DDo SAttacksand Countermeasuresin Cyberspace
DDo SAttacksand Countermeasuresin Cyberspace
net/publication/279176025
CITATIONS READS
21 6,907
3 authors:
SEE PROFILE
All content following this page was uploaded by Khan Zeb on 25 June 2015.
Abstract— In cyberspace, availability of the resources is the key but unfortunately with the fast growth of the Internet, the
component of cyber security along with confidentiality and number of attacks has been increased over the past years.
integrity. Distributed Denial of Service (DDoS) attack has According to the annual Computer Security Institute (CSI)
become one of the major threats to the availability of resources in computer crime and security survey 30 to 40% of the
computer networks. It is a challenging problem in the Internet.
participants in the conducted survey between 1999 and 2005
In this paper, we present a detailed study of DDoS attacks on the
Internet specifically the attacks due to protocols vulnerabilities in were victims of DoS attack [6]. Similarly, during the period of
the TCP/IP model, their countermeasures and various DDoS 2006 to 2009, 21 to 29% of the participants were victims of
attack mechanisms. We thoroughly review DDoS attacks defense DoS attack [7]. On September 28, 2012, DDoS attacks were
and analyze the strengths and weaknesses of different proposed carried on the major U.S. banks including JPMorgan Chase &
mechanisms. Co. (JPM) and Wells Fargo (WFC) & Co., breaching their
most advanced computer defenses and exposing the
Keywords— Cyber-attack, Cyber security, DDoS attack, vulnerability of their infrastructure [8]. According to the 2013
Mitigation, Vulnerability, DDoS Defense, Cyberspace Worldwide Infrastructure Security Report, DDoS attacks are
increasing in size. In 2014, it reached to 325 Gbps and around
I. INTRODUCTION 28,030 attacks over 10 Gbps are recorded between January
and September [9].
In a computer network, denial of service (DoS) takes place In this paper, we present a detailed study of DoS and
when any resource of interest such as operating system, DDoS attacks in the Internet, their victims and possible form
application, processing bandwidth, communications, routing of attacks, and the challenges in defending against these
services and memory or queue position is not available to attacks. Furthermore, to study the existing work that
intended users. DoS may occur due to high demand of contributes in solving these challenges and defending against
authentic users (e.g., congestion and flash crowd) or an un- various attacks. Since most of the DDoS attacks are due to the
malicious fault (e.g., network outage) or it may occur due to vulnerabilities in the protocols at different layers of the
malicious actions carried out by unauthentic users on the TCP/IP model of the Internet. Therefore, our study is mainly
network, which is a DoS attack (e.g., SYN flooding) [1]. DoS focused on the exploration of different sort of DDoS attacks
attacks can be executed in two ways. The first way is to resulting from protocol vulnerabilities at different layers.
exploit software vulnerabilities of a victim by sending The remainder of the paper is structured as follows:
malicious packets and down the system. These vulnerabilities Section II presents the classification of DDoS attacks based on
could arise in different protocols of protocol stack in the vulnerabilities in protocols at different layers of TCP/IP
TCP/IP layers of the internet model. Hence, the attackers model. In Section III, the proposed defense mechanisms and
exploit these vulnerabilities to attack a victim. The second mitigations are presented. Lastly, Section IV presents our
way is to use excessive unwanted traffic to capture the concluding remarks.
resources that could be used by authentic traffic. Although,
the former could be protected by fixing known vulnerabilities II. DDOS ATTACKS CLASSIFICATION: BASED ON
the latter cannot be prevented easily [2]. PROTOCOLS VULNERABILITIES IN TCP/IP
When multiple sources are involved in DoS attack traffic, MODEL
then it is called Distributed Denial of Service (DDoS) attack
as shown in Fig 1. In DDoS attack, the attacker also known as It is usually the vulnerabilities in the protocols of different
bot master exploits any vulnerability in the protocols at the layers of the Internet architecture, which intruders exploit to
respective layers shown. In this way it compromises different launch DoS attacks. Attacker exploits certain features or
systems in the same/different networks. These systems are implementation bugs in protocols at the victim side in order to
called zombies or bots. With the help of hundreds of make it compromise and resource deficient for legitimate
thousands or more of such zombies, the attacker launches a users or crash it. We broadly classify DDoS attacks into four
massive attack to deplete the resources of the victim and gets categories based on protocol vulnerabilities in the
it down. Thus, the DoS act as the basic building block for corresponding TCP/IP layers of the Internet model as shown
DDoS. The two differ mainly in its scale of attack and mode in Figure 2. Furthermore, Table I shows our detailed analysis
of operation. DoS attack use a single victim to generate the and classification of some well-known DDoS attacks from
malformed traffic while DDoS attack use hundreds or each category, their targets, ways of attacks and overall
thousands of attacked hosts to generate malicious traffic and impact on the target resources [10-18]. In terms of impact,
also coordinating the attack among the hosts which keep DDoS attack could either be disruptive, i.e., complete denial
amplifying the DDoS, and thus complicating the problem of of service, or degrading, i.e., consuming some portion of the
defense [3, 4]. target resources [10, 11]. Although all DDoS attacks are
The Internet was originally designed to facilitate the degrading in nature in one way or another.
research and educational communities with an open and
scalable network [5]. The security issues were of less concern
978-1-4799-8172-4/15/$31.00 ©2015 IEEE
2) Router-Based Packet Filtering: This method uses
routing information to determine whether a valid packet has
arrived at a router with respect to its corresponding
source/destination addresses, given the reachability constraints
imposed by routing and network topology [21].
3) Source Address Validity Enforcement (SAVE)
Protocol: Messages that contain valid source address
information are propagated by SAVE to all destinations. Thus,
the intermediate routers builds a table containing blocks of
incoming valid source addresses to each of its links. Based on
this table the router determines that whether a packet comes
from the proper direction or not [22].
4) Hop count packet filtering (HCF): In this scheme
based on observations of the TTL value from the sender side,
the victim guesses the initial value of the TTL. The difference
between the observed and initial value of TTL is the hop
count. Usually the router creates a table of the most frequent
legitimate users and their corresponding hop counts. Thus,
Fig 1: Structure of a typical DDoS attack
according to this table, the spoofed packets are those packets
III. DEFENSE MECHANISMS that are either not present in the table or there is a mismatch
between hop counts and their source addresses according to
Defense against DDoS attacks is generally divided into the table. Consequently, based on this observation the victim
four areas, namely; attack prevention, attack detection, attack drops the spoofed packets [23].
source identification and attack reaction. We briefly describe
the well-known defense techniques under each area proposed B. Attack Detection
in the literature. The strengths and limitations of each
technique are tabulated in Table II. We also tabulate the ways In attack detection, we monitor and investigate the systems
of mitigating a DDoS attack on each of the TCP/IP layers in in order to determine such events that cause DoS. Attack
Table III [19]. detection can broadly be classified as conventional high rate
DDoS attack detection and low rate DDoS attack detection.
A. Attack Prevention Conventional high rate DDoS attacks overwhelm the victim’s
resources to deny service to legitimate users, whereas low rate
The main aim of attack prevention is to stop attacks prior DDoS attack aims to cause packet loss of legitimate users by
to actual damage. This approach comprises of schemes attacking with short bursts of packets periodically. In this
deployed in routers for filtering malicious packets and subsection, we briefly discuss only the conventional high rate
allowing only legitimate packets to pass. DDoS attack detection techniques, their corresponding
1) Ingress/Egress Filtering: Allows the incoming and strengths and weaknesses are discussed in Table II. Besides
outgoing traffic in the network only if the source addresses of this, we also list few well-known low rate DDoS attack
the traffic are in the range of expected IP addresses. In ingress detection techniques and their strengths and limitations in
filtering the traffic that enters to the local network is filtered, Table II. However, for their detailed description refer to the
while in egress filtering the traffic that leaves the local work in [24] and references therein.
network is filtered [20].
