A Survey on Distributed Denial of Service Attacks: Classification of Attacks and Countermeasures



Similar documents
Distributed Denial of Service: Taxonomies of Attacks, Tools and Countermeasures

Distributed Denial of Service(DDoS) Attack Techniques and Prevention on Cloud Environment

Queuing Algorithms Performance against Buffer Size and Attack Intensities

Cloud-based DDoS Attacks and Defenses

MONITORING OF TRAFFIC OVER THE VICTIM UNDER TCP SYN FLOOD IN A LAN

Impact Evaluation of Distributed Denial of Service Attacks using NS2

Taxonomies of Distributed Denial of Service Networks, Attacks, Tools, and Countermeasures

Denial of Service Attacks

Survey on DDoS Attack Detection and Prevention in Cloud

Survey on DDoS Attack in Cloud Environment

Depth-in-Defense Approach against DDoS

SECURITY FLAWS IN INTERNET VOTING SYSTEM

Use of Honeypot and IP Tracing Mechanism for Prevention of DDOS Attack

CS 356 Lecture 16 Denial of Service. Spring 2013

Application of Netflow logs in Analysis and Detection of DDoS Attacks

A Critical Investigation of Botnet

Firewalls and Intrusion Detection

Seminar Computer Security

Federal Computer Incident Response Center (FedCIRC) Defense Tactics for Distributed Denial of Service Attacks

DDoS Overview and Incident Response Guide. July 2014

SECURING APACHE : DOS & DDOS ATTACKS - I

How To Prevent A Malicious Node From Attacking Manet With A Ddos Attack

CSE 3482 Introduction to Computer Security. Denial of Service (DoS) Attacks

Secure Software Programming and Vulnerability Analysis

co Characterizing and Tracing Packet Floods Using Cisco R

Classification of Distributed Denial of Service Attacks Architecture, Taxonomy and Tools

DISTRIBUTED DENIAL OF SERVICE (DDOS) ATTACKS DETECTION MECHANISM

CS5008: Internet Computing

Dual Mechanism to Detect DDOS Attack Priyanka Dembla, Chander Diwaker 2 1 Research Scholar, 2 Assistant Professor

Frequent Denial of Service Attacks

Gaurav Gupta CMSC 681

Strategies to Protect Against Distributed Denial of Service (DD

An Integrated Defense Approach for Distributed Denial of Service Attacks In Mobile Ad-Hoc Network

A S B

A Relative Study for Detection and Prevention of DDoS Attacks

Protecting Web Servers from DoS/DDoS Flooding Attacks A Technical Overview. Noureldien A. Noureldien College of Technological Sciences Omdurman, Sudan

Security vulnerabilities in the Internet and possible solutions

Guide to DDoS Attacks December 2014 Authored by: Lee Myers, SOC Analyst

Comparing Two Models of Distributed Denial of Service (DDoS) Defences

Abstract. Introduction. Section I. What is Denial of Service Attack?

A Flow-based Method for Abnormal Network Traffic Detection

Complete Protection against Evolving DDoS Threats

Malicious Programs. CEN 448 Security and Internet Protocols Chapter 19 Malicious Software

DDoS Protection Technology White Paper

Distributed Denial of Service (DDoS)

Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs

Acquia Cloud Edge Protect Powered by CloudFlare

A Defense Framework for Flooding-based DDoS Attacks

Distributed Denial of Service Attack Tools

A PREVENTION OF DDOS ATTACKS IN CLOUD USING NEIF TECHNIQUES

CloudFlare advanced DDoS protection

DISTRIBUTED DENIAL OF SERVICE OBSERVATIONS

Defending against Flooding-Based Distributed Denial-of-Service Attacks: A Tutorial

DDoS Attacks: The Latest Threat to Availability. Dr. Bill Highleyman Managing Editor Availability Digest

DETECTION AND PREVENTION OF DDOS ATTACK IN MANET S USING DISABLE IP BROADCAST TECHNIQUE

DoS and DDoS Attack Types and Preventions

This document is licensed for use, redistribution, and derivative works, commercial or otherwise, in accordance with the Creative Commons

How To Understand A Network Attack

The Coremelt Attack. Ahren Studer and Adrian Perrig. We ve Come to Rely on the Internet

White paper. TrusGuard DPX: Complete Protection against Evolving DDoS Threats. AhnLab, Inc.

