Sie sind auf Seite 1von 6

2008 Second International Conference on Future Generation Communication and Networking

Joint application and network defense against DDoS


flooding attacks in the future Internet
Roger P. Karrer Ulrich Kuehn Thomas Huehn
Deutsche Telekom Laboratories Sirrix AG Deutsche Telekom Laboratories
TU Berlin, Germany Bochum, Germany TU Berlin, Germany
roger.karrer@telekom.de ukuehn@acm.org thomas@net.t-labs.tu-berlin.de

Abstract— The threat of Denial of Service flooding attacks in and improved, attackers had to find new ways to defy these
the Internet is rapidly increasing. Especially the use of techniques mechanisms. As a result, modern DoS attacks are typically
that allow attackers to hide their attack traffic raises concerns: originating from large botnets, launching a Distributed Denial
attack distribution and rotation in botnets to obfuscate senders,
low-rate bandwidth attacks, and attacks that mimic realistic of Service (DDoS) that overwhelms the resources. Moreover,
patterns such as flash crowds. The defense against such attacks the attack pattern aims at creating either non-suspicious traffic
is limited due to a deadlock: the attacks must be stopped inside patterns, such as mimicking high-rate legitimate user traffic
the network, but the network is unable to distinguish legitimate (e.g. flash crowds), or to create low-rate attacks like the
and unsolicited traffic. In contrast, end systems may distinguish Shrew attack [7] that exploit protocol-specific weaknesses. As
legitimate users from bots, but are unable to stop the attacks
inside the network. This paper advocates for a joint end system a result, modern DDoS attacks are sophisticated and therefore
- network defense to address such attacks in the future. Edge- virtually undetectable by a defender.
based Capabilities (EC) is a novel framework that combines end- Given these threats, we argue that we must address the root
to-end authentication with network-based control. Applications cause of the DDoS attacks, not try to find yet another clutch -
authenticate legitimate senders and issue capabilities to tag their and the root cause lies in the design principles of the Internet:
packets, and the network filters out untagged packets. This paper
describes the mechanisms that make EC a secure, efficient, and trust and end-to-end control. But what alternative principles
scalable solution. Moreover, we argue that EC is an attractive could be defined? Simply turning by 180 degrees and claiming
solution because it can be incrementally deployed and because it that (i) all end users are by default untrusted and (ii) resource
provides the right incentives to users, servers, and ISPs. control should be controlled by the network does not seem to
be an appealing solution either: now all control is given to the
I. I NTRODUCTION network, and all users would permanently be required to proof
The Internet has been built on several design goals and their identity and confirm their non-abusive behavior.
principles [2], among them that (i) all parties can be trusted Thus, we argue that in a future network, a joint control must
and (ii) the end-to-end argument. This argument advocates for be established between end users and the network to defy those
placing functionality at the end systems rather than into the DDoS attacks that target networking resources, i.e. flooding
network. The combination of these two principles has resulted attacks on links and routers. A joint control might even solve
in a purely end-user control over the end-to-end resources, of one of the biggest dilemmas in today’s DDoS flooding attacks:
which TCP implements the concept of sharing the resources. the attacks occur inside the network and thus a mechanism
Unfortunately, a plethora of end systems emerged who can no must contain and limit the attack traffic - but how can the
longer be trusted and who deliberately abuse the power over network distinguish legitimate from unsolicited packets? In
resource control. One of these results are Denial of Service fact, all a router sees is IP packets. It has no knowledge
(DoS) attacks. of the sender, its legitimacy. In contrast, the application has
DoS attacks today are a severe threat to the Internet. A the potential to make the distinction between legitimate and
study estimated that a massive attack on critical Internet unsolicited users, but has no chance to defy the attack because
elements for one week will produce an economic damage it occurs inside the network, i.e. before the packets reach the
on an entire national economy of 5.83 billion Swiss Franc, client.
or 1.2% of the GDP 1 . Even though a recent survey on This paper proposes Edge-based Capabilities (EC), a frame-
DoS attacks [8] shows that DoS attacks may take different work that provides the basic mechanisms for a joint application
forms, target different resources and be launched at different and network defense. EC provides abstractions and protocols
levels, we notice one particular trend in the history of DoS that cryptographically tag legitimate traffic and control the
attacks: that towards stealthy attacks. Originally, DoS attacks behavior and resource consumption of non-tagged and wrongly
were brute force attacks, launched from a single machine. As tagged traffic. Senders in EC can generate tags when they
defense mechanisms against such attacks were put in place obtain a permission to send (a capability [1], in our case a
cryptographic key) from the intended receiver. At the network
1 source: www.mi2g.com edge, a network element termed gate enforces that only tagged

978-0-7695-3431-2/08 $25.00 © 2008 IEEE 11


DOI 10.1109/FGCN.2008.168

Authorized licensed use limited to: VELLORE INSTITUTE OF TECHNOLOGY. Downloaded on July 09,2010 at 09:50:55 UTC from IEEE Xplore. Restrictions apply.
traffic is forwarded directly, whereas untagged or wrongly- zombies
tagged traffic is treated as potentially malicious traffic. The core
gate therefore creates a differentiation that prioritizes legiti- network service
mate traffic. denied
The contributions of this paper are three-fold. First, we
develop the EC framework. The main challenge is to derive a
distributed mechanism for a secure and efficient information
legitimate
client edge
X target server
network
exchange among gates, senders, and receivers to identify,
tag and control legitimate traffic. This paper defines the key
building blocks upon which a joint control can be built. Being zombies
a framework that emphasizes design reuse, we show how
currently known protocols and solutions, such as CAPTCHAs, Fig. 1. DDoS attack on an access network.
can be integrated into EC.
Second, we discuss the relationship between the need to
find a technically sound solution to defy DDoS attacks on one to counter the attack because it has no influence on the access
hand and the deployability on the other. We show that EC link.
(i) aligns the deployment cost with benefit and control, (ii) is To counter modern flooding attacks on the network infras-
deployable by a single ISP (i.e. does not need collaboration tructure, the following challenges have to be addressed:
with other ISPs and/or all end systems), and (iii) does not • Identification: Unsolicited traffic must be reliably identi-

shut out users that do not participate in EC. We argue that fied inside the network.
these incentives make EC an appealing solution, in contrast to • DDoS mitigation: Unsolicited traffic must be isolated and

previous proposals, such as IP traceback systems [9], [11], that filtered out.
never got deployed in reality because they lacked the above • Efficiency: The overhead of identifying and filtering traf-

incentives. fic must be negligible. It must not depend on the number


Finally, we briefly assess the effectiveness of EC in a local of flows.
testbed with a linux-based implementation. • Technical deployability: The solution must be easily,

This paper is organized as follows. Section II gives an readily and partially deployable. Changes in protocols
overview of unsolicited traffic and the concept of EC. Sec- (e.g. TCP), architectural changes (e.g. modifications in In-
tion III provides details on the EC architecture and discusses ternet routers), or collaborations of multiple entities (e.g.,
the deployment benefits, in particular the incentives to all multiple ISPs) should be avoided. Necessary changes
parties. Next, we briefly highlight the effectiveness of EC should be coupled with incentives.
using a Linux-based implementation of EC in a local testbed • Economic incentives: The solution must have a direct

in Section IV. Then, after comparing EC against related work benefit for all involved parties.
in Section V, Section VI concludes the paper.
III. EC A RCHITECTURE
II. BACKGROUND Our approach to confine and mitigate the effects of DDoS
We consider the frequently occurring DDoS attacks from attacks, termed edge-based capabilities (EC), leverages and
botnets onto a single target as depicted in Figure 1. The combines the strengths of end-to-end authentication and net-
coordinated attack traffic converges in the access network of work-based packet control mechanisms.
the aggregated traffic overwhelms the bottleneck link there.
Due to the overload, legitimate packets are unable to reach A. Overview
the destination. Thus, the service of the server is denied to EC introduces a network element termed gate, as depicted
legitimate users. This denial is devastating for servers that offer in Figure 2. The gate protects the server-side bottleneck
online transactions, such as banks, travel agencies. from flooding attacks by filtering unsolicited traffic. To define
These DDoS attacks are hard to defend against for four legitimate traffic, the receiver (or simply “server”) issues a
reasons. First, the capacity of the access link is several orders capability to those senders (“clients”) that are considered
of magnitude lower than that of the core links. The access link legitimate. These capabilities contain keys that allows the
is therefore a ”natural” bottleneck. Second, today’s BotNets clients to produce cryptographic tags that are included in every
may be as large as a million zombies. Each bot can send traffic packet. The gate verifies the tags and forwards only success-
at an unsuspiciously low rate. Third, modern DDoS attacks are fully verified packets, or gives legitimate packets priority over
by far more sophisticated than initial attacks. Modern low-rate untagged packets.
DoS attacks, such as the Shrew [7] attack, exploit protocol Gate, server, and client must share the key to tag pack-
properties to reduce the sending rate. Other attacks disguise ets and to verify the tags. For this purpose, EC requires
the attack traffic by mimicking e.g. flash crowds [5]. This secure protocols and key management procedures with high
sophistication adds to the difficulties in detecting attack traffic. performance and scalability. Moreover, a secure information
Finally, the server or user behind the access link has no means exchange among the three components is needed.

12

Authorized licensed use limited to: VELLORE INSTITUTE OF TECHNOLOGY. Downloaded on July 09,2010 at 09:50:55 UTC from IEEE Xplore. Restrictions apply.
to meet application- or scenarios-specific requirements or to
trade off security and efficiency.

B. Keying Scheme
The keying scheme defines how cryptographic keys are
derived, managed, and used at the gate, the server, and
the client. We propose a three-level key hierarchy for EC,
corresponding to the trust hierarchy of the component’s roles
outlined above. The root of the key hierarchy is the master
or gate key kG , which is kept secret at the gate and is never
Fig. 2. EC components and their interactions. conveyed to the outside.
Second level keys are server keys derived from the gate
key at the gate. This derivation can include server-specific
For the following exposition we make a set of assumptions information, such as the IP address of server S, denoted as
but will discuss how to relax them in Section III-E. First, IP(S). Thus, using a secure keyed one-way function kdf 1 we
we assume that the gate possesses sufficient processing power compute kS ← kdf 1 (kG , IP(S)). This prevents a malicious
to avoid becoming a bottleneck itself, i.e., its resources must server from obtaining the gate key. The communication of
exceed the link capacities of both links (to the core and to server keys from the gate to the respective servers is done us-
the server respectively). Second, we limit the exhibition to ing a secure channel, e.g. protected by transport-layer security
the case of protecting access networks against traffic from (TLS). Server keys are never revealed to any third party.
the core. However, our solution can also be applied in the Third-level client keys or tagging keys are derived from
reverse direction, e.g. to prevent traffic from leaving the access the corresponding server key based on session-specific in-
network. Third, we assume that only one path exists between formation. Using a secure keyed one-way function kdf 2 we
the gate and an associated server. That is, all traffic towards compute the tagging key as kT ← kdf 2 (kS , IP(C), IP(S)),
a server flows exactly through one gate. This assumption can where IP(C) denotes the client’s IP address. Here a malicious
be ensured by placing the gate close to the server. client is prevented from obtaining the server key. The server
The first challenge, i.e. secure information exchange, re- transmits kT to the client.
quires an identification of the roles of each component. The The design of the keying scheme has three important
gate, server, and client are likely to belong to different properties. First, the hierarchy is based and maintained using
administrative domains - so who is considered trustworthy symmetric cryptographic methods, and does not resort to
in the information exchange? The gate is the most crucial a PKI. Thus it is very light-weight regarding performance
component in EC. It is therefore the most trusted entity, as impact.
it offers the service to control and block traffic. We decided Second, the trust-based three-level hierarchy ensures that the
to build the information exchange around the gate. Servers least trusted components receive the most specific keys, i.e.
are semi-trusted: they usually can be trusted, but there is the tagging keys are valid for exactly one client-server pair.
no guarantee. Moreover, servers are directly in touch with Further, the scheme provides key separation, it does not allow
potentially malicious clients and are therefore easier subject to to compute other client’s keys from one’s own client key, and
compromise. Finally, clients are only minimally trusted. This likewise for server keys. If a server key is compromised and
trust model is also reflected in the key management discussed an attack is launched, the gate may choose to filter all packets
below, where the gate is the logical center of a hierarchy of targeted to that server to ensure that at least other servers
cryptographic keys. attached to the same access network continue their service.
For solving the second challenge, designing efficient and Third, EC allows a stateless gate and key separation, i.e. all
scalable protocols and procedures, we break the communica- lower-level keys can be derived from the the central master
tion and computation in EC into three architectural building key kG on demand. Therefore, the keying scheme scales to an
blocks: arbitrary number of servers and clients. To reduce per-packet
• Keying scheme: defines how cryptographic keys are de- calculations, keys may be cached at the gate.
rived, managed, and used at the gate, the server, and the Finally, an ISP that installs a gate should protect the gate
client. as efficiently as possible. The gate itself can be deployed
• Tagging scheme: defines how tags are computed and as a separate entity that does not need to be visible to the
verified given a cryptographic key. traffic. Gate manipulations, including server management, can
• Key transport scheme: specifies how the keys are ex- be restricted to a single machine that runs within the same ISP
changed among gate, server, and client. network. The ability to control the root of the keying hierarchy
In the remainder of this section, we describe a possible is also coupled to the main incentives behind EC. Therefore,
implementation for these blocks. Note, however, that these maintaining control at the gate is important to react to potential
schemes and their parameters can be customized and extended break-ins.

13

Authorized licensed use limited to: VELLORE INSTITUTE OF TECHNOLOGY. Downloaded on July 09,2010 at 09:50:55 UTC from IEEE Xplore. Restrictions apply.
C. Tagging Scheme For the communication between the gate and the server,
The tagging scheme describes how the tag for a packet is EC requires that each server registers itself at the gate or
computed given the cryptographic key kT and how the tag the ISP, respectively, typically on the basis of a contractual
is verified at the gate. It is the protocol part of EC that is relationship. The server key is then transmitted to the server
prominently visible on the IP layer. The main challenge here over a secure connection. Key updates can be made at regular
is to prevent an adversary from forging tags based on observed intervals and/or on demand.
correct tags, or even recovering a tagging key. Moreover, the The key exchange between server and client for the crypto-
tag verification must be scalable, i.e. not have a severe impact graphic tagging key kT must ensure that only legitimate users
on gate performance even when a large number of concurrent are able to easily obtain the tagging key. The definition of a
flows passes through the gate. legitimate client depends on the scenario or the application
To fulfill these requirements, EC employs a cryptographi- preferences. Therefore, EC provides a framework that defines
cally secure message authentication code (MAC) to authen- the basic key exchange, but allows a customization towards the
ticate certain header fields of the packet. Formally, a MAC scenario. In particular, the application defines which clients are
scheme is a pair of (possibly) randomized algorithms Mac : considered legitimate and how they have to prove their legit-
{0, 1}k × {0, 1}∗ → {0, 1}t for tagging and Ver : {0, 1}k × imacy. Here, we describe a potential implementation of a key
{0, 1}∗ × {0, 1}t → {0, 1} verification with parameters k and transport scheme between server and client that authenticates
t for key and tag lengths. a human, but otherwise anonymous user. This scheme makes
The data of a packet P that is included in the tag compu- use of differential workfactors.
tation and verification consists of the tuples2 We cannot rely on the usual means of cryptographic authen-
tication, as the user might be a first-time user. Nevertheless,
Mhdr (P ) ← (IPsrc (P ), IPdst (P ), Len(P ), Ident(P )) (1) we must be able to distinguish a human from a machine
operating without a human user and might be part of a BotNet,
from the IP header, and for a TCP packet we additionally perpetrating a DDoS attack.
include A popular end-to-end authentication for this purpose are
Mtcp (P ) ← (Portsrc (P ), Portdst (P ), Seq(P ), Ack(P )) (2) CAPTCHAs [10]. CAPTCHAs are designed to distinguish
humans from bots by AI problems that are easy to solve
(or Mtcp (P ) ← () for non-TCP packets) to set up the input for humans but are hard to solve with computational means
to the tagging and verification operations as only. Besides this primary use, we additionally transport
information to a human via the CAPTCHA.
M (P ) ← (Mhdr (P ), Mtcp (P )). (3) Unfortunately, CAPTCHAs have the drawback of annoying
The maximal total size of M (P ) is 192 bits. Now the tag the user, in particular if the string to be entered is too long. We
handling is as follows: therefore propose a method of combining CAPTCHAs with
a variant of client puzzles [3]. This method requires only a
Client:The client tries to retrieve the tagging key kT from
low-entropy input from the CAPTCHA, but still allows good
its internal key storage for each packet P it sends to
strength against bots. We see this as a reasonable trade-off
the server S. If no key is available, the packet is sent
between user annoyance and authentication strength.
untagged. Otherwise the client computes τ (P ) ←
On a high level, the combination works as follows. A client
Mac(k, M (P )) and includes τ (P ) in P .
puzzle works by requiring the client to invert a one-way
Gate: For each packet P , the gate maintains a la-
function, e.g. finding the input that hashes to a given value,
bel λ(P ) ∈ {Untagged, Invalid, Valid} for further
and can thus be scaled very easily. Our method now places
queuing decisions: if a packet P is not tagged
part of the solution into a CAPTCHA, so that the human that
λ(P ) ← Untagged. In contrast, if P carries a
can solve the CAPTCHA does actually help his/her machine
tag, the gate obtains kT from its keying subsystem
to faster solve the puzzle. On the other hand, the puzzle can
using (IPsrc (P ), IPdst (P )). The gate extracts the
be scaled in such a way that BotNets are prevented from
(alleged) tag τ ′ (P ) and M (P ), computes b ←
discovering solutions automatically at a large scale.
Ver(k, M (P ), τ ′ (P )), and sets λ accordingly. Based
The key point here is that the client puzzle allows that the
on the label, the gate decides whether the packet
whole scheme can be adapted to compensate for increased
should be forwarded with high or low priority, or
processing speed due to general technical development, so that
dropped entirely.
the rather short user input from the CAPTCHA can make a
D. Key Transport Scheme real difference.
The key transport scheme defines how the cryptographic E. Discussion
keys are exchanged between gate and server resp. server and The cryptographic tagging – packet-specific tags computed
client. from a client-server-specific key – binds packet header infor-
2 This is IPv4-specific. Changes for IPv6 are straight-forward, with the flow mation to the corresponding tagging key. This binding pre-
identifier instead of the ident field. vents adversaries from including correct tags in packets with

14

Authorized licensed use limited to: VELLORE INSTITUTE OF TECHNOLOGY. Downloaded on July 09,2010 at 09:50:55 UTC from IEEE Xplore. Restrictions apply.
arbitrary IP addresses (without knowing the corresponding react to a DDoS attack. Server providers have the incentive
key). Nevertheless, attackers can still eavesdrop on packets to to participate in EC because they receive protection from
obtain IP headers with matching tags, and use them in spoofed the gate and because they receive higher priority from the
packets (replay attacks). However, replay attacks with EC gate during a DDoS attack if their traffic is tagged. Finally,
create pathological traffic patterns that can be easily detected clients also have the incentive to participate by receiving a
and isolated at the gate. Thus the success potential is low. A higher priority. However, the participation is not mandatory
similar argument applies to the case that any client misbehaves for servers or clients - their traffic just receives lower priority.
(e.g. after being corrupted by an attacker) and sends large Another incentive for ISPs is the business opportunity by
amounts of data streams towards the server: the gate can selling the protection to server providers. By installing and
mitigate the attack by blocking the single client and/or re-issue controlling a gate, they can offer a protection that can not be
new server keys. implemented at the end systems.
The keying scheme of EC is stateless to provide scalability.
However, a stateful keying scheme that generates new random IV. E VALUATION
keys for each new flow is an alternative design option. A We implemented a proof-of-concept prototype of edge-base
stateful scheme eliminates the need for gate and server keys, capabilities to assess the efficiency and scalability of EC
but requires that per-flow keys are generated and stored by and tested the gate in a lab setting as well as in a wireless
the gate and communicated to the server in real-time. Stateful mesh network. We therefore implemented the keying and the
schemes therefore should only be applied if memory and real- tagging scheme as part of the Linux netfilter framework of
time communication overhead can be tolerated. Furthermore, the 2.6 kernel. Here, we only report one result to confirm the
a combined stateful-stateless scheme can help to reduce the efficiency of EC.
impact of a key change on long-lived flows. We set up a testbed that of four Pentium 4 PCs running
The implementation of EC in the current Internet architec- Linux 2.6 and connected via 100 Mbit/s full-duplex links.
ture is not straightforward. EC requires an initial permission Two hosts act as clients (legitimate and malicious), one as
to send. TCP, the dominant transport-layer protocol, requires gate and one as server. The legitimate client generates tagged
an initial handshake. Thus, usually SYN packets will not be packets, the malicious client untagged packets. The gate is
tagged. At this stage, we will treat SYN packets in the gate as a equipped with a multiport ethernet card so that the traffic
separate class of packets. Furthermore, SYN packets must not to/from the clients does not affect each other on the wire. In its
carry payload. Therefore, the authentication exchange cannot basic configuration, the gate gives tagged packets strict priority
be embedded into the SYN packets. We expect, however, that over wrongly or untagged packet. To generate traffic, we have
solutions will arise on how to deal with SYN packets, either enhanced iperf to generate tagged and untagged traffic on
as part of the current or the future Internet architecture. demand. Clients and gate are equipped with the tagging and
Similarly, a large number of protocols in the Internet do not tag-verification kernel modules. The server is running both the
match the above client-server communication type, e.g. the apache web server and iperf in server mode.
exchange of routing information or ICMP packets. In a real We assess EC’s ability to isolate attack traffic in the gate
deployment, these packets may also be treated separately at the and to mitigate its impact on legitimate traffic. The legitimate
gate, at least at the current state of development. However, it client machines generates TCP traffic and we vary the attack
might be interesting to extend the concepts of EC to control traffic from 10 to 94 Mbit/s in steps of 10 Mbit/s.
traffic in the Internet. Figure 3 shows the average throughput of legitimate and
The current Internet architecture employs a set of hacks that attack on the gate-server link, measured at the server network
may pose obstacles to EC deployment. For example, NATs interface. Without EC, Figure 3(a) shows that the ”gate” is not
modify the IP address in transit. In the presence of NATs, able to distinguish legitimate and unsolicited traffic. Therefore,
the key transport must use the translated address to calculate the rates of the legitimate sender drop as a function of the
the tag. Eventually, we hope that the clean slate approaches attack traffic.
to the Internet design remedy some of the temporary Internet In contrast, with EC (Figure 3(b)), the gate is able to
patches. isolate the attack traffic. Since the gate gives strict priority
to legitimate traffic, the attack traffic is only able to use the
F. Incentives capacity unused by the legitimate traffic. Since TCP is able to
Besides the purely technical challenges, the question arises use the bandwidth most of the time, no attack traffic passes
how the deployment of EC could be motivated. Obviously, the gate.
the deployment requires some changes in the infrastructure.
However, EC provides the following incentives to the partic- V. R ELATED WORK
ipants. First, EC takes into account that not all parties can Over the past years, several approaches have been presented
be trusted equally. The three-level key hierarchy reflects this to address DDoS attacks. First, defense mechanisms at the
trust hierarchy. Important is that the ISP which deploys the network layer have been developed against spoofed sources,
gate is in control via the gate and the cryptographic keys. It such as SIFF [12] and IP traceback schemes [9], [11]. Simi-
decides which and when keys are issued and can immediately larly, TVA [13] builds a capability based on the path between

15

Authorized licensed use limited to: VELLORE INSTITUTE OF TECHNOLOGY. Downloaded on July 09,2010 at 09:50:55 UTC from IEEE Xplore. Restrictions apply.
User traffic Attack traffic VI. C ONCLUSIONS
100
This paper presents Edge-based Capabilities, an architecture
90

80
to mitigate DDoS attacks inside the network. The defense is
enabled by combining end-to-end authentication to identify
Throughput [Mbit/s]

70

60
legitimate users with a capability approach to tag and filter
50
unsolicited traffic inside the network. We argue that only a
40
joint defense is feasible to counter modern DDoS attacks
30
with sophisticated attack patterns launched from thousands of
20 distributed zombies.
10 From a deployment’s perspective, many previous ap-
0 proaches failed because they did not provide incentives. EC,
0 20 40 60 80 100
Injected attack traffic [Mbit/s] in contrast, provides the right incentives to all participants.
(a) Without EC.
In particular, EC offers ISPs a novel protection service that
can be commercially exploited. Moreover, since EC does not
User traffic Attack traffic require a coordination among multiple ISPs or a change of
100
multiple routers, EC can efficiently be deployed.
90
EC is also a step forward into the direction of a future
80
Internet design. Instead of asking binary questions on who
Throughput [Mbit/s]

70
should control the resources in the Internet and how and
60
where end systems and networks should be separated, EC
50

40
emphasizes the need for collaboration towards a joint defense.
30
We believe that a next generation Internet architecture must
20
combine technical, economical and social components because
10
each component is no longer suited to individually address
0
future security threats. Instead, joint solutions, as the one
0 20 40 60 80 100
Injected attack traffic [Mbit/s] described in this paper, are a much promising way to build
a secure future Internet.
(b) With EC.

Fig. 3. DDoS attack mitigation: TCP traffic


R EFERENCES
[1] T. Anderson, T. Roscoe, and D. Wetherall. Preventing internet denial-
of-service with capabilities. In HotNets II, 2003.
[2] D. Clark. The design philosophy of the darpa internet protocols. In
ACM SIGCOMM, Sept. 1988.
sender and receiver. Unfortunately, these approaches are not [3] D. Dean and A. Stubblefield. Using client puzzles to protect TLS. In
USENIX Security Symposium, 2001.
suited to defend against modern botnets because the zombies [4] W. Feng, E. Kaiser, W. Feng, and A. Luu. The design and implemen-
are hijacked end systems that generate the traffic, but do not tation of network puzzles. In IEEE INFOCOM, 2005.
spoof traffic. Moreover, from a deployment point of view, they [5] S. Kandula, D. Katabi, M. Jacob, and A. Berger. Botz-4-sale: surviving
organized DDoS attacks that mimic flash crowds. In Proc. of NSDI,
require that a significant fraction of the Internet router must 2005.
be changed by different ISPs to be effective. In contrast, EC [6] S. Kent and R. Atkinson. IP Authentication Header. Internet Request
already achieves its protection by deploying a single gate by for Comment RFC 2402, Internet Engineering Task Force, Nov. 1998.
[7] A. Kuzmanovic and E. Knightly. Low-rate TCP-targeted denial of
a single ISP or enterprise. service attacks (the shrew vs. the mice and elephants). In Proc. of
In parallel to network layer DDoS protection, mechanisms ACM SIGCOMM, 2003.
[8] J. Mirkovic and P. Reiher. A taxonomy of DDoS attack and DDoS
to protect end system resources, e.g. for Web servers, have defense mechanisms. ACM SIGCOMM Computer Communications
been developed [5], [4]. Unfortunately, end system protection Review, 34(2):39–54, 2004.
is inefficient when packets are dropped before they reach the [9] S. Savage, D. Wetherall, A. Karlin, and T. Anderson. Network support
for IP traceback. Transactions on Networking, 9(3):226–237, 2001.
end system. [10] L. von Ahn, M. Blum, N. J. Hopper, and J. Langford. CAPTCHA:
Using Hard AI Problems for Security. In Eurocrypt, 2003.
EC has only limited similarity to IPsec. The authentication [11] A. Yaar, A. Perrig, and D. Song. Pi: a path identification mechanism to
header AH [6] of IPsec can ensure the integrity of the packet. defend against DDoS attacks. In Proc. of IEEE Symposium on Security
The overhead of IPsec is significant as it authenticates the and Privacy, 2003.
[12] A. Yaar, A. Perrig, and D. Song. SIFF: a stateless Internet flow filter
whole payload. Furthermore, it is a stateful, as it needs to to mitigate DDoS flooding attacks. In Proc. of the IEEE Symposium on
store a security association for each pair of communicating Security and Privacy, 2004.
machines. Both factors lead to a poor scalability. EC, in [13] X. Yang, D. Wetherall, and T. Anderson. A DoS-limiting network
architecture. In ACM SIGCOMM, 2005.
contrast, is stateless, and our evaluation shows that EC has
a significantly lower computational overhead. Further, the key
exchange (IKE) of IPsec uses asymmetric cryptographic means
and thus has a rather large impact on connection setup times.

16

Authorized licensed use limited to: VELLORE INSTITUTE OF TECHNOLOGY. Downloaded on July 09,2010 at 09:50:55 UTC from IEEE Xplore. Restrictions apply.

Das könnte Ihnen auch gefallen