Title :
Perimeter-based defense against high bandwidth DDoS attacks
Author :
Chen, Shigang ; Song, Qingguo
Author_Institution :
Dept. of Comput. & Inf. Sci. & Eng., Florida Univ., Gainesville, FL, USA
fDate :
6/1/2005 12:00:00 AM
Abstract :
Distributed denial of service (DDoS) is a major threat to the availability of Internet services. The anonymity allowed by IP networking, together with the distributed, large scale nature of the Internet, makes DDoS attacks stealthy and difficult to counter. To make the problem worse, attack traffic is often indistinguishable from normal traffic. As various attack tools become widely available and require minimum knowledge to operate, automated antiDDoS systems become increasingly important. Many current solutions are either excessively expensive or require universal deployment across many administrative domains. This paper proposes two perimeter-based defense mechanisms for Internet service providers (ISPs) to provide the antiDDoS service to their customers. These mechanisms rely completely on the edge routers to cooperatively identify the flooding sources and establish rate-limit filters to block the attack traffic. The system does not require any support from routers outside or inside of the ISP, which not only makes it locally deployable, but also avoids the stress on the ISP core routers. We also study a new problem of perimeter-based IP traceback and provide three solutions. We demonstrate analytically and by simulations that the proposed defense mechanisms react quickly in blocking attack traffic while achieving high survival ratio for legitimate traffic. Even when 40 percent of all customer networks attack, the survival ratio for traffic from the other customer networks is still close to 100 percent.
Keywords :
IP networks; Internet; packet switching; protocols; security of data; telecommunication congestion control; telecommunication network routing; telecommunication security; telecommunication traffic; DDoS attack; IP networking; Internet service provider; distributed denial of service attack; network routing; network traffic; network-level security; perimeter-based IP traceback; Availability; Bandwidth; Computer crime; Counting circuits; Floods; IP networks; Large-scale systems; Telecommunication traffic; Traffic control; Web and internet services; Network-level security and protection.;
Journal_Title :
Parallel and Distributed Systems, IEEE Transactions on
DOI :
10.1109/TPDS.2005.74