Optimizing DDOS Attacks Using LCIA
Optimizing DDOS Attacks Using LCIA
Web Site: www.ijaiem.org Email: editor@ijaiem.org, editorijaiem@gmail.com Volume 2, Issue 12, December 2013 ISSN 2319 - 4847
Guru Nanak Institute of Engineering and Technology, Nagpur, India 2.4 DAVV, Indore, India
Abstract
Security is the most important parameter for ideal network. Various attacks are of great challenge and proved as obstacles for constructing the ideal network. Distributed Denial of Service (DDoS) is one of threats which damage the network applications and affect the bandwidth consumption .There are many Legitimate Traffic detecting mitigation algorithms exists to overcome the network attacks. This project mainly concentrates on implementing the Legitimate Chance Inspection Algorithm (LCIA) for Optimizing DDOS Attacks. In LCIA the number of packets being malicious under the Legitimate packets are removed for improving the network performance .There are two challenges in order to overcome the DDoS, firstly there is need to identify the machine from which malicious flow is generated and secondly minimizing the attack of those malicious attack on legitimate traffic flow. In LCIA, basically a mathematical equation and is implemented to find the number of malicious packets in the network.
1. INTRODUCTION
Network Security is the most important parameter for ideal network. It consists of the provisions and policies adopted by a network administrator to prevent and monitor illegal access, mistreat, alteration or denial of a computer network and network-accessible resources. It involves the access authorization to data in the network, which is monitored by the network administrator. It covers a variety of computer networks, such as public and private, used everywhere conducting transactions and communications among businesses, government agencies and individuals. It is involved in industries, organizations, and other types of institutions. Internet is growing in day to day applications. Generally to protect the information, hiding it from the unauthorized access and unauthorized changes make that information available only to the authorized users. Internet is a complex network due to changes in network traffic load, traffic assimilation, mixing of congestion control actions, on/off flows. Due to these reasons, the statistics of arriving traffic changes dynamically. The available link bandwidth varies in accordance with the statistics of the input traffic. Various attacks are of great challenge and proved as obstacles for constructing the ideal network. Distributed Denial of Service attack is one of the most widely spread problems in internet application is Distributed Denial of Service (DDoS) attacks. It is one of the foremost damaging threats faced by most of the web applications. Under the DDoS attacks, attackers affected the normal users to achieve the bandwidth-consumption attacks. This attack includes IP spoofing, smurf and fraggle attacks and resource starvation attacks include SYN floods. To minimize the effect of an ongoing attack, mitigation process is used. The basic problem with this strategy is to distinguish between legitimate and illegitimate client packets. Attackers are making their attacks impossible to determine whether a packet belongs to legitimate client or an attacker. It is a largescale, coordinated attack on the availability of services of a victim system or may be through many negotiated computers on the Internet. The frequency of DDoS attacks that target to the internet is continuously increasing to slow down a victim server. In DDoS, the attack is initiated from a large number of attackers. The motives and targets of DDoS attacks can greatly vary. The DDoS attack is that they involve concerted efforts to saturate the victim machine (often a webserver) with a large volume of traffic, which causes the server unable to respond to authenticated user requests. The most common way of executing a DDoS involves the use of a system of corrupted/infected nodes, which is called as botnet.
