service (DDoS)

Distributed Denial of Service (DDoS) Distributed Denial of Service (DDoS) Defending against Flooding-Based DDoS Attacks: A Tutorial Rocky K. C. Chang Presented by Adwait Belsare (adwait@wpi.edu) Suvesh Pratapa (suveshp@wpi.edu) Modified by

More information

A Practical Method to Counteract Denial of Service Attacks

A Practical Method to Counteract Denial of Service Attacks A Practical Method to Counteract Denial of Service Attacks Udaya Kiran Tupakula Vijay Varadharajan Information and Networked System Security Research Division of Information and Communication Sciences

More information

Network management and QoS provisioning - QoS in the Internet

Network management and QoS provisioning - QoS in the Internet QoS in the Internet Inernet approach is based on datagram service (best effort), so provide QoS was not a purpose for developers. Mainly problems are:. recognizing flows;. manage the issue that packets

More information

Outline. CSc 466/566. Computer Security. 18 : Network Security Introduction. Network Topology. Network Topology. Christian Collberg

Outline. CSc 466/566. Computer Security. 18 : Network Security Introduction. Network Topology. Network Topology. Christian Collberg Outline Network Topology CSc 466/566 Computer Security 18 : Network Security Introduction Version: 2012/05/03 13:59:29 Department of Computer Science University of Arizona collberg@gmail.com Copyright

More information

Network congestion, its control and avoidance

Network congestion, its control and avoidance MUHAMMAD SALEH SHAH*, ASIM IMDAD WAGAN**, AND MUKHTIAR ALI UNAR*** RECEIVED ON 05.10.2013 ACCEPTED ON 09.01.2014 ABSTRACT Recent years have seen an increasing interest in the design of AQM (Active Queue

More information

Improving the Performance of TCP Using Window Adjustment Procedure and Bandwidth Estimation

Improving the Performance of TCP Using Window Adjustment Procedure and Bandwidth Estimation Improving the Performance of TCP Using Window Adjustment Procedure and Bandwidth Estimation R.Navaneethakrishnan Assistant Professor (SG) Bharathiyar College of Engineering and Technology, Karaikal, India.

More information

A System for in-network Anomaly Detection

A System for in-network Anomaly Detection A System for in-network Anomaly Detection Thomas Gamer Institut für Telematik, Universität Karlsruhe (TH), Germany Abstract. Today, the Internet is used by companies frequently since it simplifies daily

More information

Analysis of Automated Model against DDoS Attacks

Analysis of Automated Model against DDoS Attacks Analysis of Automated Model against DDoS Attacks Udaya Kiran Tupakula Vijay Varadharajan Information and Networked Systems Security Research Division of Information and Communication Sciences Macquarie

More information

How To Write A Transport Layer Protocol For Wireless Networks

How To Write A Transport Layer Protocol For Wireless Networks Chapter 9: Transport Layer and Security Protocols for Ad Hoc Wireless Networks Introduction Issues Design Goals Classifications TCP Over Ad Hoc Wireless Networks Other Transport Layer Protocols Security

More information

Router Scheduling Configuration Based on the Maximization of Benefit and Carried Best Effort Traffic

Router Scheduling Configuration Based on the Maximization of Benefit and Carried Best Effort Traffic Telecommunication Systems 24:2 4, 275 292, 2003 2003 Kluwer Academic Publishers. Manufactured in The Netherlands. Router Scheduling Configuration Based on the Maximization of Benefit and Carried Best Effort

More information

DDOS WALL: AN INTERNET SERVICE PROVIDER PROTECTOR

DDOS WALL: AN INTERNET SERVICE PROVIDER PROTECTOR Journal homepage: www.mjret.in DDOS WALL: AN INTERNET SERVICE PROVIDER PROTECTOR Maharudra V. Phalke, Atul D. Khude,Ganesh T. Bodkhe, Sudam A. Chole Information Technology, PVPIT Bhavdhan Pune,India maharudra90@gmail.com,

More information

Prevention, Detection and Mitigation of DDoS Attacks. Randall Lewis MS Cybersecurity

Prevention, Detection and Mitigation of DDoS Attacks. Randall Lewis MS Cybersecurity Prevention, Detection and Mitigation of DDoS Attacks Randall Lewis MS Cybersecurity DDoS or Distributed Denial-of-Service Attacks happens when an attacker sends a number of packets to a target machine.

More information

Performance Evaluation of AODV, OLSR Routing Protocol in VOIP Over Ad Hoc

Performance Evaluation of AODV, OLSR Routing Protocol in VOIP Over Ad Hoc (International Journal of Computer Science & Management Studies) Vol. 17, Issue 01 Performance Evaluation of AODV, OLSR Routing Protocol in VOIP Over Ad Hoc Dr. Khalid Hamid Bilal Khartoum, Sudan dr.khalidbilal@hotmail.com

More information

Lecture Objectives. Lecture 07 Mobile Networks: TCP in Wireless Networks. Agenda. TCP Flow Control. Flow Control Can Limit Throughput (1)

Lecture Objectives. Lecture 07 Mobile Networks: TCP in Wireless Networks. Agenda. TCP Flow Control. Flow Control Can Limit Throughput (1) Lecture Objectives Wireless and Mobile Systems Design Lecture 07 Mobile Networks: TCP in Wireless Networks Describe TCP s flow control mechanism Describe operation of TCP Reno and TCP Vegas, including

More information

VoIP Network Dimensioning using Delay and Loss Bounds for Voice and Data Applications

VoIP Network Dimensioning using Delay and Loss Bounds for Voice and Data Applications VoIP Network Dimensioning using Delay and Loss Bounds for Voice and Data Applications Veselin Rakocevic School of Engineering and Mathematical Sciences City University, London, UK V.Rakocevic@city.ac.uk

More information

Cisco Integrated Services Routers Performance Overview

Cisco Integrated Services Routers Performance Overview Integrated Services Routers Performance Overview What You Will Learn The Integrated Services Routers Generation 2 (ISR G2) provide a robust platform for delivering WAN services, unified communications,

More information

Broadband Networks. Prof. Dr. Abhay Karandikar. Electrical Engineering Department. Indian Institute of Technology, Bombay. Lecture - 29.

Broadband Networks. Prof. Dr. Abhay Karandikar. Electrical Engineering Department. Indian Institute of Technology, Bombay. Lecture - 29. Broadband Networks Prof. Dr. Abhay Karandikar Electrical Engineering Department Indian Institute of Technology, Bombay Lecture - 29 Voice over IP So, today we will discuss about voice over IP and internet

More information

Effectiveness of close-loop congestion controls for DDoS attacks

Effectiveness of close-loop congestion controls for DDoS attacks Effectiveness of close-loop congestion controls for DDoS attacks Takanori Komatsu and Akira Namatame Mathematics and Computer Science, National Defence Academy of Japan Hashirimizu 1-10-20Yokosuka-shi,

More information

How To Provide Qos Based Routing In The Internet

How To Provide Qos Based Routing In The Internet CHAPTER 2 QoS ROUTING AND ITS ROLE IN QOS PARADIGM 22 QoS ROUTING AND ITS ROLE IN QOS PARADIGM 2.1 INTRODUCTION As the main emphasis of the present research work is on achieving QoS in routing, hence this

More information

SECURING APACHE : DOS & DDOS ATTACKS - I

SECURING APACHE : DOS & DDOS ATTACKS - I SECURING APACHE : DOS & DDOS ATTACKS - I In this part of the series, we focus on DoS/DDoS attacks, which have been among the major threats to Web servers since the beginning of the Web 2.0 era. Denial

More information

INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY

INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY A PATH FOR HORIZING YOUR INNOVATIVE WORK AN OVERVIEW OF MOBILE ADHOC NETWORK: INTRUSION DETECTION, TYPES OF ATTACKS AND

More information

Robust Router Congestion Control Using Acceptance and Departure Rate Measures

Robust Router Congestion Control Using Acceptance and Departure Rate Measures Robust Router Congestion Control Using Acceptance and Departure Rate Measures Ganesh Gopalakrishnan a, Sneha Kasera b, Catherine Loader c, and Xin Wang b a {ganeshg@microsoft.com}, Microsoft Corporation,

More information

DDoS Attack Traceback

DDoS Attack Traceback DDoS Attack Traceback and Beyond Yongjin Kim Outline Existing DDoS attack traceback (or commonly called IP traceback) schemes * Probabilistic packet marking Logging-based scheme ICMP-based scheme Tweaking

More information

Announcements. No question session this week

Announcements. No question session this week Announcements No question session this week Stretch break DoS attacks In Feb. 2000, Yahoo s router kept crashing - Engineers had problems with it before, but this was worse - Turned out they were being

More information

AN OVERVIEW OF QUALITY OF SERVICE COMPUTER NETWORK

AN OVERVIEW OF QUALITY OF SERVICE COMPUTER NETWORK Abstract AN OVERVIEW OF QUALITY OF SERVICE COMPUTER NETWORK Mrs. Amandeep Kaur, Assistant Professor, Department of Computer Application, Apeejay Institute of Management, Ramamandi, Jalandhar-144001, Punjab,

More information

Distributed Denial of Service Attacks & Defenses

Distributed Denial of Service Attacks & Defenses Distributed Denial of Service Attacks & Defenses Guest Lecture by: Vamsi Kambhampati Fall 2011 Distributed Denial of Service (DDoS) Exhaust resources of a target, or the resources it depends on Resources:

More information

Filtering Based Techniques for DDOS Mitigation

Filtering Based Techniques for DDOS Mitigation Filtering Based Techniques for DDOS Mitigation Comp290: Network Intrusion Detection Manoj Ampalam DDOS Attacks: Target CPU / Bandwidth Attacker signals slaves to launch an attack on a specific target address

More information

Adaptive Discriminating Detection for DDoS Attacks from Flash Crowds Using Flow. Feedback

Adaptive Discriminating Detection for DDoS Attacks from Flash Crowds Using Flow. Feedback Adaptive Discriminating Detection for DDoS Attacks from Flash Crowds Using Flow Correlation Coeff icient with Collective Feedback N.V.Poorrnima 1, K.ChandraPrabha 2, B.G.Geetha 3 Department of Computer

More information

Smart Queue Scheduling for QoS Spring 2001 Final Report

Smart Queue Scheduling for QoS Spring 2001 Final Report ENSC 833-3: NETWORK PROTOCOLS AND PERFORMANCE CMPT 885-3: SPECIAL TOPICS: HIGH-PERFORMANCE NETWORKS Smart Queue Scheduling for QoS Spring 2001 Final Report By Haijing Fang(hfanga@sfu.ca) & Liu Tang(llt@sfu.ca)

More information

Detection of Distributed Denial of Service Attack with Hadoop on Live Network

Detection of Distributed Denial of Service Attack with Hadoop on Live Network Detection of Distributed Denial of Service Attack with Hadoop on Live Network Suchita Korad 1, Shubhada Kadam 2, Prajakta Deore 3, Madhuri Jadhav 4, Prof.Rahul Patil 5 Students, Dept. of Computer, PCCOE,

More information

CYBER ATTACKS EXPLAINED: PACKET CRAFTING

CYBER ATTACKS EXPLAINED: PACKET CRAFTING CYBER ATTACKS EXPLAINED: PACKET CRAFTING Protect your FOSS-based IT infrastructure from packet crafting by learning more about it. In the previous articles in this series, we explored common infrastructure

More information

Vulnerabilities of Intrusion Detection Systems in Mobile Ad-hoc Networks - The routing problem

Vulnerabilities of Intrusion Detection Systems in Mobile Ad-hoc Networks - The routing problem Vulnerabilities of Intrusion Detection Systems in Mobile Ad-hoc Networks - The routing problem Ernesto Jiménez Caballero Helsinki University of Technology erjica@gmail.com Abstract intrusion detection

