Abstract
We propose a DDoS mitigation architecture that protects legitimate traffic from the large volume of malicious packets during a DDoS bandwidth attack. The system keeps a legitimacy list and gives higher priority to those packets that are on the list. The legitimacy list is kept up to date by keeping only the entries that complete the TCP three-way handshake and thus defeats IP spoofing. Entries in the list contain the IP address and the path signature of active TCP connections. A packet obtains high priority if its path signature strongly correlates with the corresponding path signature stored in the legitimacy list. We show that the scheme is efficient when deployed incrementally by using priority queuing at perimeter routers. An autonomous system (AS) can immediately benefit from our proposed system when deployed even if other ASs do not deploy it.
Keywords
- Path Signature
- Intermediate Router
- Attack Packet
- Legitimate Client
- Legitimate Traffic
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.
This is a preview of subscription content, access via your institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsPreview
Unable to display preview. Download preview PDF.
References
T. Anderson, T. Roscoe, and D. Wetherall. Preventing internet denial of service with capabilities. SIGCOMM Comput. Commun. Rev., 34(1):39–44, 2004.
Configuring TCP Intercept, Cisco IOS Security Configuration Guide http://www.cisco.com/univercd/cc/td/doc/product/software/ios122/122cgcr/fsecur c/.
Michael Collins and Michael K. Reiter. An empirical analysis of targetresident DoS filters. In IEEE Symp. on Secur. and Priv., 2004.
D. Dean, M. Franklin, and A. Stubblefield. An algebraic approach to IP traceback. ACM Trans. Inf. Syst. Secur., 5(2):119–137, 2002.
Hikmat Farhat. Protecting TCP services from denial of service attacks. In LSAD ’06: Proceedings of the 2006 SIGCOMM workshop on Large-scale attack defense, pages 155–160, 2006.
P. Ferguson and D. Senie. Network ingress filtering: Defeating denial of service attacks which employ IP source address spoofing. RFC 2827, 2000.
C. Jin, H. Wang, and K. G. Shin. Hop-count filtering: an effective defense against spoofed DDoS traffic. In 10th ACM Conference on Computer and Communications security, pages 30–41, 2003.
J. Jung, B. Krishnamurthy, and M. Rabinovich. Flash crowds and denial of service attacks: characterization and implications for cdns and web sites. In 11th international conference on World Wide Web, pages 293–304, 2002.
J. Li, J. Mirkovic, M. Wang, P. Reiher, and L. Zhang. Save: source address validity enforcement protocol. In Proceedings of IEEE INFOCOMM, 2001.
D. Moore, G. Voelker, and S. Savage. Inferring internet denial of service activity. In Proceedings of the 10 th USENIX Security Symposium, 2001.
K. Park and H. Lee. On the effectiveness of route-based packet filtering for distributed DoS attack prevention in power-law internets. In SIGCOMM ’01:Proceedings of the 2001 SIGCOMM conference, pages 15–26, 2001.
S. Savage, D. Wetherall, A. Karlin, and T. Anderson. Network support for IP traceback. IEEE/ACM Trans. Netw., 9(3):226–237, 2001.
CAIDA’s skitter initiative, http://www.caida.org.
A. Snoeren, C. Partridge, L. A. Sanchez, C. E. Jones, F. Tchakountio, B. Schwartz, S. T. Kent, and W. T. Strayer. Single-packet IP traceback. IEEE/ACM Trans. Netw., 10(6):721–734, 2002.
D. Song and A. Perrig. Advanced and authenticated marking schemes for IP traceback. In Proceedings of IEEE INFOCOMM., 2001.
M. Sung and J. Xu. IP traceback-based intelligent packet filtering: In the 10 th IEEE International Conference on Network Protocols, 2002.
D.J. Bernstein, http://cr.yp.com/syncookies.html.
Haining Wang, Danlu Zhang, and Kang G. Shin. Change-point monitoring for the detection of DoS attacks. IEEE Trans. Dep. Sec. Comput., 2004.
Y. Xiang, Y. Lin, W. L. Lei, and S.J. Huang. Detecting DDoS attack based on network self-similarity. In Communications,2004.
J. Xu and W. Lee. Sustaining availability of web services under distributed denial of service attacks. IEEE Trans. Comput., 52(2):195–208, 2003.
A. Yaar, A. Perrig, and D. Song. Pi: a path identification mechanism to defend against DDoS attacks. In IEEE Symp. on Secur. and Priv.., 2003.
A. Yaar, A. Perrig, and D. Song. SIFF: A stateless internet flow filter to mitigate DDoS flooding attacks. InIEEE Symp. on Secur. and Priv., 2004.
A. Yaar, A. Perrig, and D. Song. FIT: Fast Internet traceback. In Proceedings of IEEE INFOCOMM, 2005.
K. Argyraki and D. Cheriton. Network Capabilities: The good, the bad and the ugly. In HotNets-IV: The Fourth Workshop on Host Topics in Networks, 2005.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2007 Springer
About this paper
Cite this paper
Farhat, H. (2007). ITS: A DDoS Mitigating Architecture. In: Sobh, T. (eds) Innovations and Advanced Techniques in Computer and Information Sciences and Engineering. Springer, Dordrecht. https://doi.org/10.1007/978-1-4020-6268-1_94
Download citation
DOI: https://doi.org/10.1007/978-1-4020-6268-1_94
Publisher Name: Springer, Dordrecht
Print ISBN: 978-1-4020-6267-4
Online ISBN: 978-1-4020-6268-1
eBook Packages: EngineeringEngineering (R0)
