International Journal of Engineering Trends and Technology (IJETT) – Volume 4 Issue 7- july 2013 Blocking of Flooding Attacks: Using Active Internet Traffic Filtering Mechanism Deepthi.S#1, Prashanti.G*2, Sandhya Rani.Kr#3 # Assistant Professor, Department of Computer Science and Engineering Vignan’s Lara Institute of Technology and Science Vadlamudi, Guntur, India Abstract— Now a day there is a dramatic increase in the frequency of distributed denial-of-service (DDoS) attacks. These attacks are an acute contemporary problem, with few practical solutions available today; one of the Fundamental limitations of the Internet is which allows anonymous people to access the network. Whenever the attacker wants to block the receiver for some amount of time they will send a disruptive flow which halt the receiver and they consume receiver’s network link resources. Critical infrastructures and businesses alike are vulnerable to DoS attacks flood of data that can incapacitate their networks with traffic floods. Unfortunately, current mechanisms require per-flow state at routers, ISP collaboration, or the deployment of an overlay infrastructure to defend against these events. In a bandwidth-flooding attack. A large number of compromised sources send high-volume traffic to the target with the purpose of causing congestion in its Receivers circuit and disrupting its legitimate communications. We proposed a mechanism called a enhanced Active Internet Traffic Filtering (AITF), a network layer Defense mechanism against such attacks [3]. AITF preserves a significant fraction of a receiver’s bandwidth in the face of bandwidth flooding .AITF can maintain their connectivity between the nodes that are connected in the network in the face of Bandwidth flooding. Hence, the network-layer of the Internet can provide an effective, Scalable and incrementally deployable solution against bandwidth-flooding attacks. Keywords— Denial of Services Defences, Network level security and Protection, Traffic Filtering. Flooding I. INTRODUCTION In a bandwidth-flooding attack, compromised sources send high-volume traffic to the target with the purpose of causing congestion in its Receivers circuit and interrupting its legitimate communications. Active Internet Traffic Filtering (AITF), a network-layer defence mechanism against such attacks. AITF enables a receiver to contact misbehaving sources and ask them to stop sending it traffic; each source that has been asked to stop is policed by its own Internet service provider (ISP), which ensures its compliance. An ISP that hosts misbehaving sources both supports AITF (and accepts to police its misbehaving clients), or risks losing all access to the complaining receiver—this is a strong incentive to cooperate, especially when the receiver is a popular publicaccess site. Real-life reports complement such analysis: The first well documented incident we are aware of is the 2001 attack against the Gibson Research Corporation (GRC) web site. To block the flood, GRC analysed the undesired traffic, determined its sources, and asked from their Internet service provider (ISP) to manually install filters that blocked traffic from these sources; in the meantime, their site was unreachable for more than 30hours.More recent attacks are ISSN: 2231-5381 less well documented (the victims are increasingly unwilling to reveal the details), but hint that botnet sizes have increased beyond thousands of sources, while undesired traffic is harder to identify. There are two basic steps in stopping a bandwidthflooding attack: 1) Identifying undesired traffic 2) And Blocking it. To prevent undesired traffic from causing legitimate-traffic loss, it must be blocked before entering the target’s tail circuit, for example, inside the target’s ISP. The first solution that comes to mind is to automate the approach followed by GRC: one can imagine an ISP service, in which a flooding target sends filtering requests to its ISP, and, in response, the ISP installs wire-speed filters (i.e., filters that do not affect packet-forwarding performance) in its routers to satisfy these requests; each filtering request specifies traffic from one undesired-traffic source to the target AITF preserves a significant fraction of a receiver’s bandwidth in the face of bandwidth flooding, and does so at a per-client cost that is already affordable for today’s ISPs; this per-client cost is not expected to increase, as long as botnetsize growth does not outpace Moore’s law. And also show that even the first two networks that deploy AITF can maintain their connectivity to each other in the face of