More information

DiDDeM: A System for Early Detection of TCP SYN Flood Attacks

DiDDeM: A System for Early Detection of TCP SYN Flood Attacks DiDDeM: A System for Early Detection of TCP SYN Flood Attacks J. Haggerty, T. Berry, Q. Shi and M. Merabti School of Computing and Mathematical Sciences, Liverpool John Moores University, Liverpool, UK,

More information

CROSS LAYER BASED MULTIPATH ROUTING FOR LOAD BALANCING

CROSS LAYER BASED MULTIPATH ROUTING FOR LOAD BALANCING CHAPTER 6 CROSS LAYER BASED MULTIPATH ROUTING FOR LOAD BALANCING 6.1 INTRODUCTION The technical challenges in WMNs are load balancing, optimal routing, fairness, network auto-configuration and mobility

More information

How To Block A Ddos Attack On A Network With A Firewall

How To Block A Ddos Attack On A Network With A Firewall A Prolexic White Paper Firewalls: Limitations When Applied to DDoS Protection Introduction Firewalls are often used to restrict certain protocols during normal network situations and when Distributed Denial

More information

Congestion Control Review. 15-441 Computer Networking. Resource Management Approaches. Traffic and Resource Management. What is congestion control?

Congestion Control Review. 15-441 Computer Networking. Resource Management Approaches. Traffic and Resource Management. What is congestion control? Congestion Control Review What is congestion control? 15-441 Computer Networking What is the principle of TCP? Lecture 22 Queue Management and QoS 2 Traffic and Resource Management Resource Management

More information

Vulnerability Analysis of Hash Tables to Sophisticated DDoS Attacks

Vulnerability Analysis of Hash Tables to Sophisticated DDoS Attacks International Journal of Information & Computation Technology. ISSN 0974-2239 Volume 4, Number 12 (2014), pp. 1167-1173 International Research Publications House http://www. irphouse.com Vulnerability

More information

CHAPTER 6. VOICE COMMUNICATION OVER HYBRID MANETs

CHAPTER 6. VOICE COMMUNICATION OVER HYBRID MANETs CHAPTER 6 VOICE COMMUNICATION OVER HYBRID MANETs Multimedia real-time session services such as voice and videoconferencing with Quality of Service support is challenging task on Mobile Ad hoc Network (MANETs).

More information

1. Introduction. 2. DoS/DDoS. MilsVPN DoS/DDoS and ISP. 2.1 What is DoS/DDoS? 2.2 What is SYN Flooding?

1. Introduction. 2. DoS/DDoS. MilsVPN DoS/DDoS and ISP. 2.1 What is DoS/DDoS? 2.2 What is SYN Flooding? Page 1 of 5 1. Introduction The present document explains about common attack scenarios to computer networks and describes with some examples the following features of the MilsGates: Protection against

More information

Internet Firewall CSIS 4222. Packet Filtering. Internet Firewall. Examples. Spring 2011 CSIS 4222. net15 1. Routers can implement packet filtering

Internet Firewall CSIS 4222. Packet Filtering. Internet Firewall. Examples. Spring 2011 CSIS 4222. net15 1. Routers can implement packet filtering Internet Firewall CSIS 4222 A combination of hardware and software that isolates an organization s internal network from the Internet at large Ch 27: Internet Routing Ch 30: Packet filtering & firewalls

More information

packet retransmitting based on dynamic route table technology, as shown in fig. 2 and 3.

packet retransmitting based on dynamic route table technology, as shown in fig. 2 and 3. Implementation of an Emulation Environment for Large Scale Network Security Experiments Cui Yimin, Liu Li, Jin Qi, Kuang Xiaohui National Key Laboratory of Science and Technology on Information System

More information

Preventing DDOS attack in Mobile Ad-hoc Network using a Secure Intrusion Detection System

Preventing DDOS attack in Mobile Ad-hoc Network using a Secure Intrusion Detection System Preventing DDOS attack in Mobile Ad-hoc Network using a Secure Intrusion Detection System Shams Fathima M.Tech,Department of Computer Science Kakatiya Institute of Technology & Science, Warangal,India