Page 11
3. RELATED WORK
Legitimate Chance Inspection Algorithm (LCIA) [5] is a new mitigationtechnique based on hop count inspection across legitimate identification. Stephen M. Specht et.al. [1] had proposed taxonomies of DDoS attacks, tools, and countermeasures to assist span the DDoS trouble, also to facilitate more comprehensive solutions. Simpson S. Lindsay et.al. [2] had proposed a plan to mitigate bandwidth-starvation DDoS attacks. D. Garg [3] had analyzed the attacks based on the severity, position of attacker and real time of attack. Yu. Chen et.al [4] had proposed that it is essential to minimize the illegitimate traffic at the time of filtering DDoS attack flows. DDoS defense systems may coincidently reject a sure portion, of legitimate users access by mistaking them as attackers. A. Challita et.al. [6] had proposed the packet funneling system to moderate the effect of the attacker on the victim. In this approach, the congested traffic is funneled before sending to the destination. It continuously searches spoofed IP addresses and handles the DDoS attacks without blocking any legal packets. Debra L. Cook et.al. [7] had presented an architecture called as WebSoS, which allows legitimate users to access a web server in the presence of a DOS attack. They utilized various cryptographic mechanisms for authentication, packet filtering, overlay networks, and consistent hashing for providing service to authorized users trying to contact a web server under attack. G. Jin et.al. [8] had presented a simple and effective method called as hopcount-based filtering scheme, which detects and removes spoofed IP packets to make system Resources more secure. HCF can eliminate about 90% of spoofed traffic even though an attacker is aware of HCF. It can be easily implemented in the Linux kernel.R. Mahajan et.al. [9] had proposed a system for local and cooperative mechanisms. It resolves the attacks in the network for aggregate-based congestion control. This system is useful in controlling of DDoS attacks and Flash crowds. J. Ioannidis et.al. [10] had proposed a mechanism that treats DDoS attacks as the problem of congestion control, and actions by identifying and intentionally dropping traffic aggregates responsible for such congestion. Jelena Mirkovi et.al. [11] had proposed the D-WARD that offers an effective defense against distributed denial-of-service attacks. By applying that defense at the point where DDoS traffic enters the network, D-WARD isable to spread the deployment cost among many systems and remove the useless load of DDoS traffic from the Internet as a whole. In a few seconds, DWARD can detect many common forms of DDoS attacks, and can dramatically reduce their effect almost immediately. More sophisticated attacks, such as those that slowly increase their sending rates, take longer to detect, but D-WARD controls them almost as soon as they have sufficient volume to affect the victim. At the same time, legitimate flows from the source network proceed unharmed. A. Yaar et.al. [12] had proposed an approach to defend against DDoS attacks called as Pi. It is related with marking paths from the elements of IP trace back systems, which can be used to filter each incoming packet. A. Yaar et.al. [13] had presented a new method to mark and filter the packet in the Pi defense scheme, called a StackPi. It is a stack based method that permits a DDoS sufferer to select the optimal threshold value for the Pi filter. Also they proposed a system in which IP data of each packet, making it far less likely that an attacker will successfully bypass the filter. Yu Chen et.al. [14] had introduced a scheme to identify malicious flow and cutoff called MAFIC. They used adaptive packet dropping and probing algorithm. Malicious attacks are exactly identified by observing the reply to packet loss from the flow source and all those packets are dropped before reaching the victim.
Page 12
Figure 1: Legitimate Chance Inspection Scheme Figure 1 shows the scheme of the Legitimate Chance inspection Algorithm. LCIA algorithm maintains the malicious flow table and suspicious flow table for maintaining malicious and suspicious attacks respectively. Incoming packets will be received and checked with the flow tables and legitimate clients are identified. The LCIA algorithm mitigates DDoS attacks by identifying the legitimate packets from the malicious attack packets. In this algorithm, time constraints values are generated for frequently refreshing the white list instead of a user. So, it effectively maintains white list of legitimate clients. In LCIA algorithm, all incoming traffic is maintained in the common IP table. Through this table packets will be generated and send to the victim server. Packet information status can be known through the detection analysis. In malicious flow table (MFT), all continuous IP addresses will be monitored and stored it into that table. Using traffic normalization rule, the unwanted packets from this table should be dropped immediately. Suspicious flow table (SFT) consists of all doubtful packets from the incoming traffic. Client puzzle algorithm will be used to remove all suspicious packets from the SFT. After filter malicious packets, routers find any suspicious packets that should be stored in a suspicious flow table. White list contained all illegitimate client IP addresses. It should be refreshed frequently with particular time intervals. Legitimate Chance Inspection Algorithm (LCIA) used to generate the time intervals for refreshing the white list. Instead of refreshing a user, this algorithm will refresh the entire white list frequently. So, the attacker cannot spoof the legitimate clients IP addresses. White list can effectively maintain the legitimate clients.
5. PROPOSED WORK
In network once an attack victim is discovered, it isimportant to carry out defense mechanisms to allowthe victim host to be accessible for legitimate user.The LCIA algorithm presents a problem of how to differentiate attack traffic from thelegitimate traffic efficiently and accurately toreduce the malicious attack damages. The algorithm is as follows Step 1: Initialize incoming traffic count. Step 2: For each incoming traffic, maintain common IP tables. Step 3: Generate packets from the IP tables. Step 4: For each value of packet count = 1 to n Extract malicious flow table andsuspicious flow tablefor each packet If (IP! = spoofed) Then Allow the packet Else Discard the packet Step 5: compute probability for SFT packets If (IP == spoofed) Then Discard the packets Else Allow the packets Step 6: repeat steps 4 & 5 until packet
Page 13
Page 14
Figure 3: packet transfer with minimum delay, cost and intermediate path In Figure 4 Data transfer is plotted against the cost. In the graph only three data transfers are considered. It is observed that cost required in a legitimate chance inspection algorithm is very less as compared with normal traffic flow. It shows that when the DDoS packets rate is increased, legitimate chance inspection scheme has better average throughput of normal packets than the other two schemes. So, the Legitimate Chance Inspection scheme can effectively reduce the traffic of malicious users.
