Uploaded by shiny star

dayanandam2018

advertisement
DDoS Attacks—Analysis and Prevention
G. Dayanandam, T. V. Rao, D. Bujji Babu and S. Nalini Durga
Abstract Distributed Denial-of-Service (DDoS) attacks overwhelm the critical
resources of a target server in order to reject its services to the legitimate clients and
attack mainly on the availability in the Confidentiality Integrity Availability
(CIA) triad in Internet-based applications. In this paper, we analyze three major
components of DDoS defense mechanisms such as DDoS detection, DDoS mitigation, and IP traceback. In the first step, we need to detect all DDoS attacks using
any intrusion detection system to pinpoint the exact packet characteristics of the
attack. We classify the attack traffic based on packet characteristics. The classification can lead to mitigate an attack. Mitigation scheme uses rate limits and filters
the malicious packets. IP traceback is capable of tracing IP packets to their sources
without depending upon source address field of the IP header. IP traceback
mechanisms are used to identify true source address and to refuse spoofed IP
addresses. Finally, in this paper we proposed a novel mechanism to defend DDoS
attacks at network layer and application layer.
⋅
⋅
Keywords DDoS
Availability
Intrusion detection
Packet filtering
Rate limiting
IP spoofing
⋅
⋅
⋅
IP traceback
G. Dayanandam (✉)
ANUCET, ANU, Guntur 522510, India
e-mail: gdayanandam@gmail.com
T. V. Rao
Mangalagiri 522503, India
e-mail: tv_venkat@yahoo.com
D. Bujji Babu
QISCET, Ongole 523001, India
e-mail: bujjibict@gmail.com
S. Nalini Durga
Sri Padmavati Mahila Visvavidyalayam, Tirupati, Andhra Pradesh, India
e-mail: nalini.seeramsetti@gmail.com
© Springer Nature Singapore Pte Ltd. 2019
H. S. Saini et al. (eds.), Innovations in Computer Science and Engineering,
Lecture Notes in Networks and Systems 32,
https://doi.org/10.1007/978-981-10-8201-6_1
1
2
G. Dayanandam et al.
1 Introduction
Today, the Internet has become more admired for people and businesses to perform
tasks easily. The use of Internet in the business model is the best choice for
generating significant revenue to the individual and business organizations. At the
same time, many chances are for attackers to steal the information, disrupt the
services, or change the permissions of authorized users.
Malicious users are motive to perform illegal operations on any of the crucial
components of the security of the CIA triad [1], i.e., Confidentiality, Integrity, and
Availability.
According to Fig. 1, Confidentiality is a mechanism to protect the information
from disclosure to unauthorized users. Information plays key role in today’s world,
in most of the areas like bank account statements, personal information, credit card
number, trade secrets, government documents, and many more areas. Every human
being wishes to keep their personal information in secure manner.
Integrity means the modifications can be done by the authorized persons not by
the unauthorized one, because tampered information may lead to various losses
such as financial loss, public security….
Availability refers to providing information to authorized persons when they
need. The primary aim of DDoS attack is to make information unavailable when
authorized person looks for it.
Denial-of-Service Attack: A Denial-of-Service attack [2] is often abbreviated as
DoS attack which is a malicious attack. This type of attack is performed from one
attacker machine (host) to target machine (victim) as shown in Fig. 2. Many DoS
attacks are performed based on the weakness in the TCP/IP protocol.
Distributed Denial-of-Service Attack: A Distributed Denial-of-Service attack
[2] is also called as DDoS attack. In this attack, the victim computer receives huge
number of packets from huge number of host computers those are compromised,
which exhaust victim computer resources, such as memory, and will lead to
unavailability of data to authorized users (Fig. 3).
Fig. 1 CIA triad
DDoS Attacks—Analysis and Prevention
3
Fig. 2 Denial-of-Service attack
Fig. 3 Distributed Denial-of-Service attack
A DoS attack is different from a DDoS attack. In the DoS attack, the attacker
typically uses one computer to perform attack on victim, whereas in DDoS attack,
the attacker may use multiple computers to perform attack on victim.
This paper is organized as follows. Section 2 provides history of DDoS attacks.
Section 3 provides motivation of DDoS attacks. Section 4 gives defense against
DDoS attacks. Section 5 gives existing DDoS defense mechanisms. Proposed
DDoS defense solution is given in Sect. 6. Conclusion is given in Sect. 7.
2 History of DDoS Attacks
The first-ever DoS attack is performed in 1974 by David Dennis. The following
table shows the year-by-year DDoS attacks that were happened (Table 1).