VALIDATING DDoS THREAT PROTECTION

An Anomaly-Based Method for DDoS Attacks Detection using RBF Neural Networks

A Novel Distributed Denial of Service (DDoS) Attacks Discriminating Detection in Flash Crowds

CS 640 Introduction to Computer Networks. Network security (continued) Key Distribution a first step. Lecture24

CMPT 471 Networking II

2.2 Methods of Distributed Denial of Service Attacks. 2.1 Methods of Denial of Service Attacks

Denial Of Service. Types of attacks

Keywords Attack model, DDoS, Host Scan, Port Scan

DDoS Attack and Defense: Review of Some Traditional and Current Techniques

Network Bandwidth Denial of Service (DoS)

Denial of Service Attacks. Notes derived from Michael R. Grimaila s originals

Denial of Service Attacks, What They are and How to Combat Them

A COMPREHENSIVE STUDY OF DDOS ATTACKS AND DEFENSE MECHANISMS

Protect your network: planning for (DDoS), Distributed Denial of Service attacks

SECURING APACHE : DOS & DDOS ATTACKS - II

Port Hopping for Resilient Networks

TIME SCHEDULE. 1 Introduction to Computer Security & Cryptography 13

Analysis on Some Defences against SYN-Flood Based Denial-of-Service Attacks

TECHNICAL NOTE 06/02 RESPONSE TO DISTRIBUTED DENIAL OF SERVICE (DDOS) ATTACKS

Network Security - DDoS

Implementation of Botcatch for Identifying Bot Infected Hosts

HOW TO PREVENT DDOS ATTACKS IN A SERVICE PROVIDER ENVIRONMENT

Implementing Secure Converged Wide Area Networks (ISCW)

DRDoS Attacks: Latest Threats and Countermeasures. Larry J. Blunk Spring 2014 MJTS 4/1/2014

Distributed Denial of Service Attacks & Defenses

Security issues in Voice over IP: A Review

DoS: Attack and Defense

A Novel Packet Marketing Method in DDoS Attack Detection

Transcription:

Abstract Distributed Denial of Service (DDOS) attacks have become a large problem for users of computer system connected to the internet. DDOS attackers hijack secondary victim systems using them to launch a coordinated large-scale attack against primary victim systems. As new countermeasures and solutions are emerging constantly, attackers are also developing new methods to counter these preventive measures. In this paper, we classify various DDOS attacks, countermeasures to prevent DDOS attacks and characterize the scope of DDOS attacks and losses they cause to the various industries. A Survey on Distributed Denial of Service : Classification of and Countermeasures 1 Achin Jain, 2 Arvind Panwar, 3 Manish Kumar Dept. of CSE, Ambedkar Institute of Advanced Communication Technologies & Research, Delhi, India Keywords DDOS, DOS, DDOS Attack Types, DDOS Prevention Methods I. Introduction Denial of Service(DOS) attack is an attack with the purpose of preventing legitimate users from using a specified network resource such as website, web service or computer system [1]. A Distributed Denial of Service (DDOS) attack is a coordinated attack on the availability of services of a given target system or network that is launched indirectly through many compromised computing systems [2]. The victims in DDOS attack are categorized in two sections: Primary and Secondary Victim [2].Primary Victims are the ones whose services are affected by the attack whereas Secondary Victims are those victims whose systems are compromised to launch the attack. There are normally Four Strategies that are used by the attackers to implement the DDOS attack and they are known as the Four Pillars of DDOS attack Strategy [3] which is as follows: Using the Internet s Insecure Channels Using Huge Traffic Volume as the Weapon Completely circumventing the ultimate victim s security defense. Hiding the attacker s identity. The rest of the paper is organized as follows. In section I, I provide basic DDOS Attack Architecture which will give a brief idea of DDOS attack methodology. Section II, discusses Recent DDOS attacks. Section III, provides various DDOS attack classification, DDOS attack architecture, and DDOS attack classes, DDOS Solutions and DDOS countermeasures. Section IV, discusses losses occur due to DDOS attacks. Finally, I conclude in section V, by insight into what the future might hold with respect to DDOS attacks. Fig. 1: [19] III. Recent DDOS Incidents DDOS attacks are launched more or less every day. Even the most well-known Websites like Twitter, Facebook and Google etc couldn t prevent themselves from being attacked by DDOS attack, which caused millions of their users affected. The most eye opener case was the DDOS incident that targeted White house, Federal Trade Commission and the Department of the Treasury. Washington Post and the New York Stock exchange, NASDAQ. A Botnet comprised of 30,000 60,000 infected computers were used. The attack traffic consumed 20-40 gigabytes of bandwidth per second. It was the largest attack traffic observed. Such attack caused target outage for 4-5 days which was the longest outage duration ever. Some of the observed DDOS incidents in the year are outlined in Table. 1, in the chronological order. II. DDOS Attack Architecture In DDOS attack the attacker gains access of many systems on the network and tries to launch the attack through these Zombie PC s as shown in the fig. (See fig. 1) www.ijcst.com International Journal of Computer Science And Technology 233