Figure 4. Number of Data Transfers versus Cost (Average throughput of DDoS packets under DDoS attacks using LCIA, Traffic normalization rule) Figure 5 shows that the Packet loss using LCIA algorithm (Green Color) is less than normal traffic flow (Red Color).
Figure 5: Packet loss using LCIA algorithm (Green Color) is less than normal traffic flow (Red Color).
Page 15
Figure 6: Network Load using normal traffic flow (Red Color) and using LCIA algorithm (Green Color). Figure 7 shows the graph of delay for the packet transmission using LCIA algorithm(Green color) which reduced as compared to the normal traffic flow (Red color).
Figure 7: Transmission delay by using normal traffic flow (Red Color) and using LCIA algorithm (Green Color). Figure 8 shows the network simulation of the data transfer from the source node to the destination node by refreshing the IP addresses of the nodes with the specific time interval.
Page 16
REFERENCES
[1] S. M. Specht and R. B. Lee, Distributed Denial of Service: Taxonomies of Attacks, Tools and Counter measures, Proc. PDCS, 2004 [2] Simpson, S., Lindsay, A.T., Hutchison D., Identifying Legitimate Clients under Distributed Denial-of-Service Attacks in Network and System Security (NSS), IEEE, 2010. [3] D. Garg, DDoS Mitigation Techniques-A Survey, International Conference on Advanced Computing, Communication and Networks, 2011. [4] Yu Chen, Wei-Shinn Ku, Kazuya Sakai and Christopher De Cruze., A Novel DDoS Attack Defending Framework with Minimized Bilateral Damages, CCNC, IEEE, 2010. [5] R.B.Vinothkumar and S.K.Lavanya, Legitimate Chance Inspection for Identifying Legitimate Clients under DDoS Attacks, International Conference on Computer Communication and Informatics (ICCCI -2012), Jan 2012. [6] A. Challita, M.E. Hassan, S. Maalouf and A. Zouheiry, A Survey of DDoS Defense Mechanisms, FEA Student Conference, 2004. [7] D. L. Cook, W. G. Morein, A. D. Keromytis, V. Misra, and D. Rubenstein, WebSOS:` Protecting Web Servers from DDoS attacks, Proceedings of the 11th IEEE International Conference on Networks (ICON 2003), pp.455460,September 2003. [8] G. Jin, H. Wang, and K. G. Shin, Hop-count Filtering: An Effective Defense against Spoofed DDoS Traffic,Proceedings of the 10th ACM Conference on Computer andCommunication Security, 2003. [9] R. Mahajan, S. Bellovin and S. Floyd, Controlling High Bandwidth Aggregates in the Network, ACM SIGCOM Computer Communications Review, July 2002, pp. 62 73. [10] J. Ioannidis and S.M. Bellovin, Implementing Pushback: Router-Based Defense against DDoS attacks, in NDSSThe Internet Security, 2002. [11] J. Mirkovic, G. Prier, and P. Reiher, Attacking DDoS at the Source, IEEE International Conference on Network Protocols, 2002. [12] A. Yaar, A. Perrig, and D. X. Song, Pi: A Path Identification Mechanism to Defend Against DDoS Attack, IEEE Symposium on Security and Privacy IEEE Computer Society, pp. 93107, 2003. [13] A. Yaar, A. Perrig, and D. Song, StackPi: New Packet Marking and Filtering Mechanisms for DDoS and IPSpoofing Defense, IEEE Journal on Selected Areas inCommunications, vol. 24, no. 10, pp. 18531863, 2006. [14] Y. Chen, Y. Kwok, and K. Hwang, MAFIC: AdaptivePacket Dropping for Cutting Malicious Flows to PushBack DDoS Attacks, IEEE International Conference on Distributed Computing Systems Workshops, pp. 123-129, June 2005.
Page 17