4
G. Dayanandam et al.
Table 1 History of DDoS attacks [3, 4]
S.
no
Year of
attack
Type of attack
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
1988
1990
1990
2000
2001
2001
2002
2003
2004
2005
2006
2007
2008
2009
2009
2009
17
18
19
20
2009
2009
2009
2010
21
2011
2012
22
23
24
25
26
27
28
2013
2013
2014
2014
2014
2015
2016
Morris worm and first DDoS attack
Simple and width-based DDoS and IRC chat floods
UDP flood attack using Trinoo
Attack on Yahoo, E-bay, and Amazon
Mafiaboy gets 8 months for DDoS attacks
Code red worm attacks on Web site for US White House
DDoS flood disrupts service at nine of the 13 DNS root servers
Attack on Al-Jazeera
SCO faced DDoS attacks from more than 16 M copies of Mydoom
E-bay DDoS attack
Storm pay battling sustained DDoS attack
Estonian DDoS attacks suggest political motivation
Georgia president Web site under DDoS attack
DDoS attack hobbles sites, including Amazon
Attacks on ultra DNS, https://Register.com, The Pirate Bay
Attacks South Korean and American Web sites + Washington Post,
NYSE
Attacks on Iranian Government Web sites
Attacks on Facebook, Twitter, and Google
DDoS attacks against Russian blog
DDoS attack targets Wikileaks, Wikileaks sympathizers target master
card, Paypal, VISA
Wordpress.com attack, DDoS on CIA Web site, Operation Tunisia,
Operation Sony, Operation Syria, Operation Megaupload, Operation
Russia, Operation INDIA, Operation Japan
DDoS attacks on South Korean Web sites
Spamhaus suffered highest possible DDoS attack
Multiple gaming platform, JP Morgan Chase, Bank of America
SSDP flood
UPnP attacks
Github
Russian banks and RIO olympics
3 Motivation of DDoS Attacks
Attackers are motivated to perform DDoS attacks. There are different types of
motivation factors based on the attacker’s behavior. Motivation factors can be
classified [5] as
Financial Gain: Attackers main objective is financial gain. This type of people
is highly skilled and difficult to detect.
DDoS Attacks—Analysis and Prevention
5
Global ApplicaƟon and Network
Security Report-2011
25
TCP-SYN Flood
VOIP
DNS
HTTPS
HTTPS
ApplicaƟon(54%)
7
6
2
6
2
IPV6
9
tcp-others
13
udp
9
icmp
21
SMTP
30
25
20
15
10
5
0
Network(46%)
Fig. 4 Global application and network security report—2011 [7]
Professional Skills: Attackers who are passionate to know their vulnerability
and the strength of security mechanism.
Revenge: Attackers who are so much discouraged and low-skilled persons are
ready to tack vengeance.
Cyber Warfare: Attackers who are highly capable and knowledgeable persons
are belong to organizations of a country to defend their organizations [6].
DDoS attacks are performed over the years due to the poor preparation by the
most organizations. Latest attacks use multiple vectors in a single attack campaign
targeting multiple elements an organizations network infrastructure and its applications. Fifty-four percent of attacks are performed on application layer and 46% at
the network layer (Fig. 4).
4 Defense Against DDoS Attacks
DDoS attacks are commonly used threats on today’s network infrastructure. Up to
now, even many methods exist to defend DDoS attacks; they need to improve their
efficiency. DDoS attack mitigation is a big task, but we need to prevent such types
of attacks. This would require putting more effort to improve the security over the
organizations’ network. We can divide the mitigation of the DDoS attack into three
categories, i.e., before the attack, during the attack, and after the attack.
a. Before the Attack: As we all know that prevention is better than cure. So,
before facing the DDoS attack problem, we need to reduce the zero-day attacks,
i.e., before attacker identifies exploits, administrators of the organization taken
care of the new vulnerabilities of the same organization. So, administrators need
to identify zero-day attacks early before attackers find such vulnerabilities and
prepare patches for them to reduce the DDoS attack. Snort is a best tool to detect
DDoS attacks.
6
G. Dayanandam et al.
DDoS Attack Detection Methods: Here we want to present the literature on
existing DDoS attack detection methods. DDoS attack detection methods can be
classified into five categories [8]. They are
Statistical-based methods
Knowledge-based methods
Soft computing methods
Data mining methods
Machine learning methods
Statistical-Based Methods involve the steps of data gathering, applying some
statistical methods to the gathered data, and taking the decision of whether the data
is authorized or not. Statistical-based methods are classified into two types. They
are threshold detection and profile-based detection.
