skip to main content
10.1145/1971519.1971595acmotherconferencesArticle/Chapter ViewAbstractPublication PagesmommConference Proceedingsconference-collections
research-article

An effective defense mechanism against DoS/DDoS attacks in flow-based routers

Published:08 November 2010Publication History

ABSTRACT

Due to proliferation of diverse network applications, DoS/DDoS attacks are evolving. Many studies have been performed and implemented in on/off-line network devices such as routers and IDS/IPS. While IDS/IPS is powerful enough to handle deep packet inspection (DPI) tasks, routers are better suited in real-time and line-speed processing requirements. Since the routers are designed to handle IP packet header information, if one can devise an DoS/DDoS detection/prevention methods that utilizes the router specific features it will be best for the in-line and real-time processing. We introduce a Flow based DoS/DDoS detection algorithm(FDDA) that detects Distributed Denial of Service (DDoS) attacks by monitoring TTL and ID fields of incoming packet's IP header. As DDoS attacks are based on IP source address spoofing, the TTL and ID fields may have abnormal behavior. The device keeps track of 8-tuple flow table. The behavior of these two fields is monitored to determine DoS/DDoS attack situation. The effectiveness of our method is such that it is implemented flow-based routers and devices.

References

  1. Stephen M. Specht and Ruby B. Lee, "Distributed Denial of Service: Taxonomies of Attacks, Tools and Countermeasures", 2004 International Workshop on Security in Parallel and Distributed Systems, pp. 543--550, September 2004.Google ScholarGoogle Scholar
  2. J. Ioannidis and S. M. Bellovin. "Implementing pushback: Router-based defense against ddos attacks", In Proceedings of NDSS'2002, February 2002.Google ScholarGoogle Scholar
  3. RFC1349, "Internet Protocol", 1992.Google ScholarGoogle Scholar
  4. Stefan Savage, David Wetherall, Anna Karlin and Tom Anderson, "Practical Network Support for IP Traceback", In ACM SIGCOMM, August 2000. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. Drew Dean, Matt Franklin and A. Stubblefield, "An algebraic approach to ip traceback", Proceedings of NDSS '01, February 2001.Google ScholarGoogle Scholar
  6. Steve M. Bellovin, "ICMP Traceback Messages. Work in Progress", Internet Draft draftbellovin- itrace-00.txt, March 2000.Google ScholarGoogle Scholar
  7. Dawn X. Song and Adrian Perrig. "Advanced and authenticated marking schemes for ip traceback". In Proceedings of IEEE INFOCOM 2001, 2001.Google ScholarGoogle Scholar
  8. Tao Peng, Christopher Leckie and Kotagiri Ramamohanarao, "Adjusted probabilistic packet marking for ip traceback", In Proceedings of Networking 2002, May 2002. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. P. Ferguson and D. Senie. "Network ingress filtering: Defeating denial of service attacks which employ IP source address spoofing", In RFC 2267, January 1998.Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. J. Li, J. Mirkovic, M. Wang, P. Reiher, and L. Zhang, "Save: Source address validity enforcement protocol", In Proceedings of IEEE INFOCOM '2002, June 2002.Google ScholarGoogle Scholar
  11. K. Park and H. Lee, "On the effectiveness of route-based packet filtering for distributed dos attack prevention in power-law internets", In Proceedings of ACM SIGCOMM '2001, August 2001. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. Yi Xie and Shun-Zheng Yu, "A Large-Scale Hidden Semi-Markov Model for Anomaly Detection on User Browsing Behaviors", IEEE/ACM Transaction on Networking, Vol 17, Feb. 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. RFC2113, "IP Router Alert Option", 1997.Google ScholarGoogle Scholar
  14. RFC1191, "Path MTU Discovery:, 1990Google ScholarGoogle Scholar
  15. Jelena Mirkovic, Peter Reiher, "A Taxonomy of DDoS Attack and DDoS Defense Mechanisms", ACM, 2004Google ScholarGoogle Scholar
  16. Kensuke Nakata, Hiroki Takakura, Yasuo Okabe, "An analysis of IDS alerts to grasp the situation of DDoS attack to a third party", NETSAP, 2010Google ScholarGoogle Scholar
  17. C Jin, H Wang, K G Shin, "Hop-Count Filtering: An Effective Defense Against Spoofed DDoS Traffic", 10th ACM conference, 2003 Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. Ruiliang Chen, Jung-Min Park, "A Divide-and-Conquer Strategy for Thwarting Distributed Denial-of-Service Attacks", IEEE, 2007Google ScholarGoogle Scholar
  19. Chao Gong, Kamil Sarac, "A More Practical Approach for Single-Packet IP Traceback Using Packet Logging and Marking", IEEE, 2008Google ScholarGoogle Scholar
  20. Tsz-Yeung Wong, Man-Hon Wong, Chi-Shing (John) Lui, "A Precise Termination Condition of the Probabilistic Packet Marking Algorithm", IEEE, 2008Google ScholarGoogle Scholar
  21. F. A. El-Moussa, N. Linge, M. Hope, "Active router approach to defeating denial-of-service attacks in networks", IEEE, 2007Google ScholarGoogle ScholarCross RefCross Ref
  22. Yu Chen, Kai Hwang, Wei-Shinn Ku, "Collaborative Detection of DDoS Attacks over Multiple Network Domains", IEEE, 2007Google ScholarGoogle Scholar
  23. Zhenhai Duan, Xin Yuan, Jaideep Chandrashekar, "Controlling IP Spoofing through Interdomain Packet Filters", IEEE, 2006Google ScholarGoogle Scholar
  24. The Swiss Education and Research Network. Default TTL values in TCP/IP, 2002. Available: http://secfr.nerim.net/docs/fingerprint/en/ttldefault.html.Google ScholarGoogle Scholar

Index Terms

  1. An effective defense mechanism against DoS/DDoS attacks in flow-based routers

        Recommendations

        Comments

        Login options

        Check if you have access through your login credentials or your institution to get full access on this article.

        Sign in
        • Published in

          cover image ACM Other conferences
          MoMM '10: Proceedings of the 8th International Conference on Advances in Mobile Computing and Multimedia
          November 2010
          441 pages
          ISBN:9781450304405
          DOI:10.1145/1971519

          Copyright © 2010 ACM

          Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

          Publisher

          Association for Computing Machinery

          New York, NY, United States

          Publication History

          • Published: 8 November 2010

          Permissions

          Request permissions about this article.

          Request Permissions

          Check for updates

          Qualifiers

          • research-article

        PDF Format

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader