LADS: Large-scale Automated DDoS Detection System
نویسندگان
چکیده
The last few years have seen a steady rise in the occurrence and sophistication of distributed denial of service (DDoS) attacks. Volume-based attacks aggregate at a target’s access router, suggesting that (i) detection and mitigation is best done by providers in their networks; and (ii) attacks are most readily detectable at access routers, where their impact is strongest. In-network detection presents a tension between scalability and accuracy. Specifically, accuracy of detection dictates fine grained traffic monitoring, while performing such monitoring for the tens or hundreds of thousands of access interfaces in a large provider network presents serious scalability issues. In this work we investigate the design space for in-network DDoS detection and present a triggered, multi-stage approach that addresses both scalability and accuracy. Each successive stage can access finer resolution data sets, and can perform deeper, more expensive diagnostics if required. We argue that this approach is applicable to any economically feasible, large scale, DDoS detection system. Our second contribution is the design and implementation of an operational instance of our triggered, multi-stage approach. The attractiveness of this system lies in the fact that it makes use of data that is readily available to an ISP. Specifically, SNMPbased anomalies trigger the collection of Netflow data for detailed attack analysis. Aggregation and compression on the flow data is used to generate alarms concerning possible attack targets. We evaluate the system using SNMP and Netflow data collected from a large tier-1 ISP and compare the results with alarms generated by a commercial DDoS detection system. Our triggered approach achieves high accuracy with fairly modest processing requirements.
منابع مشابه
DDoS: design, implementation and analysis of automated model
Earlier, we have proposed an automated model to minimise DDoS attacks in single ISP domain and extended the model to multiple ISP domains. Our approach has several advanced features to minimise DDoS attacks in the internet. The focus of this paper is twofold: firstly, to present a detailed description of the design and implementation of the proposed model and second to discuss and analyse the e...
متن کاملCollaborative Defense Mechanism Using Statistical Detection Method against DDoS Attacks
Distributed Denial-of-Service attack (DDoS) is one of the most outstanding menaces on the Internet. A DDoS attack generally attempts to overwhelm the victim in order to deny their services to legitimate users. A number of approaches have been proposed for defending against DDoS attacks accurately in real time. However, existing schemes have limits in terms of detection accuracy and delay if the...
متن کاملPERFORMANCE EVALUATION OF ROUTE-BASED DISTRIBUTED PACKET FILTERING FOR DDOS PREVENTION IN LARGE-SCALE NETWORKS A Thesis
Kim, HyoJeong. M.S., Purdue University, December, 2003. Performance Evaluation of Route-based Distributed Packet Filtering for DDoS Prevention in Large-scale Networks. Major Professor: Kihong Park. This thesis studies performance evaluation of route-based distributed packet filtering (DPF) for spoofed distributed denial of service (DDoS) attack prevention in large-scale networks under dynamic n...
متن کاملReview on Ddos Attacks and Various Detection Mechanisms
DDoS attack is a coordinated attack on massive scale and it is a major threat in current computer networks. It is not easy to detect the attack , The seriousness of the DDoS problem and the increased frequency of DDoS attacks have led to the advent of numerous DDoS defense mechanisms. Detection mechanism is the first step to avoid the DDoS attack. Some of these mechanisms address a specific kin...
متن کاملA DoS/DDoS Attack Detection System Using Chi-Square Statistic Approach
Nowadays, users can easily access and download network attack tools, which often provide friendly interfaces and easily operated features, from the Internet. Therefore, even a naive hacker can also launch a large scale DoS or DDoS attack to prevent a system, i.e., the victim, from providing Internet services. In this paper, we propose an agent based intrusion detection architecture, which is a ...
متن کامل