Threshold detection is based on some threshold value of some parameters. If any
one parameter value exceeds threshold value, then the intrusion is assumed.
Profile-based anomaly detection concentrates on previous behavior characteristics and then detecting significant deviations.
Knowledge-Based Methods are also called rule-based methods. These methods
involve detecting intrusions by previous knowledge of the pattern and give a pattern
of activity that is suspicious or not. Knowledge-based methods are classified into
two types. They are rule-based anomaly detection and rule-based penetration
identification.
Rule-based anomaly detection involves historical audit records and generates
automatic rules to identify useful patterns.
Rule-based penetration identification involves identifying known signatures that
would cause known weaknesses.
Soft Computing Methods involve low cost, tractable, and robust computing in
the presence of uncertainty. There are two types of soft computing techniques. They
are artificial neural networks (ANNs) and support vector machines (SVMs).
ANN methods are used to develop new nonlinear systems accepting large
number of input and output and their relationship.
SVM methods are used to classify the data based on their relationship between
independent variables and target variables.
Data Mining Methods detect patterns in large amounts of data and use these
patterns to detect future instances in similar data. They have lesser true positive
rates than signature-based methods. These systems are more complex.
Machine Learning Methods include latest statistical methods for classification
and regression techniques. These methods include GLM, GBM, Random Forest and
Neural networks.
Firewall is placed before our private network which guards from all types of
attacks that are initiated through Internet.
b. During the Attack: It is very difficult to stop DDoS attack during attack period.
We require cooperation between the organization and the upstream routers. So,
DDoS Attacks—Analysis and Prevention
7
we need to implement some mechanism at router level to reduce the effect of
DDoS attack.
c. After the Attack: After identifying the attack, the intrusion response team
gathers data and is capable of identifying the type of attack being carried out.
Sources of DDoS attack networks can be identified by analyzing the gathered
data. In future, we can stop the packets that are received from identified DDoS
attack networks. DDoS attacks are performed on the basis of weakness in TCP/
IP architecture. Even though we protect our network from DDoS attacks, we
cannot stop the attacks from the bots in the Internet. Up to now, there is no
single solution that can solve all types of DDoS attacks efficiently.
DDoS attacks can be defended in three responsive steps. They are DDoS attack
detection, DDoS mitigation, and IP traceback. In first step, we need to detect all
DDoS attacks using any intrusion detection system to pinpoint the exact packet
characteristics of the attack. This classification can then lead to an attack mitigation
scheme that rate limits or filters the malicious packets. IP traceback scheme is
concurrently performed while attack mitigation takes place. Using this, we will find
true source of the packets and avoid IP spoofing attacks.
5 Existing DDoS Defense Mechanisms
Ingress/Egress Filtering [9, 10]: By using this method, it is very difficult for
attackers to perform DDoS attacks using IP spoofing mechanisms. Firewall is a
better solution to stop IP spoofing attacks. Firewall applies ingress filtering to filter
the inward traffic and egress filtering to filter outward traffic. If we implement
ingress/egress filtering using firewall, we can stop DDoS attacks effectively against
IP spoofing attacks.
IP traceback mechanisms: IP traceback is the process of tracking the true sources
of the forged IP packets. E. Y. Chen and A. Yonezawa [11] proposed DDoS attack
countermeasure in three stages. In the detection stage, they performed two threshold
tests to look for deviation increase in traffic rate. In the segregation stage, they
found protocol used for attack and then formulate number of strategies to help us to
create accumulate filter rules that can effectively segregate attack traffic from
authorized traffic. Finally, they proposed the mitigation of DDoS attack by blocking
the malicious traffic at upstream and kill the zombies if possible. Yang. X and W.
Zhou [12] proposed flexible deterministic packet marking (FDPM) to perform a
large-scale IP traceback to defend against DDoS attacks.
Rate limiting mechanisms: Rate limiting mechanisms only limit the malicious
packets but not legitimate packets. Researchers proposed various rate limiting
mechanisms in [13–17] by noticing an asymmetry between the packets travels to
and from a network.
8
G. Dayanandam et al.
IP blacklisting and IP rate control methods [18] are also used to mitigate DDoS
attacks. In IP rate control mechanisms, rate control controls the no. of requests per
IP address and blocks additional request when one of a set of thresholds is executed.
6 Proposed DDoS Defense Solution
DDoS defense mechanism is used to monitor, manage, and mitigate the impacts of
these types of malicious DDoS attacks. We identified the attack machines and
stopped the attack using access control list, system log, modular policy framework,
and resource limiting. We can pass authorized data to server by placing firewall
before the server to detect and prevent the DDoS attacks (Fig. 5).
