A TWO LEVEL ARCHITECTURE USING CONSENSUS METHOD FOR GLOBAL DECISION MAKING AGAINST DDoS ATTACKS



Similar documents
Distributed Denial of Service (DDoS)

Defending against Flooding-Based Distributed Denial-of-Service Attacks: A Tutorial

An Anomaly-Based Method for DDoS Attacks Detection using RBF Neural Networks

Tackling Congestion to Address Distributed Denial of Service: A Push-Forward Mechanism

Keywords Attack model, DDoS, Host Scan, Port Scan

Design and Experiments of small DDoS Defense System using Traffic Deflecting in Autonomous System

A Novel Distributed Denial of Service (DDoS) Attacks Discriminating Detection in Flash Crowds

CS 356 Lecture 16 Denial of Service. Spring 2013

Dual Mechanism to Detect DDOS Attack Priyanka Dembla, Chander Diwaker 2 1 Research Scholar, 2 Assistant Professor

Firewalls and Intrusion Detection

CHAPETR 3. DISTRIBUTED DEPLOYMENT OF DDoS DEFENSE SYSTEM

Denial of Service Attacks, What They are and How to Combat Them

MONITORING OF TRAFFIC OVER THE VICTIM UNDER TCP SYN FLOOD IN A LAN

DDOS WALL: AN INTERNET SERVICE PROVIDER PROTECTOR

Development of a Network Intrusion Detection System

1. Introduction. 2. DoS/DDoS. MilsVPN DoS/DDoS and ISP. 2.1 What is DoS/DDoS? 2.2 What is SYN Flooding?

Denial of Service attacks: analysis and countermeasures. Marek Ostaszewski

A Brief Discussion of Network Denial of Service Attacks. by Eben Schaeffer SE 4C03 Winter 2004 Last Revised: Thursday, March 31

DDoS Protection Technology White Paper

DoS: Attack and Defense

Detection of Distributed Denial of Service Attack with Hadoop on Live Network

Game-based Analysis of Denial-of- Service Prevention Protocols. Ajay Mahimkar Class Project: CS 395T

Adaptive Discriminating Detection for DDoS Attacks from Flash Crowds Using Flow. Feedback

Efficient Detection of Ddos Attacks by Entropy Variation

A Novel Packet Marketing Method in DDoS Attack Detection

WHITE PAPER. FortiGate DoS Protection Block Malicious Traffic Before It Affects Critical Applications and Systems

SECURING APACHE : DOS & DDOS ATTACKS - I

Architecture Overview

Provider-Based Deterministic Packet Marking against Distributed DoS Attacks

Application of Netflow logs in Analysis and Detection of DDoS Attacks

Federal Computer Incident Response Center (FedCIRC) Defense Tactics for Distributed Denial of Service Attacks

INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY

An Efficient Filter for Denial-of-Service Bandwidth Attacks

Strategies to Protect Against Distributed Denial of Service (DD

NEW TECHNIQUES FOR THE DETECTION AND TRACKING OF THE DDOS ATTACKS

DDoS Attack Traceback

Taxonomy of Intrusion Detection System

Analysis on Some Defences against SYN-Flood Based Denial-of-Service Attacks

DDoS Protection. How Cisco IT Protects Against Distributed Denial of Service Attacks. A Cisco on Cisco Case Study: Inside Cisco IT

How To Stop A Ddos Attack On A Network From Tracing To Source From A Network To A Source Address

DDoS-blocker: Detection and Blocking of Distributed Denial of Service Attack

2. Design. 2.1 Secure Overlay Services (SOS) IJCSNS International Journal of Computer Science and Network Security, VOL.7 No.

Active Internet Traffic Filtering to Denial of Service Attacks from Flash Crowds

Introduction of Intrusion Detection Systems

Science Park Research Journal

Network Security. Chapter 9. Attack prevention, detection and response. Attack Prevention. Part I: Attack Prevention

Survey on DDoS Attack Detection and Prevention in Cloud

Denial of Service Attacks and Countermeasures. Extreme Networks, Inc. All rights reserved. ExtremeXOS Implementing Advanced Security (EIAS)

CSCI 4250/6250 Fall 2015 Computer and Networks Security

How Cisco IT Protects Against Distributed Denial of Service Attacks

The Reverse Firewall: Defeating DDOS Attacks Emanating from a Local Area Network

SURVEY OF INTRUSION DETECTION SYSTEM

How To Block A Ddos Attack On A Network With A Firewall

Detection and Controlling of DDoS Attacks by a Collaborative Protection Network

RID-DoS: Real-time Inter-network Defense Against Denial of Service Attacks. Kathleen M. Moriarty. MIT Lincoln Laboratory.

How To Classify A Dnet Attack

AN INFRASTRUCTURE TO DEFEND AGAINST DISTRIBUTED DENIAL OF SERVICE ATTACK. Wan, Kwok Kin Kalman

Network Security Demonstration - Snort based IDS Integration -

Announcements. No question session this week

Acquia Cloud Edge Protect Powered by CloudFlare

DISTRIBUTED DENIAL OF SERVICE (DDOS) ATTACKS DETECTION MECHANISM

Survey on DDoS Attack in Cloud Environment

Denial of Service. Tom Chen SMU

Name. Description. Rationale

CYBER ATTACKS EXPLAINED: PACKET CRAFTING

TECHNICAL NOTE 06/02 RESPONSE TO DISTRIBUTED DENIAL OF SERVICE (DDOS) ATTACKS

Index Terms Denial-of-Service Attack, Intrusion Prevention System, Internet Service Provider. Fig.1.Single IPS System

CloudFlare advanced DDoS protection

Firewalls, Tunnels, and Network Intrusion Detection. Firewalls

Security Toolsets for ISP Defense

A Novel Technique for Detecting DDoS Attacks at Its Early Stage

A Review on Intrusion Detection System to Protect Cloud Data

Distributed Denial of Service(DDoS) Attack Techniques and Prevention on Cloud Environment

PACKET SIMULATION OF DISTRIBUTED DENIAL OF SERVICE (DDOS) ATTACK AND RECOVERY

Analysis and Detection of DDoS Attacks in the Internet Backbone using Netflow Logs

Cooperative Mechanism against DDoS Attacks

Network Bandwidth Denial of Service (DoS)

Optimal Sensor Placement for Detection against Distributed Denial of Service Attacks

PROFESSIONAL SECURITY SYSTEMS

Chapter 28 Denial of Service (DoS) Attack Prevention

Secure Software Programming and Vulnerability Analysis

JUNOS DDoS SECURE. Advanced DDoS Mitigation Technology

Project 4: (E)DoS Attacks

Queuing Algorithms Performance against Buffer Size and Attack Intensities

Abstract. Introduction. Section I. What is Denial of Service Attack?

Router Attacks-Detection And Defense Mechanisms

Performance Evaluation of DVMRP Multicasting Network over ICMP Ping Flood for DDoS

A Defense Framework for Flooding-based DDoS Attacks

Denial Of Service. Types of attacks

Flexible Deterministic Packet Marking: An IP Traceback Scheme Against DDOS Attacks

Firewalls, Tunnels, and Network Intrusion Detection

Comparison of Various Passive Distributed Denial of Service Attack in Mobile Adhoc Networks

CS5008: Internet Computing

History. Attacks on Availability (1) Attacks on Availability (2) Securing Availability

Cooperative Mechanism Against DDoS Attacks

A SYSTEM FOR DENIAL OF SERVICE ATTACK DETECTION BASED ON MULTIVARIATE CORRELATION ANALYSIS

A UNIFIED APPROACH FOR DETECTION AND PREVENTION OF DDOS ATTACKS USING ENHANCED SUPPORT VECTOR MACHINES AND FILTERING MECHANISMS

Guide to DDoS Attacks December 2014 Authored by: Lee Myers, SOC Analyst

DDoS Prevention System Using Multi-Filtering Method

Preventing Resource Exhaustion Attacks in Ad Hoc Networks

Transcription:

ICTACT JOURNAL ON COMMUNICATION TECHNOLOGY, JUNE 2010, ISSUE: 02 A TWO LEVEL ARCHITECTURE USING CONSENSUS METHOD FOR GLOBAL DECISION MAKING AGAINST DDoS ATTACKS S.Seetha 1 and P.Raviraj 2 Department of Information Technology, Karunya University, Coimbatore, Tamil Nadu, India Email: seetha_mismin@yahoo.com 1, raviraj_it@yahoo.co.in 2 Abstract Distributed Denial of service is a major threat to the availability of internet services. Due to the distributed, large scale nature of the Internet makes DDoS (Distributed Denial-of-Service) attacks stealthy and difficult to counter. Defense against Distributed Denial- of - Service attacks is one of the hardest security problems on the Internet. Recently these network attacks have been increasing. Therefore more effective countermeasures are required to counter the threat. This requirement has motivated us to propose a novel mechanism against DDoS attack. This paper presents the design details of a distributed defense mechanism against DDoS attack. In our approach, the egress routers of the intermediate network coordinate with each other to provide the information necessary to detect and respond to the attack. Thus, a detection system based on single site will have either high positive or high negative rates. Unlike the traditional IDSs (Intrusion Detection System) this method has the potential to achieve high true positive ratio. This work has been done by using consensus algorithms for exchanging the information between the detection systems. So the overall detection time would be reduced for global decision making. captures cumulative deviations from a normal behavior over time. The effectiveness of attack detection increases near the victim and the effectiveness of packet filtering increases near the attack source. So that we have chosen the detection system in the intermediate location to get benefits in both ways as shown in Fig.1 Attack source network The victim s ISP network Victim s network Effectiveness packet filtering increases Further upstream intermediate network Keywords: DDoS Attack, IDSs, Consensus Algorithm 1. INTRODUCTION victim Selected area for attack detection Effectiveness attack detection increases Denial of service attack is a major cause of incorrect operation in the Internet and is arguably the most serious threat that the Internet community faces today. DDoS attacks generate a large volume flow to overwhelm the target host. The victim cannot protect itself even if it detects this event. So the detection and defense of DDoS should ideally be near the source of the attack or somewhere in the network. It is difficult to distinguish attack packets from legitimate packets. Attack packets can be identical to legitimate packets, since the attacker only needs volume, not content, to inflict damage. Furthermore, the volume of packets from individual sources can be low enough to escape notice by local administrators. Thus, a detection system based on single site will have either high positive or high negative rates [1][2]. Due to the readily available tools, Flooding attack becomes most common DDoS attack. They intend to overflow and consume resources available to the victim [3]. When the number of attackers is very large, the flows from each attacker can be very small to detect. So, the detection based on instantaneous deviation is useless, because of the deviation is very small in flow [4] [5]. Most of the DDoS detection system models are based on traffic flow rates [6]. As many new applications are coming up and End user s behavior also varies, that is difficult to get a general efficient model based on traffic flow alone. Hence, we need a DDoS detection system which is not only based on traffic flow. For that, in this paper we proposed a sequential method to detect DDoS attack quickly, which Fig.1. DDoS attack detection location. 2. PROPOSED METHODOLOGY One of the major challenges in detection system design is to process packets at very high speeds, essentially when placed in back bone networks. The algorithms for high-speed packet processing continue to be very important and active research area. So, we used a comprehensive test method in the local detection systems (in the edge routers). Due to the distributed nature of a typical DDoS attack, each local detection system observes only partial traffic anomalies. Due to this nature we designed the entire process with two levels: detection and Global detectionas shown in Fig.2. The combined belief of all local sequential method detection system () is considered to detect the DDoS attack globally. This is achieved by the consensus algorithm. It is very much useful to reduce detection time and to reduce misdetection rates. 85

S.SEETHA AND P.RAVIRAJ: A TWO LEVEL ARCHITECTURE USING CONSENSUS METHOD FOR GLOBAL DECISION MAKING AGAINST DDoS ATTACKS Support given to global detector DDoS attack Suspect Fig.2. Two level architecture 2.1 LOCAL DETECTION OF ATTACKS USING SEQUENTIAL TEST METHOD The Sequential Test Method has been implemented in each Egress router (DS). The Egress router is the one through which all nodes sends the traffic (flow of packet). Each Detection system perform the sequential test and based on the confidence level of an attack, it Will send attack alert to the Leader Detection System. The Leader Detection System consolidates and analyzes its local detection result with attack alerts received from other detection systems to make a global detection decision. If a DDoS attack is confirmed, the DS notifies the packet filtering component to install packet filters for the corresponding packet stream 2.2 SEQUENTIAL TEST METHOD In each we have two phases for detecting the anomaly namely Phase-1: Sequential test method Phase-2: Monitoring new IP addresses. The two phases raise alarms when they find the observed statistical ratio crosses some threshold. Based on the combined belief of the two alarms DDoS attack is confirmed as shown in Fig.3 2.2.1 Phase-1: This is based on inherent request vs reply protocol behavior. We have taken TCP-SYN flooding attack. Here, a large number of TCP SYN packets is sent to victim s server port. If the port is actively listening for connection requests, the victim would respond by sending back SYN-ACK packets. However, since the source addresses in these packets are spoofed addresses, these response packets are sent elsewhere in the Internet. Thus the victim retransmits the SYN-ACK packets several times before giving up. However, these half open connections will quickly consume all the memories allocated for pending connections, thus preventing the victim from accepting new request. In the Fig.3, phase 1, the number of requests and number of replies are calculated. We consider a time series {T1, T2, T3, Tn}. We find the number of SYN (opening connections) and FIN (RST) (closing connections) packets. For each sampling period we calculate the average number of replies R. n Xi= Total number of requests corresponding replies for t=1 one sampling period (1) Where Xi is the collection of observed data. This value is normalized by R as follows n n = Xi / R (2) t=1 Now we consider this ratio for deciding hypothesis and raise alarm when it crosses the threshold value. i) H = 0 (Null hypothesis) ---Normal situation H = 1 (Alternative hypothesis) abnormal situation ii) Sequence of observed data X1,X2,X3, Xn iii) Decision consists of - Stopping time N(stop taking samples) - Make a hypothesis H=0 (or) H=1? Now as shown in Fig.4 the alarm is raised if the n value exceeds the threshold value N. Sequential test method PHASE-I Monitoring new IP addresses PHASE II n Acc. Likelihood Ratio Threshold a Stopping time Raise alarm Raise alarm Threshold b Combined belief 0 24 hour Fig.4. Detection method Confirm DDoS attack Fig.3. Two phases of 2.2.2 Phase-2: Monitoring the percentage of new IP addresses is effective in detecting the attacks. Over the same time series T1,T2, T3, Tn, the incoming IP addresses are collected. Let F be the collection 86

ICTACT JOURNAL ON COMMUNICATION TECHNOLOGY, JUNE 2010, ISSUE: 02 of frequent IP addresses, and M be the collection of incoming IP addresses in time interval T. M - M U F Yn = (3) F where Yn is the percentage of new IP addresses to be calculated in the time interval T. When this value Yn exceeds the threshold value say N, then alarm is raised. Normally Yn is calculated for the confirmation of DDoS attack. 2.2.3 DDoS Detection: When both Phase.1 and Phase.2 raise alarms, based on the combined belief DDoS attack is confirmed as shown in Fig.5. Based on the values of n and Yn the hypothesis is decided, and DDoS attack is confirmed. Phase-1 Phase-2 Incoming Packets Sequential Test Method Phase I Monitoring new IP addresses Phase II detection System Packet Filter Confirm attack Upstream Networks Attack Alerts Install or Remove filters n P( H / n,yn) Fig.5. Decision making based on combined belief where P is decision function which is deciding over DDoS attack confirmation and H is the Hypothesis. There are two hypothesis to test on both levels: H1 for the presence of a DDoS attack and H0, a null hypothesis. The binary hypothesis is tested on the two phases of s. As soon as the local s support H1, the detection system involved passes attack information to all other detection systems signaling a possible DDoS attack. Each Detection system then independently consolidates and analyzes its local detection result with attack alerts received from other detection systems to make a global detection decision. For this purpose, each attack alert is attached with a confidence level that quantifies the amount of evidence supporting the suspected attack. If a DDoS attack is confirmed, the DS notifies the packet filtering component to install packet filters for the corresponding packet stream. It also notifies the upstream networks to filter the attack packets as shown in Fig.6. 2.2.4 Implementation of Consensus Algorithm: In consensus algorithm, the leader detection system receives attack suspect ion from other DS s. Based on the combined belief of majority of the detection system (DS) it will make filtering action and sent filtering rate to the majority of the system who suspect the attack. Yn Fig.6. Two-level attack detection in the distributed detection approach. Consensus Algorithm: A group of processes cooperating to provide a highly available service need to agree on which processes are currently functioning as members of the group. The consensus algorithm is explained in Table.1. Processes: Detection systems Service: Suspect and prevent DDoS Currently functioning members: Only few detection systems are selected among many to do the service Table.1. Implementation of Consensus Algorithm Algorithm: 1. The server (victim) keeps track of no of half open connections. There are two threshold value are considered. Threshold value first - HC f Threshold value second - HC s 2. There is a leader detection system. It gets all the allowed actions Chooses the outcome(filtering value) Tells everyone 3. When the number of half open connections reaches HC f, then it passes the suspection to the consensus leader. The leader alerts all detection systems. 4. In each detection system the sequential test is performed and based on that test, they raise alarm as follows. Each detection system passes the following information to the leader. Cont (i) actual incoming rate (ii) actual exit rate (iii) actual acceptance rate 87

S.SEETHA AND P.RAVIRAJ: A TWO LEVEL ARCHITECTURE USING CONSENSUS METHOD FOR GLOBAL DECISION MAKING AGAINST DDoS ATTACKS Cont (iv) Deviations Percentage of unmatched request vs reply Destined to the victim- DV um Percentage of excess amount of packets coming through the detection system than the actual acceptance rat -DV e 5. The leader detection system receives the above information from many detection systems that suspect and raise alarm. 6. The leader now applies the consensus among these values and decides the outcome which is the filtering value to be applied in selected detection systems at the end. The leader er has the predefined threshold value TV dev for the deviation DV um. 7. Now among the many detection systems involved, the majority group is selected by the following method. For the detection systems DS1, DS2, DS3, DSn, who raised alarm, the following check is done. 8. The DV um of detection systems DS1, DS2, DS3, DSn are checked with this threshold value TV dev. The particular detection system DSi is included in the majority group if and only if the following condition satisfies. DV um of detection system DSi > TV dev Let the no of DS wins this check be m 9. Now to check the majority the leader has to decide the outcome only if (n-m) is greater than or equal to n/2. 10. Deciding the outcome (filtering value) The Outcome (filtering value) =Max DV um among the majority group/2 11. This outcome is passed only to the members of majority group. The relative value is then calculated by the individual DS and filtering is done. 12. Periodically the leader checks the no of half open connections at the victim server. If it below HC s, then the leader instructs the DS of majority group with the same filtering value. (Here the it checks whether the actual packet rate converges to acceptance rate or not).if the no of half open connections is greater than or equal to HC s, then the filtering value is decided as Max DV um among the majority group The process stops when all of the DS in majority group DS incoming converges or tphe no of half open connections at victim converges below HC f 3. RESULTS AND DISCUSSIONS The Fig.7 shows the setting up of a network topology. Configure 25 nodes. The Script is written using Tool Command Language (TCL) for front end to design GUI and C++ is used to design the back end for processing. Source nodes are represented as blue nodes and destination nodes are represented as green nodes. Then the data packets are transferred from one node to other. In this topology, there are 24 nodes. They are 3 source nodes and 1, destination node. Packets are sending at a particular rate. This rate is evaluated by timer by extending the Timer Handler. Normal data packets are represented by Blue color and acknowledgment packets are represented by Red color. Fig.7. Topology Construction with 25 nodes In Fig.8, there are four detection system (DS) marked as green color node and one leader detection system marked as blue color node. Now the victim system sends the attack suspection to leader DS (node 12). 2.2.5 Detecting and Filtering the Global traffic: If the confidence level value exceeds confidence threshold, then it confirms the attack and sends the response to corresponding Egress router. Now the egress router (DS) will drop the packets from the corresponding destination tion node. Fig.8. The victim (node 22) sends the attack alert to leader DS (node 12)

