skip to main content
article

On the effectiveness of route-based packet filtering for distributed DoS attack prevention in power-law internets

Authors Info & Claims
Published:27 August 2001Publication History
Skip Abstract Section

Abstract

Denial of service (DoS) attack on the Internet has become a pressing problem. In this paper, we describe and evaluate route-based distributed packet filtering (DPF), a novel approach to distributed DoS (DDoS) attack prevention. We show that DPF achieves proactiveness and scalability, and we show that there is an intimate relationship between the effectiveness of DPF at mitigating DDoS attack and power-law network topology.The salient features of this work are two-fold. First, we show that DPF is able to proactively filter out a significant fraction of spoofed packet flows and prevent attack packets from reaching their targets in the first place. The IP flows that cannot be proactively curtailed are extremely sparse so that their origin can be localized---i.e., IP traceback---to within a small, constant number of candidate sites. We show that the two proactive and reactive performance effects can be achieved by implementing route-based filtering on less than 20% of Internet autonomous system (AS) sites. Second, we show that the two complementary performance measures are dependent on the properties of the underlying AS graph. In particular, we show that the power-law structure of Internet AS topology leads to connectivity properties which are crucial in facilitating the observed performance effects.

References

  1. 1 G.Banga,P.Druschel,and J.Mogul.Resource containers:A new facility for resource management in server systems.In Proc.of the third USENIX/ACM Symp.on Operating Systems Design and Implementation (OSDI '99),pages 45-58,Feb.1999. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. 2 S.Bellovin.ICMPtraceback messages,Mar.2000. Internet Draft:draft-bellovin-itrace-00.txt (expires September 2000).Google ScholarGoogle Scholar
  3. 3 H.Burch and B.Cheswick.Tracing anonymous packets to their approximate source.In 14th Systems Administration Conference (LISA 2000),pages 319-327,2000. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. 4 C.E.R.T.(CERT).CERT Advisory CA-2000-01 Denial-of-service developments,Jan.2000. http://www.cert.org/advisories/CA-2000-01.html.Google ScholarGoogle Scholar
  5. 5 CERT/CC,S.Institute,and CERIAS.Consensus roadmap for defeating distributed denial of service attacks,Feb.2000.A Project of the Partnership for Critical Infrastructure Security, http://www.sans.org/ddos roadmap.htm.Google ScholarGoogle Scholar
  6. 6 M.Faloutsos,P.Faloutsos,and C.Faloutsos.On power-law relationships of the Internet topology.In Proc.of ACM SIGCOMM ,pages 251-262,1999. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. 7 P.Ferguson and D.Senie.Network ingress .ltering: Defeating denial of service attacks which employ IP source address spoo .ng,May 2000.RFC 2827. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. 8 L.Garber.Denial-of-service attacks rip the Internet. Computer ,pages 12-17,Apr.2000. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. 9 M.Garey and D.Johnson.Computers and Intractability:A Guide to the Theory of NP-Completeness .W.H.Freeman and Company, 1979. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. 10 R.Govindan and A.Reddy.An analysis of Internet inter-domain topology and route stability.In Proc. IEEE INFOCOM '97 ,1997. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. 11 J.Howard.An Analysis of Security Incidents on the Internet .PhD thesis,Carnegie Mellon Univerisity, Aug.1998. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. 12 C.Jin,Q.Chen,and S.Jamin.Inet:Internet Topology Generator.Technical Report CSE-TR-443-00,Department of EECS,University of Michigan,2000.Google ScholarGoogle Scholar
  13. 13 C.Meadows.A formal framework and evaluation method for network denial of service.In Proc.ofthe 1999 IEEE Computer Security Foundations Workshop , June 1999. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. 14 A.Medina and I.Matta.Brite:A .exible generator of Internet topologies.Technical Report BU-CS-TR-2000-005,Boston University,Jan.2000. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. 15 R.Morris.A weakness in the 4.2BSD Unix TCP/IP software.Technical Report Computer Science #117, AT&T Bell Labs,Feb.1985.Google ScholarGoogle Scholar
  16. 16 National Laboratory for Applied Network Research. Routing data,2000.Supported by NFS, http://moat.nlanr.net/Routing/rawdata/.Google ScholarGoogle Scholar
  17. 17 NightAxis and R.F.Puppy.Purgatory 101:Learning to cope with the SYNs of the Internet,2000.Some practical approaches to introducing accountability and responsibility on the public internet, http://packetstorm.securify.com/papers/contest/RFP.doc.Google ScholarGoogle Scholar
  18. 18 J.Pansiot and D.Grad.On routes and multicast trees in the Internet.Computer Communication Review , 28(1):41 -50,1995. Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. 19 C.Papadimitriou and K.Steiglitz.Combinatorial Optimization:Algorithms and Complexity .Prentice Hall,Inc.,1982. Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. 20 K.Park and H.Lee.On the e .ectiveness of probabilistic packet marking for IPtraceback under denial of service attack.In Proc.IEEE INFOCOM '01 ,pages 338-347,2001.Google ScholarGoogle Scholar
  21. 21 J.Postel.Internet protocol,Sept.1981.RFC 791.Google ScholarGoogle Scholar
  22. 22 G.Sager.Security fun with OCxmon and c .owd,Nov. 1998.Presentation at the Internet 2 Working Group.Google ScholarGoogle Scholar
  23. 23 S.Savage,D.Wetherall,A.Karlin,and T.Anderson. Practical network support for IP traceback.In Proc. of ACM SIGCOMM ,pages 295-306,Aug.2000. Google ScholarGoogle ScholarDigital LibraryDigital Library
  24. 24 C.Schuba,I.Krsul,M.Kuhn,E.Spa .ord, A.Sundaram,and D.Zamboni.Analysis of a denial of service attack on TCP.In Proc.of the 1997 IEEE Symp.on Security and Privacy ,pages 208-223,May 1997. Google ScholarGoogle ScholarDigital LibraryDigital Library
  25. 25 D.Song and A.Perrig.Advanced and authenticated marking schemes for IPtraceback.Technical Report UCB/CSD-00-1107,Computer Science Department, University of California,Berkeley,2000.To appear in IEEE INFOCOM 2001.Google ScholarGoogle Scholar
  26. 26 O.Spatscheck and L.Peterson.Defending against denial of service attacks in Scout.In Proc.ofthethird USENIX/ACM Symp.on Operating Systems Design and Implementation (OSDI '99),pages 59-72,Feb. 1999. Google ScholarGoogle ScholarDigital LibraryDigital Library
  27. 27 C.Systems.Characterizing and tracing packet .oods using Cisco routers,Aug 1999. http://www.cisco.com/warp/public/707/22.html.Google ScholarGoogle Scholar
  28. 28 C.E.R.Team.Denial of service,Feb.1999.Tech Tips, http://www.cert.org/tech tips/denial of service.html, 2nd revision.Google ScholarGoogle Scholar
  29. 29 C.E.R.Team.Results of the distributed-systems intruder tools workshop,Nov.1999. http://www.cert.org/reports/dsit workshop.pdf.Google ScholarGoogle Scholar
  30. 30 B.Waxman.Routing of m ltipoint connections.IEEE Jo rnal of Selected Areas in Comm nications ,pages 6(9):1617-1622,Dec.1988.Google ScholarGoogle Scholar
  31. 31 E.Zwicky,S.Cooper,D.Chapman,and D.Ru. Building Internet Firewalls .O 'Reilly &Associates, Inc.,2nd edition,2000. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. On the effectiveness of route-based packet filtering for distributed DoS attack prevention in power-law internets

          Recommendations

          Comments

          Login options

          Check if you have access through your login credentials or your institution to get full access on this article.

          Sign in

          Full Access

          • Published in

            cover image ACM SIGCOMM Computer Communication Review
            ACM SIGCOMM Computer Communication Review  Volume 31, Issue 4
            Proceedings of the 2001 SIGCOMM conference
            October 2001
            275 pages
            ISSN:0146-4833
            DOI:10.1145/964723
            Issue’s Table of Contents
            • cover image ACM Conferences
              SIGCOMM '01: Proceedings of the 2001 conference on Applications, technologies, architectures, and protocols for computer communications
              August 2001
              298 pages
              ISBN:1581134118
              DOI:10.1145/383059

            Copyright © 2001 ACM

            Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

            Publisher

            Association for Computing Machinery

            New York, NY, United States

            Publication History

            • Published: 27 August 2001

            Check for updates

            Qualifiers

            • article

          PDF Format

          View or Download as a PDF file.

          PDF

          eReader

          View online with eReader.

          eReader