Defeating distributed denial-of-service attack with deterministic bit marking

نویسندگان

  • Yoohwan Kim
  • Ju-Yeon Jo
  • Francis L. Merat
چکیده

Denial-of-Service (DDoS) attack is a serious threat in Internet. We propose a bit marking concept to identify and drop the DDoS attack packets. Bit marking is a variation of the packet marking technique that modifies packet headers at each router. However instead of storing the router information in the packets, bit marking alters one or more bits in the marking field. The bit marking process discussed in this paper is performed to all the packets and at all the routers along the path; hence it is called deterministic bit marking (DBM). DBM creates a common path signature for all the packets originating from the same location upon arriving at a destination. Since different source networks generate virtually unique path signatures, DBM makes it possible to isolate and discard DDoS attack traffic. From the Internet topology of Autonomous Systems we observe that the source networks are quite uniformly distributed over the path signature space. In our simulation over 99% of the attack traffic is blocked using DBM while up to 99% of the legitimate traffic passes. DBM can also be used for source traceback using reverse bit marking. DBM can be independently deployed for each ISP and the DBM-based networks can be protected from the attacks coming from non-DBM networks. 1 INTRODUCTION In Denial-of-Service (DoS) attack, large amount of packets are bombarded to a destination to bring down a victim server or a communication link toward a victim [7]. In Distributed DoS (DDoS) the attack is originated from a large number of attack agents that have been compromised by the attacker. DDoS attack is becoming more threatening with newer type of attacks and attack patterns [16]. Under DDoS packet flooding, it is difficult to identify the attacking packets or to identify the source of the attack since the source IP addresses of the attack packets are usually spoofed. Rate limiting is commonly used to lower the overwhelming bandwidth to the victim. In some rate-limiting schemes, both the attack and legitimate packets towards the victim are simply dropped to keep the communication link toward the victim available [9][12][20][21]. In more recent approaches, the attack packets are distinguished and dropped with higher accuracy [5][10][13][14], but they require rather sophisticated operation or network-wide cooperation. Another area of research focuses on traceback of the source address including logging [19], packet marking [18] and using ICMP [3]. However traceback alone cannot be used for blocking attack …

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Mitigating Distributed Denial-of-Service Attack with Deterministic Bit Marking

The Distributed Denial-of-Service attack is a serious threat in Internet and an effective method is needed for distinguishing the attack traffic from the legitimate traffic. We propose the concept of bit marking to identify and drop the attack packets. Bit marking is a variation of packet marking technique that modifies the packet header at each router. However bit marking differs from packet m...

متن کامل

Traceback Ofdos over Autonomous Systems

Denial of service (DoS) is a significant security threat in open networks such as the Internet. The existing limitations of the Internet protocols and the common availability tools make a DoS attack both effective and easy to launch. There are many different forms of DoS attack and the attack size could be amplified from a single attacker to a distributed attack such as a distributed denial of ...

متن کامل

A Review of Packet Marking IP Traceback Schemes

Today, Internet has become the primary source of communication in networks. The attack on its infrastructure poses a great challenge in its expansion. Distributed Denial of Service attack is a serious security threat encountered during the past decade. The goal of the attacker is to spoof the source of IP address to hide its source. Various IP traceback schemes such as Probabilistic Packet Mark...

متن کامل

Neural Network Based Protection of Software Defined Network Controller against Distributed Denial of Service Attacks

Software Defined Network (SDN) is a new architecture for network management and its main concept is centralizing network management in the network control level that has an overview of the network and determines the forwarding rules for switches and routers (the data level). Although this centralized control is the main advantage of SDN, it is also a single point of failure. If this main contro...

متن کامل

Survey on Packet Marking Algorithms for IP Traceback

Distributed Denial of Service (DDoS) attack is an unavoidable attack. Among various attacks on the network, DDoS attacks are difficult to detect because of IP spoofing. The IP traceback is the only technique to identify DDoS attacks. The path affected by DDoS attack is identified by IP traceback approaches like Probabilistic Packet marking algorithm (PPM) and Deterministic Packet Marking algori...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2003