ICTACT JOURNAL ON COMMUNICATION TECHNOLOGY, JUNE 2010, ISSUE: 02 Thus the traffic is detected and filtered using Consensus algorithm. If the confidence level value exceeds threshold, then it confirms the attack and now the egress router (DS) will drop the packets. 4. PERFORMANCE ANALYSIS Fig.9. The leader node 12(leader DS) is sending the attack alert to node 6 (DS 2). Fig.10. DS 6 now suspects the attack. In this Fig.10, DS 6 now suspect the attack; it will perform the sequential test and send the result (threshold value) to leader Ds. Even though anomaly based IDSs are widespread and successful in most environments, they possess various disadvantages, too. The main drawback with anomaly based systems is that they can raise a high proportion of false alarms. IDSs often have both accurate detections and missed attacks. Depending on the type of alarm 2004] raised by the IDS and the actual intrusion scenario, following types of detection results are possible. The false Positive ratio, typically known as false alarms, these occur when IDS reads legitimate activity as being an attack. The following figures show performance measure of existing with the proposed algorithm. Let P represents the probability that each detection node in the detection overlay network sends local traffic information to its neighbor nodes. We vary the probability of consensus between 0.2, 0.4, 0.6, 0.8, 1.0. The performance of this approach with different probability P used are shown in Fig.12. As we can see from the simulation results, with p=0.4 we have high false positive ratio. This is because we adopt high initial drop rate. When the local detection system detects an attack as a result legitimate packets will be dropped dramatically. Percentage of False Positive Ratio 14 12 10 8 6 4 2 0 0 0.2 0.4 Gossip Algorithm Consensus Algorithm 0.6 0.8 1 Probability of Algorithms Fig.12. Performance analysis of consensus algorithm and Gossip algorithm 5. CONCLUSION AND FUTURE ENHANCEMENTS Fig.11. Detecting & filtering Traffic Distributed denial o f service is a major threat that cannot be addressed through isolated actions of sparsely deployed defense nodes. Instead, various defense systems must organize into a framework and inter-operate, exchanging information and service, and acting together, against the threat. In this paper we proposed a global detection infrastructure by building an overlay network on top of the internet. The consensus algorithm is used to detect distributed denial of service attacks by information sharing. Compared to the existing solutions, this method has the

S.SEETHA AND P.RAVIRAJ: A TWO LEVEL ARCHITECTURE USING CONSENSUS METHOD FOR GLOBAL DECISION MAKING AGAINST DDoS ATTACKS potential to achieve high true positive ratio. This work has been done by using consensus algorithms for exchanging the information between the detection systems. So the overall time consumption will be reduced for global decision making. This work can further be explored for locating the Zombies (compromised system) and for other types of attack. REFERENCES [1] Guangsen Zhang and Manish Parashar, Cooperative Defense against DDoS attacks,journal of Research and Practice in InformationTechnology, Vol.38, No.1, February 2006, pp. 69-74. [2] Haining Wang, Danlu Zhang and Kang G.Shin," Change Point Monitoring for the Detection of DoS Attacks", IEEE Transactions On Dependable and Secure Computing, Vol.1, No.4, 2004. [3] Wang, D. Zhang, and K. G. Shin, Detecting SYN flooding attacks, In Proceeding of IEEE Infocom 2002, June 2002. [4] Rocky.K.C.Chang, Defending against Flooding based, DDoS attacks, IEEE Communication magazine, Vol 40, No.10, 2002. [5] Mirkovic, G. Prier, and P. Reiher, "Attacking DDoS at the Source," presented at ICNP 2002. [6] John Haggerty, Qi Shi and Majid Merabti," Early Detection and Prevention of Denial-Of-service Attacks: A Novel Mechanism with Propogated Traced-Back Attack Blocking", IEEE Journal On selected Areasin Communication, Vol 23, No.10, October, 2005. 90