DocumentCode :
2718220
Title :
Synmon Architecture for Source-based SYN-flooding Defense on Network Processor
Author :
BoonPing Lim ; Uddin, Md Safi
Author_Institution :
Fac. of Inf. Technol., Multimedia Univ., Selangor
fYear :
2005
fDate :
5-5 Oct. 2005
Firstpage :
995
Lastpage :
999
Abstract :
Distributed denial-of-service attacks remains to inflict damage to Internet services, after almost five years since its large-scale explosion. The demand for robust and high-speed firewall has led to the advent of hardware-based DDoS defense systems. Network processor is becoming the cornerstone of many new firewall designs due to its programmability and high performance packet processing ability. In this paper, we propose an innovative and practical syn-flooding defense system built on network processor. An embedded architecture, called synmon is proposed. We characterize our solution as a source-based autonomous system which resides in upstream border routers. It detects a wide-range of attacks and blocks a large portion of attack traffic before flooding into the core network. Change-point detection algorithm is employed to detect the occurrence of syn-flooding attack. It performs per-flow attack detection based on SYN and ACK packets exchanged in TCP friendly flow. A fuzzy-based adaptive rate-limiting mechanism is proposed to restrict the intensity of outgoing SYN packets. Under the per-flow mitigation scheme, while the attacker is penalized with limited outgoing connection, the legitimate clients in the same subnet are free from collateral damage. A hardware prototype of synmon embedded router is developed. We demonstrate that the synmon architecture seamlessly integrates with common routing tasks while providing cost-effective service for SYN-flooding defense system on the network processor platform
Keywords :
Internet; telecommunication network routing; telecommunication security; telecommunication traffic; transport protocols; ACK packets; Internet services; TCP friendly flow; attack traffic; change-point detection algorithm; distributed denial-of-service attacks; fuzzy-based adaptive rate-limiting mechanism; hardware-based DDoS defense system; high-speed firewall; limited outgoing connection; network processor; outgoing SYN packets; packet processing ability; per-flow attack detection; source-based SYN-flooding defense system; source-based autonomous system; synmon embedded architecture; upstream border routers; Computer crime; Detection algorithms; Explosions; Hardware; Large-scale systems; Prototypes; Robustness; Routing; Telecommunication traffic; Web and internet services; SYN-flooding; distributed denial of-service; fuzzy rate-limiting network processor; network security; non-parametric CUSUM;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Communications, 2005 Asia-Pacific Conference on
Conference_Location :
Perth, WA
Print_ISBN :
0-7803-9132-2
Type :
conf
DOI :
10.1109/APCC.2005.1554213
Filename :
1554213
Link To Document :
بازگشت