bandwidth flooding. We can say that the network-layer of the Internet can provide an effective, scalable, and incrementally deployable solution against bandwidth-flooding attacks. Figure1. Typical locations for an intrusion detection system http://www.ijettjournal.org Page 3031 International Journal of Engineering Trends and Technology (IJETT) – Volume 4 Issue 7- july 2013 IDS should be placed in Network Topology: Depending upon our network topology, we may want to position intrusion detection systems at one or more places. It also depends upon what type of intrusion activities we want to detect: internal, external or both. For example, if we want to detect only external intrusion activities, and we have only one router connecting to the Internet, the best place for an intrusion detection system may be just inside the router or a firewall. If we have multiple paths to the Internet, we may want to place one IDS box at every entry point. However if we want to detect internal threats as well, we may want to place a box in every network segment. In many cases we don’t need to have intrusion detection activity in all network segments and we may want to limit it only to sensitive network areas. Figure 1 shows typical location where we can place an intrusion detection system. II. LITARATURE SURVEY Distributed denial-of-service attacks (DDoS) creates an immense threat to the Internet, and consequently many defense mechanisms have been proposed to combat them. Attackers constantly modify their tools to bypass these security systems, and researchers in turn modify their approaches to handle new attacks. The DDoS field is evolving quickly, and it is becoming increasingly hard to grasp a global view of the problem. We recently witnessed some attacks In December 2003, an attack kept SCO's web site practically unreachable for more than a day [13]; in June 2004, another attack _flooded Akamai's name servers, disrupting access to its clients for 2 hours, including the Google and Yahoo search engines [14]; a month later, an attack _flooded Double Click's name servers, disabling ad distribution to its 900 clients for 3 hours [8]. Considering that network downtime costs hundreds of thousands of dollars per hour [17], such incidents can translate into millions of dollars of lost revenue for the victim. Yet, the DDoS problem remains unsolved. Flooding attacks, where an attacker attempts to exhaust the downstream bandwidth of a server, are particularly difficult to defend against. Unlike other forms of DDoS such as SYN-flooding, computation attacks or request floods, the downstream bandwidth is not under a web-server’s control. And therefore, while there exist server side protection mechanisms to protect server resources, such as syn-cookies [18] and secure admission control schemes, few practical solutions to defend against flooding exist today. Part of the problem is the difficulty in pushing filtering requests into the network where there is sufficient bandwidth to handle the flood. An in-network element cannot distinguish a single packet as being part of a legitimate flow without doing flow tracking, a tricky proposition [1] That traditionally requires per-flow state which may be untenable for a high-bandwidth link. Other solutions are easily fooled by source spoofing [1] or require massive architectural changes. A. Filters In Existing System To prevent undesired traffic from causing legitimate-traffic loss, it must be blocked before entering the target’s tail circuit, for example, inside the target’s ISP. The first solution that comes to mind is to automate the approach followed by GRC: one can imagine an ISP service, in which a flooding target sends filtering requests to its ISP, and, in response, the ISP installs wire-speed filters (i.e., filters that do not affect packetforwarding performance) in its routers to satisfy these requests; each filtering request specifies traffic from one undesiredtraffic source to the target. The problem with this approach is that it requires more resources than ISPs can afford: Wirespeed filters in routers are a scarce resource, and this is not expected to change in the near future. Modern hardware routers forward packets at high rates that allow only few lookups per forwarded packet; to reduce the number of per-packet lookups, router manufacturers store filters— as well as any state that must be looked up per packet, e.g., the router’s forwarding table—in TCAM (ternary content addressable memory), which allows for parallel accesses. However, because of its special features, TCAM is more expensive and consumes more space and power