DDoS Attacks
SNMP, 6. SMTP o Memory 5. Higher rate of spoofed VoIP packets through 8. Degrading
RTP, 7. IRC o Disk/Database SIP with wide range of source IPs 9. Degrading
DHCP, 8. Mail Bombs bandwidth 6. Sending simple email messages to overload 10. Disruptive
NTP, SIP, 9. SQL Slammer o I/O bandwidth the SMTP server 11. Degrading
SSH, 10. Distributed 7. Botnet use IRC as a tool (C&C) for DoS
MGCP, Reflector/ attack
LDAP, etc. DNS Flood 8. Sending large volume of email to a mailbox
11. DNS Cache or email server
poisoning etc. 9. SQL Server and MSDE code buffer overflow
vulnerability is exploited
10. Recursive queries. Using third parties to hide
attack traffic sources
11. The insertion of fake address record for an
internet domain into the DNS to poison cache
1. Frag, opentear • End users: 1. Creates and send new IP fragments initially,
IP, ICMP, 2. Nestea, CPU and withholding the later fragment 1. Degrading
IGMP TearDrop, Jolt 2. Generate overlapping IP fragments 2. Degrading
• Server
ARP, etc. 3. Smurf 3. Spoofed PING request to a broadcast address 3. Disruptive
o Web
4. Fraggle 4. Spoofed UDP datagrams to broadcast 4. Disruptive
o Mail
5. Papasmurf addresses to port 7 (echo port) 5. Disruptive
o Proxy
6. Smack 5. Combination of Smurf and Fraggle 6. Disruptive
o DNS
7. IP address 6. ICMP unreachable packets from random IP 7. Disruptive
o Certificate
Internet Layer
Switches
Token ring, 2. MAC Flood 2. Multiple dummy Ethernet frames with 2. Disruptive
• DHCP server
Frame 3. DHCP Attacks spoofed MAC addresses 3. Disruptive
• End System: 4. Disruptive
relay, ATM 4. ARP Attacks Hosts 3. Broadcast DHCP request with spoofed MAC
etc., addresses
4. Spoofed ARP messages on LAN by
exploiting ARP protocol
Conventional (High rate) DoS attack detection techniques instead of storing actual packets the digests of packets are
for High rate DoS attacks are divided into two groups: stored [30]. For the traceback, the target sends a traceback
signature-based detection and anomaly-based detection. In query to the upstream traceback routers. After the
signature-based detection, the known features of DoS attacks identification of this packet from its records, the router passes
are used for the detection, whereas in anomaly-based it to its neighbor routers. In this way the packet origin can be
detection, the normal traffic behavior is used for the detection trackbacked and identified.
of anomalies. [25].
D. Attack Reaction
1) Signature Based Detection: This mechanism
identifies unique patterns in known DoS attacks and In Attack Reaction, the victim responds to the attack after
differentiates them from normal patterns. Based on this detection. In these techniques the responsibility of detecting
differentiation, a database of known attack patterns is and fighting the attack lies on the victim itself.
constructed. These patterns are then used to identify the 1) Filtering and Limiting: Filtering mechanism filters
presence of malicious activities in the network [25]. the attack flows while rate-limiting mechanism rate-limits
1.1) MULTOPS: In this scheme, the packet rate is them. These mechanisms are carried out based on the
monitored for both up and down links for detection of DoS characterization of malicious traffic provided by detection
attacks [26]. It assumes the proportionality between packet mechanisms. Rate limiting is preferable in the scenarios where
rates of hosts during normal conditions. Thus, DoS attack is precise characterization of the attack traffic cannot be done or
detected if there is a proportional difference in these packet the detection has many false positives [25].