More information

Final exam review, Fall 2005 FSU (CIS-5357) Network Security

Final exam review, Fall 2005 FSU (CIS-5357) Network Security Final exam review, Fall 2005 FSU (CIS-5357) Network Security Instructor: Breno de Medeiros 1. What is an insertion attack against a NIDS? Answer: An insertion attack against a network intrusion detection

More information

Policy Distribution Methods for Function Parallel Firewalls

Policy Distribution Methods for Function Parallel Firewalls Policy Distribution Methods for Function Parallel Firewalls Michael R. Horvath GreatWall Systems Winston-Salem, NC 27101, USA Errin W. Fulp Department of Computer Science Wake Forest University Winston-Salem,

More information

A Secure Intrusion detection system against DDOS attack in Wireless Mobile Ad-hoc Network Abstract

A Secure Intrusion detection system against DDOS attack in Wireless Mobile Ad-hoc Network Abstract A Secure Intrusion detection system against DDOS attack in Wireless Mobile Ad-hoc Network Abstract Wireless Mobile ad-hoc network (MANET) is an emerging technology and have great strength to be applied

More information

Packet-Marking Scheme for DDoS Attack Prevention

Packet-Marking Scheme for DDoS Attack Prevention Abstract Packet-Marking Scheme for DDoS Attack Prevention K. Stefanidis and D. N. Serpanos {stefanid, serpanos}@ee.upatras.gr Electrical and Computer Engineering Department University of Patras Patras,

More information

SECURE DATA TRANSMISSION USING INDISCRIMINATE DATA PATHS FOR STAGNANT DESTINATION IN MANET

SECURE DATA TRANSMISSION USING INDISCRIMINATE DATA PATHS FOR STAGNANT DESTINATION IN MANET SECURE DATA TRANSMISSION USING INDISCRIMINATE DATA PATHS FOR STAGNANT DESTINATION IN MANET MR. ARVIND P. PANDE 1, PROF. UTTAM A. PATIL 2, PROF. B.S PATIL 3 Dept. Of Electronics Textile and Engineering

More information

Efficient Detection of Ddos Attacks by Entropy Variation

Efficient Detection of Ddos Attacks by Entropy Variation IOSR Journal of Computer Engineering (IOSRJCE) ISSN: 2278-0661, ISBN: 2278-8727 Volume 7, Issue 1 (Nov-Dec. 2012), PP 13-18 Efficient Detection of Ddos Attacks by Entropy Variation 1 V.Sus hma R eddy,

More information

IPv6 SECURITY. May 2011. The Government of the Hong Kong Special Administrative Region

IPv6 SECURITY. May 2011. The Government of the Hong Kong Special Administrative Region IPv6 SECURITY May 2011 The Government of the Hong Kong Special Administrative Region The contents of this document remain the property of, and may not be reproduced in whole or in part without the express

More information

18-731 Midterm. Name: Andrew user id:

18-731 Midterm. Name: Andrew user id: 18-731 Midterm 6 March 2008 Name: Andrew user id: Scores: Problem 0 (10 points): Problem 1 (10 points): Problem 2 (15 points): Problem 3 (10 points): Problem 4 (20 points): Problem 5 (10 points): Problem

More information

Ashok Kumar Gonela MTech Department of CSE Miracle Educational Group Of Institutions Bhogapuram.

Ashok Kumar Gonela MTech Department of CSE Miracle Educational Group Of Institutions Bhogapuram. Protection of Vulnerable Virtual machines from being compromised as zombies during DDoS attacks using a multi-phase distributed vulnerability detection & counter-attack framework Ashok Kumar Gonela MTech

More information

Internet Quality of Service

Internet Quality of Service Internet Quality of Service Weibin Zhao zwb@cs.columbia.edu 1 Outline 1. Background 2. Basic concepts 3. Supporting mechanisms 4. Frameworks 5. Policy & resource management 6. Conclusion 2 Background:

More information

A study of denial of service attacks on the Internet p.1/39

A study of denial of service attacks on the Internet p.1/39 A study of denial of service attacks on the Internet David J. Marchette marchettedj@nswc.navy.mil Naval Surface Warfare Center Code B10 A study of denial of service attacks on the Internet p.1/39 Outline

More information

The allocation algorithm for data centers in cloud computing architecture from security perspective

