Mitigating Distributed Denial-of-Service Attack with Deterministic Bit Marking

نویسندگان

  • Yoohwan Kim
  • Ju-Yeon Jo
  • Frank Merat
  • Mei Yang
  • Yingtao Jiang
چکیده

The Distributed Denial-of-Service attack is a serious threat in Internet and an effective method is needed for distinguishing the attack traffic from the legitimate traffic. We propose the concept of bit marking to identify and drop the attack packets. Bit marking is a variation of packet marking technique that modifies the packet header at each router. However bit marking differs from packet marking in its process and the purpose. Instead of storing the router information in the packets, bit marking alters one or more bits in the marking field at each router. The bit positions for each ingress line card are selected randomly only once at the initialization. Such bit marking is performed to all the packets, resulting in a common path signature in the marking field upon arriving at a destination for all the packets originating from the same location. Since the packets traversing different paths are likely to have different path signatures, the bit marking process generates quite unique path signature for different sources, roughly emulating the source IP. Such Path Signature allows an easy identification and blocking of the DDoS attack. We show that the PS becomes more diverse as the lengths of the distinct path increases. From an artificial and real Internet topology we observe that the sources are uniformly distributed over the path signature space. In our experiments, the attack traffic can be blocked up to 99.6% using PS. DBM can mitigate most known attack types, such as SYN flooding, reflection attack, UDP flooding, etc. and it is robust to various attack patterns. DBM can also be extended to source address traceback with the topology information of participating routers. This method is simpler to implement than PPM and only small number of routers needs to be upgraded. The deployment can be done gradually without any impact on non-participating routers. Keyword: Denial-of-Service Attack, Internet, Network Security Mitigating Distributed Denial-of-Service Attack with Deterministic Bit Marking Yoohwan Kim, Ju-Yeon Jo, Frank Merat, Mei Yang, and Yingtao Jiang School of Computer Science, University of Nevada Las Vegas, NV, 89052-4019, USA Email: [email protected] Computer Science Department, California State University Sacramento, CA, 95819-6021, USA Email: [email protected] Electrical Engineering and Computer Science Department, Case Western Reserve University Cleveland, OH, 44106-7071, USA Email: [email protected] Department of Electrical and Computer Engineering, University of Nevada Las Vegas, NV, 89052-4019, USA Email: {meiyang, yingtao}@egr.unlv.edu

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Defeating distributed denial-of-service attack with deterministic bit marking

Denial-of-Service (DDoS) attack is a serious threat in Internet. We propose a bit marking concept to identify and drop the DDoS attack packets. Bit marking is a variation of the packet marking technique that modifies packet headers at each router. However instead of storing the router information in the packets, bit marking alters one or more bits in the marking field. The bit marking process d...

متن کامل

Traceback Ofdos over Autonomous Systems

Denial of service (DoS) is a significant security threat in open networks such as the Internet. The existing limitations of the Internet protocols and the common availability tools make a DoS attack both effective and easy to launch. There are many different forms of DoS attack and the attack size could be amplified from a single attacker to a distributed attack such as a distributed denial of ...

متن کامل

A Review of Packet Marking IP Traceback Schemes

Today, Internet has become the primary source of communication in networks. The attack on its infrastructure poses a great challenge in its expansion. Distributed Denial of Service attack is a serious security threat encountered during the past decade. The goal of the attacker is to spoof the source of IP address to hide its source. Various IP traceback schemes such as Probabilistic Packet Mark...

متن کامل

On Mitigating Distributed Denial of Service Attacks

ON MITIGATING DISTRIBUTED DENIAL OF SERVICE ATTACKS

متن کامل

Neural Network Based Protection of Software Defined Network Controller against Distributed Denial of Service Attacks

Software Defined Network (SDN) is a new architecture for network management and its main concept is centralizing network management in the network control level that has an overview of the network and determines the forwarding rules for switches and routers (the data level). Although this centralized control is the main advantage of SDN, it is also a single point of failure. If this main contro...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2005