Measuring Impact of Dos Attacks: Ntroduction
Measuring Impact of Dos Attacks: Ntroduction
Sonia Fahmy
Purdue University
West Lafayette, IN
Alefiya Hussain
SPARTA, Inc.
El Segundo, CA
I. I NTRODUCTION
Denial-of-service attacks have been a serious Internet threat for
at least a decade. Recently, this threat has grown more imminent
because people are increasingly relying on network services for
everyday communication, business tasks and even critical services
such as vessel navigation, emergency service coordination, etc.
Accurately measuring a denial-of-service impact is essential for
evaluation of potential DoS defenses. A defense is only valuable
if it provably prevents or eliminates the denial-of-service impact,
making DoS attacks transparent to Internet users. If we could
measure which services were denied by the attack with and
without the defense we could: (1) understand and express severity
of various attacks (e.g., attack A denied all the services in the
network, whereas attack B only denied HTTP service to new
users, (2) characterize the effectiveness of proposed defenses
(e.g., defense X eliminated 90% of DoS impact after 1 minute)
and compare defenses to understand a price/performance tradeoff.
An overall impact of DoS attacks on a target is that they
slow down or stop some service needed by legitimate users.
Historically, DoS researchers used several measures to capture
this effect: percentage of legitimate packets that received no
service, division of resources between legitimate and attack traffic,
throughput or goodput of TCP connections, and the overall
transaction duration. While these measures capture the essence of
a DoS impact they show a deviation of a measured parameter
during the attack from the same parameter without the attack
they do not really measure if some service was denied. This
is because Internet applications have very different quality-ofservice requirements. Online games and audio conversations are
sensitive to even a very small delay of 100 ms, while bulk file
transfer can endure multiple-minute delays. Audio applications
are sensitive to delay variation (jitter) while other applications
are not. Media and online games are also sensitive to packet
Peter Reiher
University of California Los Angeles
Los Angeles, CA
Steven Schwab
SPARTA, Inc.
El Segundo, CA
Calvin Ko
SPARTA, Inc.
El Segundo, CA
Application Category
email (server to server)
NNTP (Usenet)
Chat
Web, e-commerce
FTP, file-sharing
FPS Games
RTS Games
Telnet
E-mail (user to server)
DNS
ICMP
Audio, conversational
Audio, voice-messaging
Audio, streaming
Videophone
Video, streaming
QoS Classification
Non real-time
Non real-time
Non real-time
Real-time, block
Real-time, block
Real-time, block
Real-time, block
Real-time, block
Real-time, block
Real-time, block
Real-time, block
Real-time
Real-time
Real-time
Real-time
Real-time
One-way delay
Request/response delay
whole < 4 hours
whole < 4 hours
Loss
Duration
Jitter
< 30 s
any < 4 s or maxRTT < 4 s
any < 10 s or maxRTT < 10 s
< 150 ms
< 500 ms
< 300%
< 300%
<3%
< 300%
< 300%
<
<
<
<
<
3%
3%
1%
3%
1%
< 50 ms
< 50 ms
< 50 ms
TABLE I
A PPLICATION CATEGORIES AND THEIR REQUIREMENTS
Transaction
TCP flow
TCP flow
TCP flow and inactive time > 4 s
TCP flow and inactive time > 4 s
TCP flow and inactive time > 4 s
UDP flow
TCP flow and inactive time > 4 s
TCP flow and inactive time > 4 s
One request/response
One request/response
TCP flow and a corresponding UDP flow
TABLE II
T RANSACTION
IDENTIFICATION
We can measure request/response delay and transaction duration using a sender-collected trace, but we need to correlate the
sender/receiver traces to measure one-way delay, loss and jitter.
We do this by matching source IP, port and identification (e.g.,
sequence number, request ID) of the packets at the sender with the
packets at the receiver side, and synchronizing sender and receiver
clocks at the beginning of the experiment. We use tcpdump to
capture a traffic trace during the experiment. Since tcpdump uses
interrupt-based packet capture, it has problems keeping up with
high packet speeds [10] and it will largely overestimate packet
loss for strong attacks. This problem can be handled to a large
extent if tcpdump is combined with device polling [10].
LU
100Mbps
VIC
10Mbps
100Mbps
ATT
Fig. 1.
wk , where k goes
k
over all application categories, and wk is a weight associated
with a category k. Applications could be weighted equally or
according to their popularity or importance. Note that DoS-degree
is highly dependent on the chosen set of application weights.
Unless there is a broad consensus on a representative set of
application weights, using DoS-degree for defense performance
comparison could lead to false conclusions, as application weights
can be chosen to drive the results in favor of a chosen defense.
For DoS defense evaluation it is useful to calculate the DoS
impact over time. Since DoS defenses usually experience an
activation delay before responding effectively, the DoS impact
measured at the start of the attack will be much higher than
later, when the defense has engaged. We capture this time-based
change by splitting attack duration into intervals of T seconds and
calculating DoS-hist and DoS-degree measures for each interval
in the following manner: (1) We calculate success or failure
for transactions overlapping the current interval, (2) We use
transaction success data to calculate pft per application category
and aggregate it into a desired measure, (3) A transaction that
has failed in one interval is not used for pft calculation in the
following intervals.
III. E XPERIMENTS
We now illustrate our proposed DoS impact metric in a smallscale experiment in DETER testbed. We use a simple network
topology, shown in Figure 1 and generate the following legitimate
traffic: (1) HTTP traffic with Paretto-distributed file sizes, and
exponentially distributed connection arrivals with 1s mean, (2)
Telnet traffic with Paretto-distributed duration and traffic volume,
and exponentially distributed connection arrivals with 1s mean,
(3) FTP traffic with Paretto-distributed file sizes, and exponentially distributed connection arrivals with 1s mean, (4) DNS traffic
with exponentially distributed request arrivals with 1s mean, and
(5) ICMP traffic with exponentially distributed request arrivals
with 5s mean.
We generate a UDP flood attack that aims to overwhelm the
bottleneck link whose bandwidth is 1.25MBps. Figure 2 shows
the pft measure per application as we vary the attack strength. The
measure clearly reveals the sensitivity of long-lived transactions,
such as generated by FTP and Telnet, to small-rate attacks, while
DNS transactions are only affected when the attack strength is
four-fold the bandwidth of the bottleneck link.
IV. R ELATED W ORK
For brevity we only provide a short overview of the work
related to DoS impact measurement. In the quality of service
field there is an initiative to define a universally accepted set of
QoS requirements for applications. This initiative is lead by the
Fig. 2.