skip to main content
10.1145/3274694.3274717acmotherconferencesArticle/Chapter ViewAbstractPublication PagesacsacConference Proceedingsconference-collections
research-article

SENSS Against Volumetric DDoS Attacks

Published:03 December 2018Publication History

ABSTRACT

Volumetric distributed denial-of-service (DDoS) attacks can bring any network to a halt. Because of their distributed nature and high volume, the victim often cannot handle these attacks alone and needs help from upstream ISPs. Today's Internet has no automated mechanism for victims to ask ISPs for help in attack handling and ISPs themselves do not offer such services. We propose SENSS, a security service for collaborative mitigation of volumetric DDoS attacks. SENSS enables the victim of an attack to request attack monitoring and filtering on demand, and to pay for the services rendered. Requests can be sent both to the immediate and to remote ISPs, in an automated and secure manner, and can be authenticated by these ISPs, without having prior trust with the victim. Simple and generic SENSS APIs enable victims to build custom detection and mitigation approaches against a variety of DDoS attacks. SENSS is deployable with today's infrastructure, and it has strong economic incentives both for ISPs and for the attack victims. It is also very effective in sparse deployment, offering full protection to direct customers of early adopters, and considerable protection to remote victims when deployed strategically. Deployment on the largest 1% of ISPs protects not just direct customers of these ISPs, but everyone on the Internet, from 90% of volumetric DDoS attacks.

References

  1. Katerina Argyraki and David R. Cheriton. 2005. Active Internet Traffic Filtering: Real-time Response to Denial-of-service Attacks. In Proceedings of the Annual Conference on USENIX Annual Technical Conference (ATEC '05). USENIX Association, Berkeley, CA, USA, 10--10. http://dl.acm.org/citation.cfm?id=1247360.1247370 Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. R. Bajcsy, T. Benzel, M. Bishop, B. Braden, C. Brodley, S. Fahmy, S. Floyd, W. Hardaker, A. Joseph, G. Kesidis, K. Levitt, B. Lindell, P. Liu, D. Miller, R. Mundy, C. Neuman, R. Ostrenga, V. Paxson, P. Porras, C. Rosenberg, J. D. Tygar, S. Sastry, D. Sterne, and S. F. Wu. 2004. Cyber Defense Technology Networking and Evaluation. Commun. ACM 47, 3 (March 2004), 58--61. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. Sean Bakley. 2017. From Comcast to Hawaiian Telcom: Tracking the top 16 residential broadband service providers in Q3 2017. FierceTelecom, https://goo.gl/otRTw2.Google ScholarGoogle Scholar
  4. Cristina Basescu, Raphael M. Reischuk, Pawel Szalachowski, Adrian Perrig, Yao Zhang, Hsu-Chun Hsiao, Ayumu Kubota, and Jumpei Urakawa. 2015. SIBRA: Scalable Internet Bandwidth Reservation Architecture. CoRR abs/1510.02696 (2015).Google ScholarGoogle Scholar
  5. CAIDA. 2017. The CAIDA AS Relationships Dataset, May 01, 2017. http://www.caida.org/data/as-relationships/.Google ScholarGoogle Scholar
  6. CloudFlare. 2018. CloudFlare Web page. https://www.cloudflare.com/.Google ScholarGoogle Scholar
  7. Tim Dierks and Eric Rescorla. 2008. Rfc 5246: The transport layer security (tls) protocol. The Internet Engineering Task Force 3 (2008).Google ScholarGoogle Scholar
  8. Seyed K. Fayaz, Yoshiaki Tobioka, Vyas Sekar, and Michael Bailey. 2015. Bohatei: Flexible and Elastic DDoS Defense. In 24th USENIX Security Symposium (USENIX Security 15). USENIX Association, Washington, D.C., 817--832. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. Lixin Gao. 2001. On inferring autonomous system relationships in the Internet. IEEE/ACM Transactions on Networking 9, 6, 733--745. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. Michael T. Goodrich. 2008. Probabilistic Packet Marking for Large-scale IP Traceback. IEEE/ACM Transaction on Networking 16, 1 (February 2008), 15--24. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. MAWI group. 2017. MAWI Working Group Traffic Archive. http://mawi.wide.ad.jp/mawi/.Google ScholarGoogle Scholar
  12. John Ioannidis and Steven M. Bellovin. 2002. Implementing Pushback: Router-Based Defense Against DDoS Attacks. In Proceedings of the Network and Distributed System Security Symposium, NDSS 2002, San Diego, California, USA.Google ScholarGoogle Scholar
  13. Michael G. Kallitsis, Stilian Stoev, Shrijita Bhattacharya, and George Michailidis. 2015. AMON: An Open Source Architecture for Online Monitoring, Statistical Analysis and Forensics of Multi-gigabit Streams. CoRR abs/1509.00268 (2015).Google ScholarGoogle Scholar
  14. Min Suk Kang, Virgil D. Gligor, and Vyas Sekar. 2016. Defending Against Evolving DDoS Attacks: A Case Study Using Link Flooding Incidents. In Security Protocols Workshop (Lecture Notes in Computer Science), Vol. 10368. Springer, 47--57.Google ScholarGoogle Scholar
  15. Min Suk Kang, Virgil D. Gligor, and Vyas Sekar. 2016. SPIFFY: Inducing Cost-Detectability Tradeoffs for Persistent Link-Flooding Attacks. In 23rd Annual Network and Distributed System Security Symposium, NDSS 2016, San Diego, California, USA, February 21--24, 2016.Google ScholarGoogle Scholar
  16. M. S. Kang, S. B. Lee, and V. D. Gligor. 2013. The Crossfire Attack. In 2013 IEEE Symposium on Security and Privacy. 127--141. Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. Yoohwan Kim, Wing Cheong Lau, Mooi Choo Chuah, and H. J. Chao. 2006. PacketScore: a statistics-based packet filtering scheme against distributed denial-of-service attacks. IEEE Transactions on Dependable and Secure Computing 3, 2 (April 2006), 141--155. Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. S. Knight, H. X. Nguyen, N. Falkner, R. Bowden, and M. Roughan. 2011. The Internet Topology Zoo. IEEE Journal on Selected Areas in Communications 29, 9 (October 2011), 1765--1775.Google ScholarGoogle ScholarCross RefCross Ref
  19. Soo Bum Lee, Min Suk Kang, and Virgil D. Gligor. 2013. CoDef: Collaborative Defense Against Large-scale Link-flooding Attacks. In Proceedings of the Ninth ACM Conference on Emerging Networking Experiments and Technologies (CoNEXT '13). ACM, New York, NY, USA, 417--428. Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. Xin Liu, Xiaowei Yang, and Yanbin Lu. 2008. To Filter or to Authorize: Network-layer DoS Defense Against Multimillion-node Botnets. In Proceedings of the ACM SIGCOMM 2008 Conference on Data Communication (SIGCOMM '08). ACM, New York, NY, USA, 195--206. Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. MANRS. 2018. MANRS for Network Operators. https://www.manrs.org/manrs/.Google ScholarGoogle Scholar
  22. P Marques, N Sheth, R Raszuk, B Greene, J Mauch, and D McPherson. 2009. Dissemination of Flow Specification Rules. RFC 5575.Google ScholarGoogle Scholar
  23. Andrew Mortensen, Flemming Andreasen, Tirumaleswar Reddy, Christopher Gray, Rich Compton, and Nik Teague. 2018. Distributed-Denial-of-Service Open Threat Signaling (DOTS) Architecture. Internet-Draft draft-ietf-dots-architecture-07. Internet Engineering Task Force. https://datatracker.ietf.org/doc/html/draft-ietf-dots-architecture-07 Work in Progress.Google ScholarGoogle Scholar
  24. 360.com NetLab. 2017. A quick stats on the 608,083 Mirai IPs that hit our honeypots in the past 2.5 months. https://goo.gl/NYWMLq.Google ScholarGoogle Scholar
  25. Arbor Networks. 2018. DDoS Protection by Arbor Networks APS. https://www.arbornetworks.com/ddos-protection-products/arbor-aps.Google ScholarGoogle Scholar
  26. George Oikonomou, Jelena Mirkovic, Peter Reiher, and Max Robinson. 2006. A Framework for a Collaborative DDoS Defense. In ACSAC '06: Proceedings of the 22nd Annual Computer Security Applications Conference. IEEE Computer Society, 33--42. Google ScholarGoogle ScholarDigital LibraryDigital Library
  27. Vern Paxson. 1999. Bro: A System for Detecting Network Intruders in Real-time. Comput. Netw. 31, 23--24 (December 1999), 2435--2463. Google ScholarGoogle ScholarDigital LibraryDigital Library
  28. Adrian Perrig, Pawel Szalachowski, Raphael M. Reischuk, and Laurent Chuat. 2017. The SCION Architecture. Springer International Publishing, Cham. 17--42 pages.Google ScholarGoogle Scholar
  29. Steve Ranger. 2018. GitHub hit with the largest DDoS attack ever seen. ZD-Net, https://goo.gl/BmqekG.Google ScholarGoogle Scholar
  30. Matthew Roughan. 2005. Simplifying the Synthesis of Internet Traffic Matrices. SIGCOMM Comput. Commun. Rev. 35, 5 (October 2005), 93--96. Google ScholarGoogle ScholarDigital LibraryDigital Library
  31. The New York Times. 2013. How the Cyberattack on Spamhaus Unfolded. http://www.nytimes.com/interactive/2013/03/30/technology/how-the-cyberattack-on-spamhaus-unfolded.html.Google ScholarGoogle Scholar
  32. D. Turk. 2004. Configuring BGP to Block Denial-of-Service Attacks. RFC 3882. RFC Editor.Google ScholarGoogle Scholar
  33. Michael Walfish, Mythili Vutukuru, Hari Balakrishnan, David Karger, and Scott Shenker. 2010. DDoS Defense by Offense. ACM Trans. Comput. Syst. 28, 1, Article 3, 54 pages. Google ScholarGoogle ScholarDigital LibraryDigital Library
  34. X. Yang, D. Wetherall, and T. Anderson. 2008. TVA: A DoS-Limiting Network Architecture. IEEE/ACM Transactions on Networking 16, 6 (Dec 2008), 1267--1280. Google ScholarGoogle ScholarDigital LibraryDigital Library
  35. Kyle York. 2016. Dyn Statement on 10/21/2016 DDoS Attack. https://dyn.com/blog/dyn-statement-on-10212016-ddos-attack/.Google ScholarGoogle Scholar
  36. Zenedge. 2018. Zenedge Web page. https://www.zenedge.com/.Google ScholarGoogle Scholar

Index Terms

  1. SENSS Against Volumetric DDoS Attacks

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in
    • Published in

      cover image ACM Other conferences
      ACSAC '18: Proceedings of the 34th Annual Computer Security Applications Conference
      December 2018
      766 pages
      ISBN:9781450365697
      DOI:10.1145/3274694

      Copyright © 2018 ACM

      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 3 December 2018

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • research-article
      • Research
      • Refereed limited

      Acceptance Rates

      Overall Acceptance Rate104of497submissions,21%

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader