DDoS Attacks
DDoS Attacks
Monika Sachdeva
ABSTRACT
The present era is completely dependent on Internet. Internet
serves as a global information source for all users, so the
availability of internet is very important. In this paper the
main focus is on the DDoS attack which hinders the network
availability by flooding the victim with high volume of
illegitimate traffic usurping its bandwidth, overburdening it to
prevent legitimate traffic to get through. Various techniques to
prevent and mitigate these attacks along with their advantages
and disadvantages are also discussed.
General Terms
DDoS Attack, Flooding Attack, Distributed, Attacker
Keywords
DDoS attack, Availability, Zombie, Botnet.
1. INTRODUCTION
The internet in simple terms is defined as an interconnected
system of computer networks. The scope of internet in day to
day life is vast; it provides a wide range of information,
services, resources which allows all sectors to be well linked
As the need of internet is growing with time, various issues
related to its security comes insight. The reason for internet
insecurity is basically its design because foremost concern
was its functionality rather than its security. Hence several
types of attacks and threats are reason for apprehension
towards security of internet. The issues related to internet
security
are
authentication,
integrity,
availability,
confidentiality and non- repudation. In this paper main focus
is on insecurity to availability, availability means that the
information, the computing systems, and the security controls
are all accessible and operable in committed state at some
random point of time [1]. Among all attacks DDoS
(Distributed Denial of service) attacks are those which hinder
clients, users to access all advantages of services available to
them from server side. DDoS attack results in long system
timeouts, lost revenues, large volumes of work to identify
attacks and to prepare adequate response measures [23]
Denial of service (DoS) attack is Distributed Denial of service
(DDoS) attack since it is launched concurrently to numerous
machines. DDos attacks are not new disturbance to internet,
they came back late in August 1999 and after that incessantly
their severity is growing. Some recognized DoS attacks are
SYN Flood, teardrop, smurf, ping of death [2]. There have
been large scale attacks targeting many high profile websites
[26, 27, 28]. These sites include twitter, facebook, Amazon
etc. There are varieties of DDoS attacks as classified in [16,
17]. However, the most common form of DDoS attacks is a
packet-flooding attack, in which a large number of seemingly
legitimate TCP, User Datagram Protocol (UDP), or Internet
Control Message Protocol (ICMP) packets are directed to a
specific destination. DDoS attacks cannot be detected and
stopped easily because forged source addresses and other
techniques are used to conceal attack sources [29]. As per
21
Approach
Used
Advantage
Disadvantage
Ingress
Filtering
Ingress Router
set to drop
traffic with IP
address not
matching to
domain prefix.
Reduces
DoS attack
due to IP
spoofing ,
locates
source of
attack if
ISPs have
ingress
filtering
instead of
customer
links
It just reduces,
does not
prevent use of
forged source
address of
another host
within
permitted
prefix filter
range.
Egress
Filtering
Makes certain
that only
assigned IP
address
space leaves
the network.
Outbound
filter is used.
Protects
other
domain
from
possible
attack
There is
wastage of
resources of
domain where
packet
originates
Route Based
Distributed
Packet
Filtering
Uses routing
information. It
works on basis
that for every
link in
internet, there
is limited
number of
source IP
addresses from
which traffic
comes.
Synergistic
filtering
effect is
possible,
spoofed IP
flows are
prevented
from
reaching
other
Autonomo
us
Systems.
Difficult to
update routebased filters in
real time.
Acquiring
global
knowledge of
whole n/w
topology has
scalability
issues
A pre-built IP
address
database is
used and an
edge router
acknowledges
the incoming
packets
accordingly.
It is robust,
there is no
need of
studying
the whole
network
topology
If the invader
knows that the
IP packet filter
is based on
prior
connections,
they might
deceive the
server to be
included in the
IP address
database.
Hash based
routing is
used, the user
traffic is
authenticated
via SOAP then
traffic is
routed though
small number
of nodes called
as servlets to
victim.
Simple
approach that
enables
network
providers to
Distributed
system that
offers
exceptional
protection
to the
specified
target at
the cost of
modifying
client
systems.
In a
multipleserver
architectur
e the
3. DDOS DEFENSE
DDoS defense means to relieve victims resources from high
volume of fake packets sent by attackers from disseminated
locations, so that these resources could be used to serve
legitimate users. The distributed nature of DDoS attacks make
them enormously difficult to combat. Attackers may also use
IP spoofing to conceal their identity. There is no satisfactory
security in comparison to persistent security breaches in the
Internet. DDoS defense mechanism consists of prevention,
detection, tolerance and mitigation and response.
According to, Douligeris et al. [16]Attack prevention aims to
fix security holes, such as insecure protocols, weak
authentication schemes and vulnerable computer systems,
which can be used as stepping stones to launch a DoS attack.
This approach aims to improve the global security level and is
the best solution to DoS attacks. Various methods of
prevention are ingress filtering, egress filtering, route based
packet-filtering, history based IP-filtering. Detection means a
host computer and a network can guard themselves against
being a source of network attack as well as being a victim of a
DDoS attack either by using the database of known signatures
or by recognizing anomalies in system behaviors. It is
impossible to completely stop DDoS attacks, so mitigation
and tolerance is important. The impact of attack can be
minimized through fault tolerance or increasing quality of
service. The table 1 [11-15] and [21-24] underneath discusses
various prevention techniques and table 2 [4-9] discusses
various mitigation and tolerance techniques to combat DDoS
attacks.
History
Based IPFiltering
Secure
Overlay
Services
(SOS)
Load
Balancing
Not
recommended
for public
servers.
It is costly and
complex.
22
Honey
pot
Allow the
attacker to
attack the
honypot and
not the actual
system; they
also help to
gain info of
the attacker by
storing their
records, the
type of attack
and type of
software used.
balance of
the load is
necessary
so that both
the
improveme
nt of
normal
performanc
e.
Main goal
is to make
attacker
think that
he has
compromis
ed the
machine(h
oneypot) as
slave and
understand
the attack
code, this
helps to
detect the
attacker
Resource
Pricing
Assumes that
the attack must
be detectable
using signature
based
detection tools.
PushBack
Table 2. DDoS Mitigation and Tolerance Techniques
Name of
Technique
Integrated
Intserv
Differentiated
Services
Class Based
Queuing
Approach
Used
Uses the
Resource
Reservation
Protocol
(RSVP) to
manage the
resources
allocation
along the path
that a
particular
traffic passes.
Based on
Type of
Service byte
in IP header
Queues for
different type
of packets and
different
packets
for different
type of service
is set,
bandwidth is
assigned to
queues
Advantage
Disadvantage
The
bandwidth
and buffer
space for a
particular
link is
assured for
specific
traffic flow
Due to pre
allocation of
resources their
consumption
increases.
Allocates
resources
based on
TOS of
incoming
packet
Requires
cooperation of
multiple
administrative
domains.
Throttling
Maintains
QoS
during
DDoS
attack
It is difficult to
maintain
queues.
propose a
distributed
gateway
architecture
and a payment
protocol that
imposes
dynamically
changing
prices on both
network,
server, and
information
resources
First, a local
Aggregate
Congestion
Control
(ACC) detects
the congestion
at the router
level and
devises an
attack
signature. The
signature
defines a
traffic
aggregate as a
group of
traffic flows
with a
common
property
Then, a
local ACC
determines an
appropriate
rate limit for
this aggregate.
Traffic
passing
through the
router to the
source is rate
limited to the
throttle rate.
only
aggressive
flows which
do not respect
their rate
shares are
punished and
not other
flows. This
method
is still in the
experimental
stage.
They
identify
allotting a
priority
mechanism
to desirable
clients as
being key,
and punish
clients that
cause load
on the
server.
Malicious user
can populate
the system with
fake requests at
low price, thus
driving up the
price for
legitimate
users.
PushBack
can
effectively
mitigate
DDoS
attacks
when the
attackers
machines
are
gathered in
few places.
When attackers
are widely
distributed
over the
Internet, the
legitimate
traffic also is
rate-limited
and PushBack
will not be
successful.
Prevents
servers
from going
down. Eg:
web
servers
Difficult to
implement
throttling, hard
to decipher
legitimate
traffic from
malicious
traffic. In the
process of
throttling,
legitimate
traffic may
sometimes be
dropped or
delayed and
malicious
traffic may be
allowed to pass
to server.
23
3. CONCLUSION
In this paper, an apparent vision of the DDoS attack is
attained and discussed numerous techniques along with their
pros and cons to prevent and alleviate these attacks. Due to
an alarming increase in DDoS attacks, internet security from
these attacks becomes vulnerable issue. Having clarified view
of the attack, effective countermeasures can be implemented
to fight against these attacks.
[15]
[16]
4. REFERENCES
[1] Tipton H. and Krause M. 2004, Information Security
Management Handbook, CRC Press.
[2] Sachdeva M., Singh G., Kumar K. and Singh K. 2010.
DDoS incidents and their impact: A review, International
Arab Journal of Information Technology, vol. 7, Issue 1,
pp. 14-19.
[3] Chang R.K.C. 2002. Defending against flooding-based
distributed denial-of-service attacks: A Tutorial,
Computer Journal of IEEE Communication Magazine,
vol. 40, Issue 10, pp. 42-51.
[4] Yau D.K., Lui J.C.S., Liang F. 2002. Defending Against
Distributed Denial of Service attacks with maxmin fair
server-centric router throttles, in: Proceedings of the
Tenth IEEE International Workshop on Quality of
Service (IWQoS), Miami Beach, FL, pp. 3544.
[5] Zhao W., Olshefski D., Schulzrinne H. 2000. Internet
Quality of Service: an overview, Columbia Technical
Report CUCS-003-00.
[6] Blake S., Black D., Carlson M., Davies E., Wang Z.,
Weiss W. 1998. An architecture for differentiated
services, in: IETF, RFC 2475.
[7] Geoffrey M.B., Xie G. 2002. A feedback mechanism for
mitigating Denial of
Service attacks against
differentiated services clients, In Proceedings of the 10th
International Conference on Telecommunications
systems, Monterey, CA, pp. 204213.
[8] Ioannidis J., Bellovin S.M. 2002. Implementing
pushback: router-based defense against DDoS Attacks. In
Proceedings of Network and Distributed System Security
Symposium, (NDSS), San Diego, CA, pp. 68.
[9] Mankins S.M., Sangpachatanaruk C., Znati T., Melhem
R., Moss D. 2003. Proactive server roaming for
mitigating Denial of Service attacks. In Proceedings of
1st International Conference on Information Technology
Research and Education (ITRE), Newark, NJ, USA,
August 1013,.
[10] Kargl F., Maier J., Weber M. 2001. Protecting web
servers from Distributed Denial of Service attacks. In
Proceedings of the Tenth International Conference on
World Wide Web, Hong Kong, pp. 514524.
[11] Ferguson P., Senie D. 2001. Network ingress filtering:
defeating Denial of Service
attacks which employ IP
source address spoofing. In RFC 2827.
[12] Global Incident analysis CenterSpecial Notice
Egress
filtering,
Available
from
<http://www.sans.org/y2k/egress.htm>.
[13] Park K., Lee H. 2001. On the effectiveness of routebased packet filtering for Distributed DoS attack
prevention in powerlaw Internets, In Proceedings of the
ASIGCOMM_01
Conference
on
Applications,
Technologies, Architectures, and Protocols for Computer
Communications, ACM Press, New York, pp. 1526.
[14] Peng T., Leckie C., Ramamohanarao K. 2003. Protection
from Distributed Denial of Service attack using history-
[17]
[18]
[19]
[20]
[21]
[22]
[23]
[24]
[25]
[26]
[27]
[28]
[29]
24