|
Conference
Program
Program
At A Glance   Tutorials Program
Technical Program Outrageous
Opinions Session
Social Events
Technical Program
On the Effectiveness
of Route-Based Packet Filtering for Distributed DoS Attack Prevention
in Power-Law Internets
Kihong Park, Heejo Lee (Purdue University)
Denial of service
(DoS) attack on the Internet has become a pressing problem. In this
paper, we describe and evaluate route-based distributed packet filtering
(DPF), a novel approach to distributed DoS (DDoS) attack prevention.
We show that DPF achieves proactiveness and scalability, and we
show that there is an intimate relationship between the effectiveness
of DPF at mitigating DDoS attack and power-law network topology.
The salient
features of this work are two-fold. First, we show that DPF is able
to proactively filter out a significant fraction of spoofed packet
flows and prevent attack packets from reaching their targets in
the first place. The IP flows that cannot be proactively curtailed
are extremely sparse so that their origin can be localized---i.e.,
IP traceback---to within a small, constant number of candidate sites.
We show that the two proactive and reactive performance effects
can be achieved by implementing route-based filtering on less than
20% of Internet autonomous system (AS) sites. Second, we show that
the two complementary performance measures are dependent on the
properties of the underlying AS graph. In particular, we show that
the power-law structure of Internet AS topology leads to connectivity
properties which are crucial in facilitating the observed performance
effects.
As a DDoS prevention
architecture, DPF is able to emulate the IP traceback prowess of
probabilistic packet marking, while alleviating the latter's three
principal weaknesses: (i) need to inscribe link information in the
IP packet header, (ii) reactiveness---traceback occurs after the
impact of DoS attack has been felt---and (iii) scalability where
the effort needed to achieve IP traceback grows proportionally with
the number of attack hosts engaged in a DDoS attack.
Papers
are provided as a service to all by the members of ACM SIGCOMM.
This paper
is available in Adobe PDF format.
|