than conventional memory; as a result, a router line card or supervisor-engine card typically supports a single TCAM chip with tens of thousands of entries. To block the flood, GRC analysed the undesired traffic, determined its sources, and asked from their Internet service provider (ISP) to manually install filters that blocked traffic from these sources. Wire-speed filters in routers are a scarce resource, and this is not expected to change in the near future. Modern hardware routers forward packets at high rates that allow only few lookups per forwarded packet; to reduce the number of perpacket lookups, router manufacturers store filters as well as any state that must be looked up per packet. In the figure2 attacker sends large number of packets to the target through the routers and there is no chance to the other node to send packets or receive the packets from that same node so that path is congested due to the over flow of sending packets from the attacker. Then we overcome this problem by using the filters for stopping the attacks for some amount of time. Even though packets is continuously sending by the attacker then AITF protocol Block that node. Congested Figure2. Blocking path through continuous data ISSN: 2231-5381 http://www.ijettjournal.org Page 3032 International Journal of Engineering Trends and Technology (IJETT) – Volume 4 Issue 7- july 2013 B. Ternary Content Addressable Memory. TCAM = Ternary Content Addressable Memory. Special type of computer memory used in certain very high speed searching applications. Where Content Addressable Memory describes a chip design that allows for a search of entire memory in a single operation. TCAM can perform a wide search in memory in a very short fixed period of time typically less than 20ns. TCAM memory is expensive to build there manufactures use a little as possible. TCAM chips use a lot of power and high heat dissipation. III. PROPOSED METHODOLOGY In this paper, we present Enhanced Active Internet Traffic Filtering (AITF),[2] a network-layer filtering mechanism that enables a receiver to explicitly deny tailcircuit access to misbehaving sources, while addressing these challenges. We show that AITF enables a receiver to preserve on average more than 80% of its tail circuit in the face of a SYN-flooding attack that exceeds the target’s tail-circuit capacity by a factor of 10. A. Goals and Objectives of the proposed system In this paper propose and develop an Active Internet Traffic Filtering. Proposed model should be a network- layer filtering mechanism that would preserve a significant fraction of a receiver’s tail circuit in the face of bandwidth flooding, while requiring a reasonable amount of resources from participating ISPs. We should observe the following Considerations on proposed model. The proposed should allow a receiver to preserve on average 80% of its tail circuit in the face of a SYNflooding attack that would have ten times the rate of its capacity. Should reduce the CPU Cost. Logics (AITF) should be modifiable at any instance of time Should be able to detect the attacks that cause server to crash Should be able to detect the flooding and bandwidth. B. Active Internet Traffic Filtering (AITF) A networklayer filtering Mechanism. Source S sends undesired traffic to receiver R through routers Sgw ( in S’s domain ) and Rgw (in R’s domain) SNET and RNET have deployed AITF ( and the underlying pathidentification mechanism). R identifies {S Sgw Rgw R} as an undesired flow. As shown in Figure 3 Here we divided entire working functionality into following modules. C. Path Identification: The domain-level path of a received packet as the sequence of border routers that forwarded the packet; a border router is a router that interconnects different administrative domains. I assume that there exists a (not necessarily globally deployed) path-identification mechanism that enables participating domains to associate the packets they forward with some form of identity, such that the receiver of a packet can combine these identities and reconstruct part of the packet’s domain-level path. E.g., in an early deployment scenario, where only and have deployed path identification, the receiver can identify as part of the domain-level path, to provide path identification via record route, i.e., by enabling routers to mark forwarded packets, such that a packet’s path is specified inside its headers: NIRA , WRAP , and the Points of Control approach [8] all provide sufficient path identification for AITF. Whatever the underlying record-route mechanism, i do not assume that it is globally deployed; the