Scalable Network-Layer Defense Against Internet Bandwidth-Flooding Attacks
#1

Abstract
In a bandwidth-flooding attack, compromised sourcessend high-volume traffic to the target with the purpose of causingcongestion in its tail circuit and disrupting its legitimate communications.In this paper, we present Active Internet Traffic Filtering(AITF), a network-layer defense mechanism against such attacks.AITF enables a receiver to contact misbehaving sources and askthem to stop sending it traffic; each source that has been asked tostop is policed by its own Internet service provider (ISP), which ensuresits compliance. An ISP that hosts misbehaving sources eithersupports AITF (and accepts to police its misbehaving clients), orrisks losing all access to the complaining receiver—this is a strongincentive to cooperate, especially when the receiver is a popularpublic-access site.We show that AITF preserves a significant fractionof a receiver’s bandwidth in the face of bandwidth flooding,and does so at a per-client cost that is already affordable for today’sISPs; this per-client cost is not expected to increase, as long asbotnet-size growth does not outpace Moore’s law. We also showthat even the first two networks that deploy AITF can maintaintheir connectivity to each other in the face of bandwidth flooding.We conclude that the network-layer of the Internet can provide aneffective, scalable, and incrementally deployable solution againstbandwidth-flooding attacks.Index Terms—Denial-of-service defenses, network-level securityand protection, traffic filtering.
I. INTRODUCTION
I N A DISTRIBUTED bandwidth-flooding attack, a largenumber of compromised sources send high-volume trafficto the target in order to create congestion and packet loss in itstail circuit; as a result, the target’s communication to legitimatesources deteriorates. It has been shown that such attacks can exploitthe behavior of legitimate TCP sources (which back off inthe face of packet loss) to dramatically reduce their throughputor, in the case of long-lived flows, drive it to zero [1].Real-life reports complement such analysis: The first welldocumentedincident we are aware of is the 2001 attack againstthe Gibson Research Corporation (GRC) web site. To blockthe flood, GRC analyzed the undesired traffic, determined itssources, and asked from their Internet service provider (ISP) tomanually install filters that blocked traffic from these sources;in the meantime, their site was unreachable for more than 30hours [2]. More recent attacks are less well documented (the victims are increasingly unwilling to reveal the details), but hintthat botnet sizes have increased beyond thousands of sources,while undesired traffic is harder to identify—an article on a 2003attack against an online betting site reports that the undesiredtraffic came from more than 20 000 sources, its rate ranged from1.5 to 3 Gbps, and it was addressed at routers, DNS servers, mailservers, and web sites [3]. Despite the magnitude of the problemand the indications that it is getting worse, no effective solutionhas been deployed yet.There are two basic steps in stopping a bandwidth-floodingattack: 1) identifying undesired traffic and 2) blocking it; thispaper addresses the latter. To prevent undesired traffic fromcausing legitimate-traffic loss, it must be blocked before enteringthe target’s tail circuit, for example, inside the target’sISP. The first solution that comes to mind is to automate the approachfollowed by GRC: one can imagine an ISP service, inwhich a flooding target sends filtering requests to its ISP, and,in response, the ISP installs wire-speed filters (i.e., filters that donot affect packet-forwarding performance) in its routers to satisfythese requests; each filtering request specifies traffic fromone undesired-traffic source to the target.The problem with this approach is that it requires more resourcesthan ISPs can afford: Wire-speed filters in routers are ascarce resource, and this is not expected to change in the nearfuture. Modern hardware routers forward packets at high ratesthat allow only few lookups per forwarded packet; to reduce thenumber of per-packet lookups, router manufacturers store filters—as well as any state that must be looked up per packet,e.g., the router’s forwarding table—in TCAM (ternary contentaddressable memory), which allows for parallel accesses. However,because of its special features, TCAM is more expensiveand consumes more space and power [4] than conventionalmemory; as a result, a router linecard or supervisor-engine cardtypically supports a singleTCAM chip with tens of thousands ofentries. For example, at the time of writing, the Catalyst 4500, amid-range switch, provides a 64 000-entry TCAM to be sharedamong all its interfaces (from 48 to 384 100-Mbps interfaces);Cisco 12 000, a high-end router used at the Internet core, provides20 000 entries that operate at line-speed per linecard (eachlinecard has up to 4 1-Gbps interfaces). So, depending on howanISP connects its clients to its network, each client can typicallyclaim from a few hundred to a few thousand filters—not enoughto block the attacks observed today and not nearly enough toblock the attacks expected in the near future


Download full report
http://infoscience.epfl.ch/record/128395...fTon09.pdf
Reply

Important Note..!

If you are not satisfied with above reply ,..Please

ASK HERE

So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page
Popular Searches: an example of the defense mechanism, seminar topics related to the mobile ip network layer, internet security against hacking systems ppt, routing network layer, seminar on a near optimal social network defence against sybil attacks, disadvantage of on the security of randomized arithmetic codes against ciphertext only attacks document, syn flooding,

[-]
Quick Reply
Message
Type your reply to this message here.

Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Possibly Related Threads...
Thread Author Replies Views Last Post
  A neural network based artificial vision system for licence plate recognition on reception projectsofme 2 2,765 27-07-2013, 11:57 AM
Last Post: computer topic
  Secured Data Transmission through Network seminar surveyer 2 2,320 26-04-2013, 02:02 PM
Last Post: computer topic
  Automatic power meter reading system using GSM network Electrical Fan 16 14,405 11-04-2013, 11:02 AM
Last Post: computer topic
  Scalable Multicasting in Mobile Ad Hoc Networks smart paper boy 1 1,427 29-11-2012, 01:06 PM
Last Post: seminar details
  Toward Practical Opportunistic Routing With Intra-Session Network Coding seminar class 1 1,628 22-11-2012, 01:26 PM
Last Post: seminar details
  On-line emission and economic load dispatch using adaptive Hopfield neural network computer science topics 4 3,401 24-10-2012, 04:02 PM
Last Post: seminar details
  A REMOTE HOME SECURITY SYSTEM BASED ON WIRELESS SENSOR NETWORK, ZIGBEE AND GSM TECHN seminar surveyer 5 9,504 24-02-2012, 12:54 PM
Last Post: seminar paper
  BANDWIDTH ESTIMATION FOR IEEE 802.11 BASED ADHOC NETWORK computer science crazy 6 5,066 15-02-2012, 02:01 PM
Last Post: dtanvi
  PGS: Parking Guidance System based on Wireless Sensor Network seminar class 1 1,975 14-02-2012, 01:24 PM
Last Post: seminar paper
  Neural Network-Based Face Detection computer science crazy 2 1,981 13-02-2012, 02:30 PM
Last Post: seminar paper

Forum Jump: