An Integrated Honeypot Framework for Proactive Detection, Characterization and Redirection of DDoS Attacks at ISP level
نویسندگان
چکیده
Distributed Denial of Service (DDoS) attacks can effect the steady functioning of any network, posing a severe security threat. Concentrated single source DDoS attacks consume huge resources like bandwidth in a very small duration and have direct impact at ISP level, thus making them easily detectable. In contrast, diluted low rate DDoS attacks lead to graceful degradation of network over a longer duration and hence are mostly undetectable. The outcome of above attacks is that legitimate users are denied service. Though an array of schemes have been proposed for the detection of the presence of DDoS attacks, characterizing of the flows as a normal flow or a malicious one, and mitigating the effects of the attacks once they have been detected, there is still a dearth of complete frameworks that encompass multiple stages in the process of defense against DDoS attacks. In this paper, we propose a novel honeypot framework that proactively detects the presence of attack, characterizes the TCP flows as attack or legitimate, and mitigates the influence of the attack by redirecting attack flows to honeypots. The detection has been achieved by an innovative entropy based scheme. Our detection mechanism adapts itself according to variation in attack loads in real time and calibrates the system to operate in one of the naïve, normal or best defense modes. The in stream flows are characterized on the basis of entropy value and mode of operation in moving time window. During mitigation, attack flows are redirected to autonomic dynamic honeypots present in the same network as active FTP servers. A dynamic honeypot engine (DHE) in honeypot controller (HC) module has been modeled to generate judicious mixture of honeypot and active FTP servers from a pool of servers depending on real time network conditions at ISP level. Goodput, mean time between failure and average response time have been evaluated for naïve, normal and best defense mode of operation. We validate the effectiveness of the approach with simulations carried out at different attack strengths in ns-2 on a Linux platform. We also report our experimental results for detection over KDD 99 dataset. Results show that our proposed framework gives a drastic improvement in terms of average response time and good put. It meets the challenges of most of the existing solutions to DDoS with its ability to proactively detect variable rate attack in real time with minimum false alarms and minimum collateral damage. The proposed scheme has the potential to maintain stable network functionality even in the presence of attacks. It can be fine tuned according to the dynamically changing network conditions at ISP level.
منابع مشابه
A Hybrid Defense Technique for ISP Against the Distributed Denial of Service Attacks
As malicious traffic from botnets now threatens the network infrastructure of Internet Service Providers (ISPs), the importance of controlling botnets is greater than ever before. However, it is not easy to handle rapidly evolving botnets efficiently because of the highly evolved detection avoidance techniques used by botnet makers. Further, nowadays, Distributed Denial of Service (DDoS) attack...
متن کاملDual-Level Defense Framework for DDoS Attacked Network
DDoS has become one of the thorniest problems in the Internet, and aims to deny legitimate users of the services they should have. In this paper, we introduce novel dual level framework that consist of attack detection (D-LAD) and characterization scheme for defending against the DDoS attacks. The macroscopic level detectors (MaLAD) attempt to detect voluminous congestion inducing attacks which...
متن کاملNeural Network Based Protection of Software Defined Network Controller against Distributed Denial of Service Attacks
Software Defined Network (SDN) is a new architecture for network management and its main concept is centralizing network management in the network control level that has an overview of the network and determines the forwarding rules for switches and routers (the data level). Although this centralized control is the main advantage of SDN, it is also a single point of failure. If this main contro...
متن کاملAn ISP Level Solution to Combat DDoS Attacks using Combined Statistical Based Approach
Disruption from service caused by DDoS attacks is an immense threat to Internet today. These attacks can disrupt the availability of Internet services completely, by eating either computational or communication resources through sheer volume of packets sent from distributed locations in a coordinated manner or graceful degradation of network performance by sending attack traffic at low rate. In...
متن کاملF-STONE: A Fast Real-Time DDOS Attack Detection Method Using an Improved Historical Memory Management
Distributed Denial of Service (DDoS) is a common attack in recent years that can deplete the bandwidth of victim nodes by flooding packets. Based on the type and quantity of traffic used for the attack and the exploited vulnerability of the target, DDoS attacks are grouped into three categories as Volumetric attacks, Protocol attacks and Application attacks. The volumetric attack, which the pro...
متن کامل