Spread Identity: A new dynamic address remapping mechanism for anonymity and DDoS defense

نویسندگان

  • Dhananjay S. Phatak
  • Alan T. Sherman
  • Nikhil Joshi
  • Bhushan Sonawane
  • Vivek G. Relan
  • Amol Dawalbhakta
چکیده

We present and experimentally evaluate Spread Identity (SI)—a new dynamic network address remapping mechanism that provides anonymity and DDoS defense capabilities for Internet communications. For each session between a source and destination host, the trusted source gateway dynamically and randomly assigns an IP address for the source host from the pool of all routable IP addresses allocated to the source organization (by the IANA). Similarly, in response to a name resolution query from the source gateway, the trusted authoritative DNS server (i.e., the ADNS) for the destination organization dynamically assigns an IP address for the destination host from the pool of all routable IP addresses allocated to the destination organization. These assignments depend upon the state of the server (including load, residual capacity, time of day) and policy. Different hosts can share the same IP address when communicating with distinct peers. Each gateway creates a NAT entry, valid for the communication session, based on the dynamic assignment by its organization. An eavesdropper listening to packets flowing through the Internet between the source and destination gateways learns only the source and destination domains; the eavesdropper cannot see the actual complete IP addresses of the source and destination hosts. In addition, SI enhances DDoS defense capabilities by enabling packet filtering based on destination addresses. With multiple IP addresses for the same destination, filtering based on destination addresses can block attackers without necessarily blocking legitimate users. Deploying SI requires changes to organizational gateways and, possibly, to the edgerouters that interface with organizational gateways; but network mechanisms farther upstream, including the core routers in the Internet remain unchanged. Likewise, the installed base of operating systems running individual hosts in the internal network, together with the end-user application suites they support, remain untouched; thereby illustrating that the SI mechanisms are backward compatible, incrementally deployable, and robustly scalable. A naïve implementation of SI can increase the DNS traffic; however, when SI is implemented at both the source and the destination ends, it is possible for SI to reduce DNS traffic. Ns-2 simulations and experiments on the DeterLab test bed corroborate the main hypotheses and demonstrate advantages of the SI paradigm. Ns-2 simulations demonstrate that file transfer success rates for our SI DDoS protection mechanism are similar to those of filter-based and capability-based approaches, with lower file transfer times than those for filter-based approaches. DeterLab trials demonstrate that SI consumes similar resources (connection establishment time, network address translation table size, packet forwarding rate, and memory) to those of a typical single NAT system; but with higher name resolution times. 1 Sherman was supported in part by the Department of Defense under IASP Grants H98230-09-1-0404, H98230-10-1-0359, and H98230-11-1-0473.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Review on Ddos Attacks and Various Detection Mechanisms

DDoS attack is a coordinated attack on massive scale and it is a major threat in current computer networks. It is not easy to detect the attack , The seriousness of the DDoS problem and the increased frequency of DDoS attacks have led to the advent of numerous DDoS defense mechanisms. Detection mechanism is the first step to avoid the DDoS attack. Some of these mechanisms address a specific kin...

متن کامل

Defense against DDoS Attacks Using IP Address Spoofing

Distributed Denial of Service (DDoS) attacks is launched by large number of compromised host to interrupt the services of the legitimate users. It is most challenging to defense against such attacks because most of the attacker use source IP address spoofing in order to hide their identity and such attack packets appear to the target server as if they came from a legitimate client. In this pape...

متن کامل

Autonomous Agent for DDoS Attack Detection and Defense in an Experimental Testbed

Distributed Denial of Service (DDoS) attacks impinge on the availability of critical resources in the Internet domain. The objective of this paper is to develop an autonomous agent based DDoS defense in real time without human intervention. A mathematical model based on Lanchester law has been designed to examine the strength of DDoS attack and defense group. Once attack strength is formulated ...

متن کامل

A Comprehensive Taxonomy of DDoS Attacks and Defense Mechanism Applying in a Smart Classification

-A Distributed denial of service (DDoS) attack uses multiple machines operating in concern to attack a network or site. It is the most important security problem for IT managers. These attacks are very simple organized for intruders and hence so disruptive. The detection and defense of this attack has specific importance among network specialists. In this paper a new and smart taxonomy of DDoS ...

متن کامل

Multifaceted Defense Against Distributed Denial of Service Attacks: Prevention, Detection, Mitigation

Distributed Denial of Service (DDoS) attacks can be so powerful that they can easily deplete the computing resources or bandwidth of the potential targets, by flooding massive packets. Internet infrastructures and network applications, including social services and communication systems for emergency management, are under the threat of the DDoS problem. This thesis aims at providing efficient m...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:
  • Journal of Computer Security

دوره 21  شماره 

صفحات  -

تاریخ انتشار 2013