ISSN : 0976-8491 (Online) ISSN : 2229-4333 (Print) Table. 1: Recent DDOS Incidents [19] S.No. Date of Attack Target Description 1 December 8, MasterCard, PayPal, Visa. and PostFinance Launched to SupportWikiLeaks.ch and its founder and attack lasts for more than 16 hours 2 November 30, whistleblower site Wikileaks Size of attack was 10 Gbps which affect the site availability and was launched to prevent release of secret cables. 3 November 28, whistleblower site Wikileaks Size of attack was 2-4 Gbps and was launched just after it released confidential US diplomatic cables. 4 November 12, Domain registrar Register.com Impacted DNS, hosting and webmail clients. 24 hours of outage 5 November 2, Burma s main Internet provider Disrupted most network traffic in and out of the country for 2 days. 6 October MPAA & Indian tech firm Aiplex software At least hundreds of 4chan users at once executed attack in Pro-piracy protest. 7 September Fast growing botnet IMDDOS was discovered Botnet s motive was to provide commercial service for launching DDOS attacks against any target. IV. DDOS Classification A. DDOS Attack Architecture There are basically two types of DDOS attack architectures: Agent Handler Model and Internet Relay Chat [IRC] based Model [2]. 1. Agent Handler Model Agent Handler Model consists of the following three entities (see fig. 2). Fig. 3: [2] B. DDOS Attack Classes There are broadly two classes in which the DDOS attacks can be classified: Bandwidth Depletion and Resource Depletion [2]. Fig. 2: [2] (i). Clients They are where attacker communicates with the rest of the DDOS attack system. (ii). Handlers They are software packages located throughout the internet. 1. Bandwidth Depletion In this attack the victim s network is flooded with unwanted traffic that prevents the legitimate user reaching the services (See Table 2). Table 2: Classification of Bandwidth Depletion and Their Measures Bandwidth Depletion Classification S.No Attack Name Types Effect Caused Measure (iii). Agents It is the software exists in compromised systems that will eventually carry out the attack. IRC based DDOS Attack Model IRC based model is similar to Agent based but with one exception that in IRC based there is no Handler (see fig. 3). In this method instead of using a handler program installed on a network server, an IRC (Internet Relay Chat) communication channel is used to connect the client to the agents. 1. Flood UDP Flood ICMP Flood Victim become unreachable to other clients Target gets too busy to process normal network data packets. Agent Based Measure[4] Check the rate of ICMP packets using the intelligent traffic detection technology [5] 234 In t e r n a t io n a l Jo u r n a l o f Co m p u t e r Sc ie n c e An d Te c h n o l o g y www.ijcst.com

Amplification DDOS Smurf Congestion and Crash down of System Check whether the destination address of a received ICMP echo request message is a subnet broadcast address or network address[5] (b). Turing Test This method requires attacking computer to answer a random question before establishing the connection. Global Solutions These are the solutions that require cooperation of several Internet Subnets across company boundaries. Commonly used Global Solutions are the following: Resource Depletion Attack In this attack the victims resources are alter in such a way so that the victim become unable to process legitimate service request (See Table 3). Table. 3: Classification of Resource Depletion and Their Measures Resource Depletion Classification S.No Attack Name Types Effect Caused 1. Protocol Exploit MalformedPacket TCP SYN PSUH+ACK IPAdd. IP Packet Options Network SupplyCollapse Crash Down due to large data volume Crash down due to system mix-up Victim System gets drained Measure Use the firewall as a relay between the server and its clients. C. DDOS Solutions Broadly DDOS Solutions are classified into two main Categories: Local and Global [3]. 1. Local Solutions These solutions are basically implemented on the victim computer or on its local network. Local Solutions for individual protection falls into three areas. (i). Local Filtering This method employs the use of local router by installing a filter to detect and stop the infiltrating IP Packets. (ii). Changing IPs This method employs the functionality of changing the Victim Computer IP Address on detection of DDOS attack, thereby invalidating the old address. (iii). Creating Client Bottlenecks Main Objective of this method is to create bottleneck process on attacker s computer, limiting their attacking ability. Some of the Methods commonly used are as follows: (i). Improving the Security of the Entire Internet This method employs Securing all the computers connected to the Internet. (ii). Using Globally Coordinated Filters The idea is to prevent the accumulation of a critical mass of attacking packets in time so that on detection of attack the packets can be stop by the filter earlier along the attacking path. (iii). Tracing the Source IP Addresses The aim is to trace the intruder s path back to the attacker computers and try to stop the ongoing attack. D. DDOS Countermeasure Categories There are three main categories of DDOS countermeasures: First Preventing the setup of the DDOS attack network, second dealing with a DDOS attack while the attack is in progress, third is the post attack category involving network forensics [2]. The Various DDOS Countermeasures their methods and the proposed solutions are shown in Table. 4 Table. 4: DDOS Countermeasures, Methods and Proposed Solutions S.No 1. DDOS Countermeasures Methods Proposed Solutions Preventing the setup of the DDOS attack network Dealing with a DDOS attack while the attack is in progress Prevent Secondary Victims Detect and Neutralize Handlers Detect or Prevent Potential Mitigating the Effects of DDOS 1. Buffer Overflow Violations[6] Dynamic Pricing[7] 1. Studying the communication protocols and traffic patterns to identify the infected node. 1. Egress Filtering[8,9] Using MIB Stats from Routers[10] 1. Load Balancing Throttling[11] (a). RSA Security Corp Client Puzzles This method use a puzzle to be solved before gaining access to victims system. Deflect 1. Honeypots[12] www.ijcst.com International Journal of Computer Science And Technology 235

3. Post attack category Network Forensics 1. Traffic Pattern Data[2] Packet Traceback [13] 3. IP Traceback [14] 4. ICMP Traceback [15] 5. Event Logs V. Losses Occur Due to DDOS According to a survey conducted by CSI in 2007, DDOS attacks were found to be one of the major reasons for financial losses [16], as shown in fig. 4, incurred almost $2,888,600 which is remarkable high sum of financial loss. If we compare the major threats such as Virus, Spyware, Website Defacement, Password Sniffing with DOS attack loss in the chart given below then we can find that ()% of total loss has occurred due to DOS attack only. Fig. 4: VI. Conclusion There is an alarming increase in the number of DDOS attack incidents. Not only, DDOS incidents are growing day by day but the technique to attack, botnet size, and attack traffic are also attaining new heights. Effective defense measures needed to prevent and mitigate these attacks is the current need of the hour. The major contributions of this paper are: 1. In this Paper, we have given a classification of DDOS attacks along with their Measure. We have classify the DDOS attacks in two classes and list their solutions Bandwidth Depletion Resource Depletion 3. It gives overview of DDOS problem. 4. Information about recent DDOS incidents. 5. Information about taxonomies of DDOS attacks, tools and countermeasures. 6. Information about various DDOS attack solutions and countermeasures. 7. Financial loss incurred due to DDOS attacks is also explored. References [1] David Karig, Ruby Lee, Remote Denial of Service and Countermeasures, Princeton University Department of Electrical Engineering Technical Report CEL2001-002, Oct 2001. ISSN : 0976-8491 (Online) ISSN : 2229-4333 (Print) [2] Stephen M. Specht, Ruby B. Lee,"Distributed Denial of Service: Taxonomies of, Tools, and Countermeasures", Proceedings of the 17th International Conference on Parallel and Distributed Computing Systems, 2004 International Workshop on Security in Parallel and Distributed Systems, pp. 543-550, September 2004. [3] Xianjun Geng, Andrew B. Whinston, Defeating Distributed Denial of Service, IT Pro July/August 2000. [4] Aarti Singh, Dimple Juneja, Agent Based Measure for UDP Flood Attack in DDoS, International Journal of Engineering Science and Technology Vol. 2(8), pp. 3405-3411,. [5] "Attack Prevention Technology White Paper", [Online]. Available: http://www.h3c.com/portal/download. do?id=613626 [6] Ruby Lee, David Karig, Patrick McGregor, Zhijie Shi, Enlisting Hardware Architecture to Thwart Malicious Code Injection, Proceedings of the International Conference on Security in Pervasive Computing (SPC-2003), LNCS 2802, pp. 237-252, Springer Verlag, March 2003. [7] David Mankins, Rajesh Krishnan, Ceilyn Boyd, John Zao, Michael Frentz, Mitigating Distributed Denial of Service with Dynamic Resource Pricing, Computer Security Applications Conference, 2001. ACSAC 2001. Proceedings 17th Annual, pp. 411-421, 2001. [8] P. Ferguson et.al. RFC 2267,"Network Ingress Filtering: Defeating Denial of Service attacks which employ IP Source Address Spoofing", Technical report, The Internet Society, 1998. [9] SANS Institute,"Egree Filtering v0.2", (2000), [Online]. Available: http://www.sans.org/y2k/egress.htm. [10] Joao B. D. Cabrera, Lundy Lewis, Xinzhou Qin, Wenke Lee, Ravi K. Prasanth, B. Ravichandran, Ramon K. Mehra, Proactive Detection of Distributed Denial of Service Using MIB Traffic Variables A Feasibility Study, Integrated Network Management Proceedings, pp. 609-622, 2001. [11] David K. Yau, John C. S. Lui, Feng Liang, Defending Against Distributed Denial of Service with Max-min Fair Server-centric Router Throttles, Quality of Service, 2002 Tenth IEEE International Workshop, pp. 35-44, 200 [12] Nathalie Weiler, Honeypots for Distributed Denial of Service, Enabling Technologies: Infrastructure for Collaborative Enterprises, 200 WET ICE 200 Proceedings. Eleventh IEEE International Workshops, pp. 109-114, 200 [13] Vern Paxon, An Analysis of Using Reflectors for Distributed Denial of Service, ACM SIGCOMM Computer Communication Review, Vol. 31, Iss. 3, Jul 2001. [14] Puneet Zaroo,"Advance Information Assurance (CS 626), [Online] Available: https://users.cs.jmu.edu/aboutams/ Public/IP%20TraceBack/Survey%20of%20DDoS%20 Atttacks%20and%20Defense.pdf [15] Bellovin (2000),"ICMP Traceback Message", Technical report, AT&T, [Online] Available: http://www.ietf.org/ internet-drafts/draft-bellovin-itrace-00.txt. [16]gocsi.com (2007), The 12th annual computer crime and security survey, [Online]. Available: http://www.sis.pitt. edu/~jjoshi/courses/is2150/fall09/csifbi2007.pdf. [17] Level3.com (2009), Managed DDoS Protection, [Online]. Available: http://www.level3.com/downloads/managed_ DDoS_Protection_whitepaper.pdf. 236 In t e r n a t io n a l Jo u r n a l o f Co m p u t e r Sc ie n c e An d Te c h n o l o g y www.ijcst.com

[18] M. Sachdeva, G. Singh, K. Kumar, K. Singh, A comprehensive survey of distributed defense techniques against DDoS attacks, International Journal of Computer Science and Network Security, Vol. 9, No. 12, pp. 7-15, Dec. 2009. [19] Ketki Arora et al., Impact Analysis of Recent DDoS, International Journal on Computer Science and Engineering (IJCSE), Vol. 3 No. 2 Feb 2011. www.ijcst.com International Journal of Computer Science And Technology 237