Collaborative detection of DDoS attacks over multiple network domains

被引:118
作者
Chen, Yu [1 ]
Hwang, Kai
Ku, Wei-Shinn
机构
[1] SUNY Binghamton, Dept Elect & Comp Engn, Binghamton, NY 13902 USA
[2] Univ So Calif, Dept Elect Engn, Los Angeles, CA 90089 USA
[3] Univ So Calif, Dept Comp Sci, Los Angeles, CA 90089 USA
[4] Auburn Univ, Dept Comp Sci & Software Engn, Auburn, AL 36489 USA
基金
美国国家科学基金会;
关键词
cyber defense; network security; DDoS attacks; and internet technology;
D O I
10.1109/TPDS.2007.1111
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
This paper presents a new distributed approach to detecting DDoS ( distributed denial of services) flooding attacks at the traffic-flow level. The new defense system is suitable for efficient implementation over the core networks operated by Internet service providers ( ISPs). At the early stage of a DDoS attack, some traffic fluctuations are detectable at Internet routers or at the gateways of edge networks. We develop a distributed change-point detection ( DCD) architecture using change aggregation trees ( CAT). The idea is to detect abrupt traffic changes across multiple network domains at the earliest time. Early detection of DDoS attacks minimizes the flooding damages to the victim systems serviced by the provider. The system is built over attack-transit routers, which work together cooperatively. Each ISP domain has a CAT server to aggregate the flooding alerts reported by the routers. CAT domain servers collaborate among themselves to make the final decision. To resolve policy conflicts at different ISP domains, a new secure infrastructure protocol ( SIP) is developed to establish mutual trust or consensus. We simulated the DCD system up to 16 network domains on the Cyber Defense Technology Experimental Research ( DETER) testbed, a 220- node PC cluster for Internet emulation experiments at the University of Southern California ( USC) Information Science Institute. Experimental results show that four network domains are sufficient to yield a 98 percent detection accuracy with only 1 percent false-positive alarms. Based on a 2006 Internet report on autonomous system ( AS) domain distribution, we prove that this DDoS defense system can scale well to cover 84 AS domains. This security coverage is wide enough to safeguard most ISP core networks from real-life DDoS flooding attacks.
引用
收藏
页码:1649 / 1662
页数:14
相关论文
共 43 条
[1]  
Aljifri H., 2003, IEEE Security & Privacy, V1, P24, DOI 10.1109/MSECP.2003.1203219
[2]  
ANDERSON T, 2006, ROCKETFUEL ISP TOPOL
[3]  
[Anonymous], 2401 IETF RFC
[4]  
BELLOVIN S, 2003, 3631 IETF RFC
[5]  
BENZEL T, 2006, P 2 IEEE C TESTB RES
[6]  
BLAZEK R, 2001, P IEEE WORKSH INF AS
[7]  
CAI M, 2007, IEE T DEPENDABLE SEC, V4
[8]  
Carl G., 2006, IEEE INTERNET COMPUT
[9]  
CHAKRABARTI A, 2002, IEEE NETWORK
[10]  
CHEN S, 2005, IEEE T PARALLEL DIST, V16