Defending against distributed denial-of-service attacks with max-min fair server-centric router throttles

被引:122
|
作者
Yau, DKY [1 ]
Lui, JCS
Liang, F
Yam, Y
机构
[1] Purdue Univ, Dept Comp Sci, W Lafayette, IN 47907 USA
[2] Chinese Univ Hong Kong, Dept Comp Sci & Engn, Shatin, Hong Kong, Peoples R China
[3] Zhejiang Univ Technol, Dept Telecommun, Zhejiang, Peoples R China
[4] Chinese Univ Hong Kong, Dept Automat & Comp Aided Engn, Shatin, Hong Kong, Peoples R China
基金
美国国家科学基金会;
关键词
congestion control; distributed denial of service; network security; router throttling;
D O I
10.1109/TNET.2004.842221
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Our work targets a network architecture and accompanying algorithms for countering distributed denial-of-service (DDoS) attacks directed at an Internet server. The basic mechanism is for a server under stress to install a router throttle at selected upstream routers. The throttle can be the leaky-bucket rate at which a router can forward packets destined for the server. Hence, before aggressive packets can converge to overwhelm the server, participating routers proactively regulate the contributing packet rates to more moderate levels, thus forestalling an impending attack. In allocating the server capacity among the routers, we propose a. notion of level-k max-min fairness. We first present a control-theoretic model to evaluate algorithm convergence under a varitey of system parameters. In addition, we present packet network simulation results using a realistic global network topology, and various models of good user and attacker distributions and behavior. Using a generator model of web requests parameterized by empirical data, we also evaluate the impact of throttling in protecting user access to a web server. First, for aggressive attackers, the throttle mechanism is highly effective in preferentially dropping attacker traffic over good user traffic. In particular, level-k max-min fairness gives better good-user protection than recursive pushback of max-min fair rate limits proposed in the literature. Second, throttling can regulate the experienced server load to below its design limit - in the presence of user dynamics - so that the server can remain operational during a DDoS attack. Lastly, we present implementation results of our prototype on a Pentium III/866 MHz machine. The results show that router throttling has low deployment overhead in time and memory.
引用
收藏
页码:29 / 42
页数:14
相关论文
共 33 条
  • [1] Defending against distributed denial-of-service attacks with max-min fair server-centric router throttles
    Yau, DKY
    Lui, JCS
    Liang, F
    [J]. 2002 TENTH IEEE INTERNATIONAL WORKSHOP ON QUALITY OF SERVICE, 2002, : 35 - 44
  • [2] Using adaptive router throttles against distributed denial-of-service attacks
    Liang, Feng
    Yau, David
    [J]. Ruan Jian Xue Bao/Journal of Software, 2002, 13 (07): : 1220 - 1227
  • [3] IDR: An intrusion detection router for defending against Distributed Denial-of-Service (DDoS) attacks
    Chan, EYK
    Chan, HW
    Chan, KM
    Chan, VPS
    Chanson, ST
    Cheung, MMH
    Chong, CF
    Chow, KP
    Hui, AKT
    Hui, LCK
    Lam, LCK
    Lau, WC
    Pun, KKH
    Tsang, AYF
    Tsang, WW
    Tso, SCW
    Yeung, DY
    Yu, KY
    [J]. I-SPAN 2004: 7TH INTERNATIONAL SYMPOSIUM ON PARALLEL ARCHITECTURES, ALGORITHMS AND NETWORKS, PROCEEDINGS, 2004, : 581 - 586
  • [4] Defending against denial-of-service attacks with puzzle auctions
    Wang, XF
    Reiter, MK
    [J]. 2003 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 2003, : 78 - 92
  • [5] Defending against flooding-based distributed denial-of-service attacks: A tutorial
    Chang, RKC
    [J]. IEEE COMMUNICATIONS MAGAZINE, 2002, 40 (10) : 42 - 51
  • [6] Distributed defense against distributed denial-of-service attacks
    Shi, W
    Xiang, Y
    Zhou, WL
    [J]. DISTRIBUTED AND PARALLEL COMPUTING, 2005, 3719 : 357 - 362
  • [7] Method research for defending against distributed denial-of-service attacks based on dynamic game theory
    Zhang, Shao-Jun
    Li, Jian-Hua
    Chen, Xiu-Zhen
    Hu, Wei
    [J]. Shanghai Jiaotong Daxue Xuebao/Journal of Shanghai Jiaotong University, 2008, 42 (02): : 198 - 201
  • [8] Modeling and Defending Advanced Metering Infrastructure Subjected to Distributed Denial-of-Service Attacks
    Zhang, Chunming
    Luo, Fengji
    Sun, Mingyang
    Ranzi, Gianluca
    [J]. IEEE TRANSACTIONS ON NETWORK SCIENCE AND ENGINEERING, 2021, 8 (03): : 2106 - 2117
  • [9] Defending against Distributed Denial of Service Attacks: Issues and Challenges
    Gupta, B. B.
    Joshi, R. C.
    Misra, Manoj
    [J]. INFORMATION SECURITY JOURNAL, 2009, 18 (05): : 224 - 247
  • [10] Distributed denial-of-service attacks against HTTP/2 services
    Erwin Adi
    Zubair A. Baig
    Philip Hingston
    Chiou-Peng Lam
    [J]. Cluster Computing, 2016, 19 : 79 - 86