16
Source Router Approach Source Router Approach to DDoS Defense to DDoS Defense Jelena Mirković and Peter Reiher UCLA USENIX Work-In Progress Session Washington DC, 08/17/2001 {sunshine, reiher}@cs.ucla.edu

Source Router Approach to DDoS Defense Jelena Mirković and Peter Reiher UCLA USENIX Work-In Progress Session Washington DC, 08/17/2001 {sunshine, reiher}@cs.ucla.edu

Embed Size (px)

Citation preview

Page 1: Source Router Approach to DDoS Defense Jelena Mirković and Peter Reiher UCLA USENIX Work-In Progress Session Washington DC, 08/17/2001 {sunshine, reiher}@cs.ucla.edu

Source Router Approach Source Router Approach to DDoS Defenseto DDoS Defense

Jelena Mirković and Peter ReiherUCLA

USENIX Work-In Progress SessionWashington DC, 08/17/2001

{sunshine, reiher}@cs.ucla.edu

Page 2: Source Router Approach to DDoS Defense Jelena Mirković and Peter Reiher UCLA USENIX Work-In Progress Session Washington DC, 08/17/2001 {sunshine, reiher}@cs.ucla.edu

Approach OverviewApproach Overview Goal: Prevent our site from participating

in DDoS attack Monitor incoming and outgoing traffic

looking for signs that some destination is in trouble

Reduce traffic to that destination Separate attacking from normal flows Shut down attacking machines

Page 3: Source Router Approach to DDoS Defense Jelena Mirković and Peter Reiher UCLA USENIX Work-In Progress Session Washington DC, 08/17/2001 {sunshine, reiher}@cs.ucla.edu

Approach OverviewApproach Overview

A

B

C

DE F G

I

J

H

Page 4: Source Router Approach to DDoS Defense Jelena Mirković and Peter Reiher UCLA USENIX Work-In Progress Session Washington DC, 08/17/2001 {sunshine, reiher}@cs.ucla.edu

A

B

C

DE F G

I

J

H

Approach OverviewApproach Overview

Page 5: Source Router Approach to DDoS Defense Jelena Mirković and Peter Reiher UCLA USENIX Work-In Progress Session Washington DC, 08/17/2001 {sunshine, reiher}@cs.ucla.edu

A

B

C

DE F G

I

J

H

Approach OverviewApproach Overview

Page 6: Source Router Approach to DDoS Defense Jelena Mirković and Peter Reiher UCLA USENIX Work-In Progress Session Washington DC, 08/17/2001 {sunshine, reiher}@cs.ucla.edu

A

B

C

DE F G

I

J

H

Approach OverviewApproach Overview

Page 7: Source Router Approach to DDoS Defense Jelena Mirković and Peter Reiher UCLA USENIX Work-In Progress Session Washington DC, 08/17/2001 {sunshine, reiher}@cs.ucla.edu

A

B

C

DE F G

I

J

H

Approach OverviewApproach Overview

Page 8: Source Router Approach to DDoS Defense Jelena Mirković and Peter Reiher UCLA USENIX Work-In Progress Session Washington DC, 08/17/2001 {sunshine, reiher}@cs.ucla.edu

Related Work - MULTOPSRelated Work - MULTOPS Yes, it is similar to MULTOPS, but:

It is located on source side only Traffic models do not rely only on packet

ratio Discovery of attacking machines Can be pushed further in the network

Page 9: Source Router Approach to DDoS Defense Jelena Mirković and Peter Reiher UCLA USENIX Work-In Progress Session Washington DC, 08/17/2001 {sunshine, reiher}@cs.ucla.edu

time

Stable Packet Ratio Stable Packet Ratio in Mixed Trafficin Mixed Trafficpa

cket

rat

io

Page 10: Source Router Approach to DDoS Defense Jelena Mirković and Peter Reiher UCLA USENIX Work-In Progress Session Washington DC, 08/17/2001 {sunshine, reiher}@cs.ucla.edu

time

pack

et r

atio

Stable Packet Ratio Stable Packet Ratio in TCP Trafficin TCP Traffic

Page 11: Source Router Approach to DDoS Defense Jelena Mirković and Peter Reiher UCLA USENIX Work-In Progress Session Washington DC, 08/17/2001 {sunshine, reiher}@cs.ucla.edu

time

pack

et r

atio

Stable Packet Ratio Stable Packet Ratio in UDP Trafficin UDP Traffic

Page 12: Source Router Approach to DDoS Defense Jelena Mirković and Peter Reiher UCLA USENIX Work-In Progress Session Washington DC, 08/17/2001 {sunshine, reiher}@cs.ucla.edu

time

pack

et r

atio

Stable Packet Ratio Stable Packet Ratio in UDP Trafficin UDP Traffic

Page 13: Source Router Approach to DDoS Defense Jelena Mirković and Peter Reiher UCLA USENIX Work-In Progress Session Washington DC, 08/17/2001 {sunshine, reiher}@cs.ucla.edu

time

pack

et r

atio

Variable Packet Ratio Variable Packet Ratio in Mixed Trafficin Mixed Traffic

Page 14: Source Router Approach to DDoS Defense Jelena Mirković and Peter Reiher UCLA USENIX Work-In Progress Session Washington DC, 08/17/2001 {sunshine, reiher}@cs.ucla.edu

DDoS + FTP

FTP

DDoS

time

pack

et r

atio

Variable Packet Ratio Variable Packet Ratio in Attack Trafficin Attack Traffic

Page 15: Source Router Approach to DDoS Defense Jelena Mirković and Peter Reiher UCLA USENIX Work-In Progress Session Washington DC, 08/17/2001 {sunshine, reiher}@cs.ucla.edu

ChallengesChallengesRouter performance.Why would ISP implement this?False positives.Multicast traffic is usually

unidirectional.Asymmetric routes. Throttling and

TCP congestion control mechanism.Traffic patterns in the Internet change

drastically over time.

Page 16: Source Router Approach to DDoS Defense Jelena Mirković and Peter Reiher UCLA USENIX Work-In Progress Session Washington DC, 08/17/2001 {sunshine, reiher}@cs.ucla.edu

For More Info...For More Info...

http://fmg-www.cs.ucla.edu/ddos