only domains that have to deploy it are the ones that also deploy AITF. D. Undesired-Traffic Identification: We define a packet flow as a sequence of packets with a common source IP address, domain- level path specification, and destination IP address; use notation {source domain_level_path destination} to specify a flow. For instance, in Fig. 1, traffic with source IP address, domain-level path specification, and destination IP address constitutes a flow, denoted by. We assume that a receiver can run an “undesired-flow identification system,” which takes as input incoming traffic and outputs specifications of undesired flows; a flow is classified as undesired once the receiver decides it does not want to receive it for a certain amount of time. From this assumption on the fact that existing technology already identifies undesired flows in terms of their source and destination prefixes (and potentially other header fields in use today); once the domain-level path is specified inside a packet’s headers, it should be possible to extend this technology to take it into account. E. Path-Based Wire-Speed Filtering: We assume that a router that runs the AITF protocol (which, as i will see, is necessarily a border router) can install a wire-speed filter that blocks all traffic matching a certain flow specification. we base this assumption on the fact that modern routers already use wire speed filters to block packets based on their IP and transport layer headers; once the domain-level path is specified inside a packet’s headers, it Figure 3. Source S sends undesired traffic to receiver R ISSN: 2231-5381 http://www.ijettjournal.org Page 3033 International Journal of Engineering Trends and Technology (IJETT) – Volume 4 Issue 7- july 2013 should be possible to use the same technology to filter the packet based on its domain-level path. F. Provider-Client Message Authentication A provider can verify the authenticity of messages sent from its own clients, and a client can verify the authenticity of messages sent from its own provider. This can be achieved with message authentication codes or three-way handshakes. G. Non-Compromised Path: Here for a source-receiver pair to be able to communicate, the network elements (typically routers) that are on the path between them must not be compromised. Our rationale is that, once a router gets compromised, all the communications served by it are at its mercy: the router can drop their traffic or hijack their TCP connections. Of course, if a source-receiver pair can communicate over multiple paths, and at least one of them is not compromised, they should be able to maintain their communication— akin to how multipath communication between access points and clients increases attack resilience in the Stateless Multipath Overlays approach. Combining multi-path with AITF is part of our future work. H. The Basic AITF Protocol H.1 Players AITF involves four players per undesired flow, illustrated in the above figure 3 • The receiver R is the target of the undesired flow. • The source S is the node generating the undesired flow. • The receiver’s gateway Rgw is a border router located in R’s ISP, on the path from S to R, before R’s tail circuit. Note that Rgw is not significantly affected by the attack; if it were (i.e., if its own tail circuit were congested), Rgw itself would be the “receiver,” while the role of the receiver’s gateway would be played by another router upstream. • The source gateway Sgw is a border router located in S ’s ISP, on the path from S to R. . These four players communicate through AITF messages, which include one or more filtering requests. Each filtering request includes the specification of an undesired flow and the amount of time (called the filtering window) for which the Requester does not want to receive F. For simplicity, we make three temporary assumptions they are The source gateway Sgw cooperates with the receiver’s gateway Rgw to help the Receiver. Filtering requests are not malicious, i.e., they indeed originate from the specified undesired-traffic receiver R and correspond to traffic indeed sent from the specified source. The receiver can trust the path specified inside each received packet, i.e., it knows the true source S and the true source gateway Sgw for each undesired flow. Once a receiver R identifies an undesired flow F, it contacts the corresponding source S and asks it to stop sending F for an amount of time Wf. R’s request is ISSN: 2231-5381 propagated through Rgw and Sgw, which temporarily block F to immediately protect R until S complies. Filtering request R Forward request