Here we used access control list (ACL) to control all types of attacks. By using
ACLs, we block unnecessary data in real time. We allowed only Web applications
and denied other applications by using ACL commands. System log is used to
analyze the incoming data to particular target. Modular policy framework rules are
basic requirement for organizations. Attackers use more number of sessions per
second, whereas normal user need not use too many sessions per second. So we
allow only limited sessions to reduce attacker traffic by the firewall. In our
approach, MPF and ACLs are used to detect and prevent network- and
application-level attacks. Firewall not allows any traffic without matching the
conditions. We can defend the attacker traffic by placing a firewall before the server.
Fig. 5 Architecture for implementing novel method for prevention of bandwidth DDoS attacks
DDoS Attacks—Analysis and Prevention
9
7 Conclusion
The success rate of the security of an organization depends on how it copes with
DDoS attacks. We defended the DDoS attacks with implementing a firewall.
Firewall may go down if attack traffic increased rapidly. If an organization is
targeted by DDoS attack, the organization may suffer from financial loss, reputation
damage, revenge, and cyber warfare due to lack of proper defense mechanisms.
When traffic rapidly increases, in future, the DDoS attacks can be defended with
implementing Intrusion Detection System (IDS) or Intrusion Prevention System
(IPS) along with firewall.
References
1.
2.
3.
4.
5.
6.
7.
8.
9.
10.
11.
12.
13.
14.
15.
http://whatis.techtarget.com/definition/Confidentiality-integrity-and-availability-CIA.
http://www.omnisecu.com/ccnasecurity/types-of-network-attacks.php.
https://security.radware.com/…/DDoS_Handbook/DDoS_Handbook.pdf.
ShwetaTripathi, Brij Gupta, Ammar Almomani, Anupama Mishra, Suresh Veluru, Hadoop
Based Defense Solution to Handle Distributed Denial of Service (DDoS) Attacks”, Journal of
Information Security, 2013, 4, 150–164.
A. ALmomani, T.-C. Wan, B. B. Gupta, A. Altaher, E. A. Lmomani and S. Ramadass, “A
Survey of Phishing Email Filtering Techniques,” IEEE Communications Surveys & Tutorials,
Vol. PP, No. 99, 2013, pp. 1–21.
S. Zargar, J. Joshi and D. Tipper, “A Survey of Defense Mechanisms against Distributed
Denial of Service (DDoS) Flooding Attacks,” Communications Surveys & Tutorials, IEEE,
Vol. PP, No. 99, 2013, pp. 1–24. https://doi.org/10.1109/surv.2013.031413.001272011.
Global Application & Network Security Report: https://security.radware.com/WorkArea/
DownloadAsset.aspx?id=795.
Monowar H. Bhuyan, H. J. Kashyap, D. K. Bhattacharyya and J. K. Kalita, “Detecting
Distributed Denial of Service Attacks: Methods, Tools and Future Directions”, The computer
Journal, 57 (4), 537–556.
P. Ferguson et al. RFC 2267. Network Ingress Filtering: Defeating Denial of Service Attacks
which employ IP Source Address Spoofing. Technical report, The Internet Society, 1998.
SANS Institute. Egress filtering v 0.2, 2000. http://www.sans.org/y2k/egress.htm.
Eric Y. Chen* + and Akinori Yonezawa, “Practical Techniques for Defending against DDoS
Attacks”, 2005 IEEE.
“Yang Xiang and Wanlei Zhou,” A Defense System Against DDoS Attacks by Large-Scale IP
Traceback”, 2005 IEEE.
MULTOPS: a data-structure for bandwidth attack detection. Thomer M. Gil, Massimiliano
Poletto. In the Proceedings of the 10th USENIX Security Symposium, Washington D.C.,
August 2001.
Vern Paxson, Steve Bellovin, Sally Floyd and Ratul Mahajan. Controlling high bandwidth
aggregates in the network. Technical report.
Jelena Mirkovic, Peter Reiher, Gregory Prier. Attacking DDoS at the source. International
Conference on Network protocols, 2002.
10
G. Dayanandam et al.
16. David Yau, John C. S. Lui, Feng Liang. Defending against distributed denial of service
attacks using max-min fair server centric router throttles. IEEE international conference on
Quality of Service. 2002.
17. Vern Paxson, Steve Bellovin, John Ioannidis, Kireete Kompella, Sally Floyd and Ratul
Mahajan. Pushback messages for controlling high bandwidth aggregates in the network.
Internet Draft, work in progress.
18. https://www.nginx.com/blog/mitigating-ddos-attacks-with-nginx-and-nginx-plus/.
Download