The allocation algorithm for data centers in cloud computing architecture from security perspective The allocation algorithm for data centers in cloud computing architecture from security perspective *Chuan-Gang Liu 1,Hsin-Yi Lin, Kun-Ta Hsien Deparament of Information Technology, Chia Nan University

More information

How Cisco IT Protects Against Distributed Denial of Service Attacks

How Cisco IT Protects Against Distributed Denial of Service Attacks How Cisco IT Protects Against Distributed Denial of Service Attacks Cisco Guard provides added layer of protection for server properties with high business value. Cisco IT Case Study / < Security and VPN

More information

Introduction to LAN/WAN. Network Layer

Introduction to LAN/WAN. Network Layer Introduction to LAN/WAN Network Layer Topics Introduction (5-5.1) Routing (5.2) (The core) Internetworking (5.5) Congestion Control (5.3) Network Layer Design Isues Store-and-Forward Packet Switching Services

More information

Route Discovery Protocols

Route Discovery Protocols Route Discovery Protocols Columbus, OH 43210 Jain@cse.ohio-State.Edu http://www.cse.ohio-state.edu/~jain/ 1 Overview Building Routing Tables Routing Information Protocol Version 1 (RIP V1) RIP V2 OSPF

More information

Routing in packet-switching networks

Routing in packet-switching networks Routing in packet-switching networks Circuit switching vs. Packet switching Most of WANs based on circuit or packet switching Circuit switching designed for voice Resources dedicated to a particular call

More information

Dual Mechanism to Detect DDOS Attack Priyanka Dembla, Chander Diwaker 2 1 Research Scholar, 2 Assistant Professor

Dual Mechanism to Detect DDOS Attack Priyanka Dembla, Chander Diwaker 2 1 Research Scholar, 2 Assistant Professor International Association of Scientific Innovation and Research (IASIR) (An Association Unifying the Sciences, Engineering, and Applied Research) International Journal of Engineering, Business and Enterprise

More information

Secure SCTP against DoS Attacks in Wireless Internet

Secure SCTP against DoS Attacks in Wireless Internet Secure SCTP against DoS Attacks in Wireless Internet Inwhee Joe College of Information and Communications Hanyang University Seoul, Korea iwjoe@hanyang.ac.kr Abstract. The Stream Control Transport Protocol

More information

Chapter 4. VoIP Metric based Traffic Engineering to Support the Service Quality over the Internet (Inter-domain IP network)

Chapter 4. VoIP Metric based Traffic Engineering to Support the Service Quality over the Internet (Inter-domain IP network) Chapter 4 VoIP Metric based Traffic Engineering to Support the Service Quality over the Internet (Inter-domain IP network) 4.1 Introduction Traffic Engineering can be defined as a task of mapping traffic

More information

Security Scheme for Distributed DoS in Mobile Ad Hoc Networks

Security Scheme for Distributed DoS in Mobile Ad Hoc Networks Security Scheme for Distributed DoS in Mobile Ad Hoc Networks Sugata Sanyal 1, Ajith Abraham 2, Dhaval Gada 3, Rajat Gogri 3, Punit Rathod 3, Zalak Dedhia 3 and Nirali Mody 3 1 School of Technology and

More information

Performance of networks containing both MaxNet and SumNet links

Performance of networks containing both MaxNet and SumNet links Performance of networks containing both MaxNet and SumNet links Lachlan L. H. Andrew and Bartek P. Wydrowski Abstract Both MaxNet and SumNet are distributed congestion control architectures suitable for

More information

AN IMPROVED SNOOP FOR TCP RENO AND TCP SACK IN WIRED-CUM- WIRELESS NETWORKS

AN IMPROVED SNOOP FOR TCP RENO AND TCP SACK IN WIRED-CUM- WIRELESS NETWORKS AN IMPROVED SNOOP FOR TCP RENO AND TCP SACK IN WIRED-CUM- WIRELESS NETWORKS Srikanth Tiyyagura Department of Computer Science and Engineering JNTUA College of Engg., pulivendula, Andhra Pradesh, India.

More information