Forward request S To block F For Wf Rgw Sgw Installs temporary filters And block F for time Installs temporary filters And block F for time Tdr << Wf Tds << Wf Figure4. Algorithm overview More specifically, R sends a filtering request to its gateway Rgw to block F for Wf . In response, Rgw installs a temporary filter that blocks F for time Tdr<<Wf and forwards the request to the source gateway Sgw ; once Sgw satisfies the request, Rgw removes its temporary filter. Similarly, Sgw installs a temporary filter that blocks F for time Tds<<Wf , logs the request for Wf , and forwards the request to S ; once S satisfies the request, Sgw removes its temporary filter. If S does not cooperate (i.e., continues to send F), classifies S as non -cooperating and blocks all S -originated traffic. If S “pretends” to cooperate. R sends a second filtering request against S; upon receiving this second Request, Sgw checks its log, detects that has already been told to stop sending F, classifies S as noncooperating, and blocks all S -originated traffic. as shown in figure 4 IV. SIMULATION RESULTS In this section, we use simulation to analyse the effect of undesired traffic on AITF-enabled receivers and illustrate the effectiveness of AITF against bandwidth flooding. We developed site and we followed below steps When users Login into the popular website he can view or download the books stored in that website. Any Number of users can download the books at the same time While any user downloading the books initially the request being serve by all the nodes. At one particular instance attacker attack one node i.e connected in the network and send more number of packets continouly from the same IP address. At that time AITF Filter in that attacked node block that node from the network and provides other path for sending the requests. http://www.ijettjournal.org Page 3034 International Journal of Engineering Trends and Technology (IJETT) – Volume 4 Issue 7- july 2013 Even though the node is blocked user impact wont be there . As there should be no user impact the other nodes serving the requests . 30 IN1 25 IN2 IN3 20 IN4 IN5 15 IN6 IN7 10 IN8 IN9 5 IN10 0 5sec 10sec 15sec 20sec 25sec 30sec 35sec 40sec 45sec Figure 5 Graph shows Flow of traffic at all nodes and attack at one node. In the Figure 5 we are showing ten nodes that are connected in the network. In the above graph all requests are serving through all the nodes while at IN3 node at the time of 22 sec the attacker send more packets from that particular node then AITF. Immediately block that node even though the node is blocked requests are serving through the other nodes. Here user impact won’t be there though the floe is continuous then AITF blocks that particular node. 25 20 Good Traffic 15 Bad Traffic 10 5 More specifically, we showed the following: 1. AITF offers filtering response time equal to the one-way delay the victim to the victim's gateway. I.e., a victim can have an undesired flow blocked within milliseconds. 2. AITF offers filtering gain on the order of hundreds of blocked flows per used filter. I.e., a router can block two orders of magnitude more flows than it has wire-speed filters. For example, suppose eBay is receiving a million undesired flows; with 10,000 filters, eBay's gateway can have all flows blocked within 100 seconds. In the worst-case scenario, eBay's gateway blocks all traffic from each domain that hosts attack sources and refuses to filter their traffic, which (in today's Internet) requires a few tens of thousands of filters. 3. A set of malicious nodes can practically not abuse AITF to disrupt communication from node A to node B, as long as they are not located on the path from A to B. This holds even during initial deployment, where most Internet domains are AITF-unaware. The idea behind AITF is that the Internet does have enough filtering capacity to block large amounts of undesired flows -- it is just that this capacity is concentrated close to the attack sources. AITF enables service providers to "gain access" to this filtering capacity and couple it with a reasonable amount of their own filtering resources, in order to protect their customers in the face of increasingly distributed denial-of-service attacks. The feasibility of AITF shows that the network-layer of the Internet can provide an effective, scalable, and incrementally deployable solution to bandwidth-flooding attacks. But still some flow based attacks may not be detected effectively by the AITF. So, there should be some enhancements made to AITF so that it can defend all flow based attacks. 0 2sec 6sec 10sec ACKNOWLEDGMENT 14sec Figure 6: Graph shows the Flow of traffic at single node. See figure 6 represents only single node At 2sec time good traffic is going on smoothly at 7 sec attacker spoof this node and send more traffic from same IP address then bad traffic is more then the good traffic . Then ISP of that particular node installs filters to stop the flow even though the floe is continuous then AITF blocks that particular node. V. CONCLUSION AND FUTURE ENHANCEMENTS Enhanced Active Internet Traffic Filtering (AITF), a mechanism for filtering highly distributed denial-of-service attacks. We showed that AITF can block a million undesired flows, while requiring only tens of thousands of wire-speed filters from each participating router -- an amount easily accommodated by today's routers. It also prevents abuse by malicious nodes seeking to disrupt other nodes' communications. ISSN: 2231-5381 We take this opportunity to acknowledge those who have been great support and inspiration through the research work. Our sincere thanks to Mrs.B.RenukaDevi Head of the department of CSE to her diligence and motivation. Special thanks to Vignan’s Lara Institute of Science and Technology, for giving us such a nice opportunity to work in the great environment and for providing the necessary facilities during the research and encouragement from time to time. Thanks to our colleagues who have been a source of inspiration and motivation that helped to us. And to all other people who directly or indirectly supported and help us to fulfill our task. Finally, we heartily appreciate our family members for their motivation, love and support in our goal. [1] [2] REFERENCES Flow-Cookies: Using Bandwidth Amplification to Defend Against DDoS Flooding Attacks Martin Casado, Pei Cao Stanford University {casado,cao}@cs.stanford.edu. Active Internet Traffic Filtering: Real-Time Response to Denial-ofService Attacks ,Katerina Argyraki David R. Cheriton, Distributed Systems Group, Stanford University.Fargyraki, cheritong@dsg.stanford.edu http://www.ijettjournal.org Page 3035 International Journal of Engineering Trends and Technology (IJETT) – Volume 4 Issue 7- july 2013 [3] [4] [5] [6] [7] [8] [9] [10] [11] [12] [13] [14] [15] [16] [17] [18] A. Kuzmanovic and E. Knightly, “Low-rate targeted TCP denial-ofservice attacks (The shrew vs. the mice and elephants),” in Proc. ACM SIGCOMM, Karlsruhe, Germany, Aug. 2003. A. Stavrou and A. Keromytis, “Countering DoS attacks with stateless multipath overlays,” in Proc. ACM Conf. Computer and Communications Security (CCS), Alexandria, VA, Nov. 2005. ] Z. Chen, C. Ji, and P. Barford, “Spatial-temporal characteristics of internet malicious sources,” in Proc. IEEE INFOCOM MiniConference, Phoenix, AZ, Apr. 2008. B. Agrawal and T. Sherwood, “Modeling TCAM power for next generation network devices,” in Proc. IEEE Int. Symp. Performance Analysis of Systems and Software (ISPASS), Austin, TX, Mar. 2006. X. Yang, “NIRA: A new internet routing architecture,” in Proc. ACM SIGCOMM Workshop on Future Directions in Network Architecture (FDNA), Karlsruhe, Germany, Aug. 2003. K. Argyraki and D. R. Cheriton, “Loose source routing as a mechanism for traffic policies,” in Proc. ACM SIGCOMMWorkshop on Future Directions in Network Architecture (FDNA), Portland, OR, Aug. 2004. A. Greenhalgh, M. Handley, and F. Huici, “Using routing and tunneling to combat DDoS attacks,” in Proc. USENIX Workshop on Steps Towards Reducing Unwanted Traffic in the Internet (SRUTI), Cambridge, MA, Jul. 2005. A. Markopoulou, F. Tobagi, and M. Karam, “Loss and delay measurements of internet backbones,” Elsevier Computer Commun., Special Issue on Measurements and Monitoring of IP Networks, vol. 29, pp. 1590–1604, Jun. 2006. Scalable Network-layer Defense Against Internet Bandwidth-Flooding Attacks by Katerina Argyraki and David R. Cheriton ]D. G. Andersen. Mayday: Distributed Filtering for Internet Services. In USITS, March 2003. Attack downs Yahoo, Google. http://news.zdnet.co.uk/internet/security/0,39020375,39157748,00.htm, June 2004. DDoS Attack Knocks Out DoubleClick Ads. http://www.eweek.com/article2/0,1759,1628340,00.asp, July 2004. Ihoneycol: A Collaborative Technique For Mitigation Of Ddos Attack FireCol: A Collaborative Protection Networkfor the Detection of Flooding DDoS Attacks.Jéerôme François, Issam Aib, Member, IEEE, and Raouf Boutaba, Fellow, IEEE. D. A. Patterson. A simple way to estimate the cost of downtime. In USENIX Systems Administration Conference,November 2002. D. Bernstein. Syn cookies. http://cr.yp.to/syncookies.html, 1996. ISSN: 2231-5381 http://www.ijettjournal.org Page 3036