rates. 1.1) Pushback high-bandwidth aggregates: According to
1.2) Spectral Analysis: Usually the flow of DoS attack [31], aggregate-based congestion control (ACC) can be used
traffic does not follow the rules of TCP flow control protocols to control high bandwidth aggregates in the network. An
and their statistical features differ from normal flows. In aggregate is defined as the collection of packets from one or
spectral analysis, a signal is extracted based on the number of more flows having common properties. To identify and
packet arrivals in a fixed interval of time. The power spectral control an aggregate at a single router, ACC incorporates local
density of this signal will exhibit strong periodicity around its mechanisms. Moreover, a cooperative pushback mechanism
round-trip time in both directions of flow under normal queries upstream routers to control an aggregate. In case of
conditions, whereas an attack flow deviates from this severe congestion of the links indicated by high packet loss
behavior. Thus, based on this analysis DoS attack flows can rate, ACC is activated [25].
be identified [27]. 1.2) StopIt: The aim of this scheme is to prevent
2) Anomaly-Based DoS Detection: Statistical anomaly illegitimate traffic to the intended receiver without causing
detection comprises of two main parts: identification of damage to authentic sender hosts [32]. From the border
effective parameters (e.g., IP packet length, rate) to generate gateway updates, a StopIt server updates the addresses of
similarity measures, calculation of the similarity between other StopIt servers. The assumption is that StopIt servers can
predefined normal traffic profile and new traffic. For the authenticate their peers along with routers within its AS [25].
evaluation of differences between the monitoring traffic and 2) Capability: In these techniques the receivers are
the expected normal traffic, statistical methods that measure enabled to stop malicious senders.
the similarity such as chi-square and Kolmogrov-Smirnov 2.1) Stateless Internet Flow Filter (SIFF): To stop
tests [28, 29] are used. A DoS attack is detected if the unwanted flows from reaching the recipients network a SIFF
difference between the two traffic profiles is larger than a is designed in [33]. SIFF classifies Internet packet classes into
given threshold. privileged packets and unprivileged packets. Privileged
packets are subject to receiver’s control while unprivileged
C. Attack Source Identification packets are used in legacy traffic and in SIFF handshake. A
handshake process is initiated by sending a packet with its
Attack source identification aims to trace the attack capability field set to zero. This process is repeated by the
sources irrespective of the presence of erroneous information intermediate routers by marking into the capability fields.
in the source address fields of malicious requests. Forged IP Thus in this way the capability of the arriving packet is
source addresses and the stateless nature of IP routing prevent defined. The capability is sent back to the sender in case the
tracking IP traffic to its source. Attack source identification receiver wants to allow the sender to send privileged traffic.
techniques address this problem [2]. The subsequent packets are incorporated with the capability
1) IP Traceback by Active Interaction: Due to active by the senders which are privileged packets to the
interaction of routers with the attack traffic, the sources of intermediate routers. The routers forward the packets based on
attack are traced using the reaction of attack traffic [2]. the comparison of recomputed marking with the marking
2) Probabilistic IP Traceback Schemes: During the contained in the capability [25].
flow of incoming packets, each router probabilistically 2.2) Traffic Validation Architecture (TVA): This
embeds partial path information in them. Based on this technique limits the impact of DDoS floods. Using TVA
information, a target can traceback to the source by channels with capability are prevented from flooding attacks.
reconstructing the packet flow path [2]. Similarly, TVA [34] also limits attacks that flood the receiver
3) Hash-Based IP Traceback.: In this scheme, the using previously acquired capabilities. The process for
record of every incoming packet is kept by the router. To acquiring a capability is similar to that of SIFF.
minimize the memory constraint of storing packet records, a
Bloom filter is used. Moreover, for the protection of privacy,
Table II. DEFENSE TECHNIQUES WITH STRENGTH AND WEAKNESSES
TABLE III: WAYS OF MITIGATION FOR DDOS ATTACKS BASED ON TCP/IP PROTOCOL SUITE
• Monitor software applications that use sophisticated algorithms, technologies and approaches to detect attacks that are carried
out in Application layer.
• Offload SSL from the origin infrastructure
Application
Inspect attacks traffic signs in application traffic or policy violations at an applications delivery platform (ADP).
Forward re-encrypted traffic back to the origin infrastructure
• Updating the hardware and patching the known vulnerabilities.
ISPs use blackholing to prevent DDoS attacks.
Transport
Target completely isolates all traffic preventing further exploitation