On the effectiveness of route-based packet filtering for distributed DoS attack prevention in power-law Internets

被引:126
作者
Park, K [1 ]
Lee, H [1 ]
机构
[1] Purdue Univ, Dept Comp Sci, Network Syst Lab, W Lafayette, IN 47907 USA
关键词
D O I
10.1145/964723.383061
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Denial of service (DoS) attack on the Internet has become a pressing problem. In this paper, we describe and evaluate route-based distributed packet filtering (DPF), a novel approach to distributed Dog (DDoS) attack prevention. We show that DPF achieves proactiveness and scalability, and we show that there is an intimate relationship between the effectiveness of DPF at mitigating DDoS attack and power-law network topology. The salient features of this work are two-fold. First, we show that DPF is able to proactively filter out a significant fraction of spoofed packet flows and prevent attack packets from reaching their targets in the first place. The IP flows that cannot be proactively curtailed are extremely sparse so that their origin can be localized-Le., IP traceback-to within a small, constant number of candidate sites. We show that the two proactive and reactive performance effects can be achieved by implementing route-based filtering on less than 20% of Internet autonomous system (AS) sites. Second, we show that the two complementary performance measures are dependent on the properties of the underlying AS graph. In particular, we show that the power-law structure of Internet AS topology leads to connectivity properties which are crucial in facilitating the observed performance effects.
引用
收藏
页码:15 / 26
页数:12
相关论文
共 26 条
[1]  
[Anonymous], 1979, Computers and Intractablity: A Guide to the Theoryof NP-Completeness
[2]  
[Anonymous], 2000, P 2000 ACM SIGCOMM C
[3]  
[Anonymous], 2000, Building Internet Firewalls
[4]  
Banga G, 1999, USENIX ASSOCIATION PROCEEDINGS OF THE THIRD SYMPOSIUM ON OPERATING SYSTEMS DESIGN AND IMPLEMENTATION (OSDI '99), P45
[5]  
BELLOVIN S, 2000, ICMP TRACEBACK MESS
[6]  
Burch H, 2000, USENIX ASSOCIATION PROCEEDINGS OF THE FOURTEENTH SYSTEMS ADMINISTRATION CONFERENCE (LISA XIV), P319
[7]  
Faloutsos M, 1999, COMP COMM R, V29, P251, DOI 10.1145/316194.316229
[8]  
Ferguson Paul, 2000, Network Ingress Filtering: Defeating Denial of Service Attacks Which Employ IP Source Address Spoofing, DOI [10.17487/rfc2827, 10.17487/RFC2827]
[9]  
GARBER L, 2000, DENIAL OF SERVICE AT, P12
[10]  
GOVINDAN R, 1997, P IEEE INFOCOM 97