By Olalekan KadriAqila Dissanayake.ppt
《By Olalekan KadriAqila Dissanayake.ppt》由会员分享,可在线阅读,更多相关《By Olalekan KadriAqila Dissanayake.ppt(37页珍藏版)》请在麦多课文档分享上搜索。
1、By Olalekan Kadri & Aqila Dissanayake,Prevention and Detection of DoS/DDoS,Presentation Outline,Introduction DDoS Defeating DDoS Attacks by Fixing the Incentive Chain Cooperative Filtering Cooperative Caching Fixing the Incentive Chain DDoS Defense by Offense Protection of Multimedia QoS against DoS
2、 The Intrusion Detection System Adaptive Transmission Management Conclusion and References,Introduction,A denial-of-service attack (DoS attack) is an attempt to make a computer resource unavailable to its intended users 11 This type of attack is characterized by malicious use of computer resources t
3、o its capacity, thereby preventing the legitimate use of such resources DoS attacks came into popularity in the year 2000 when websites such as Yahoo, Amazon, and CNN were crippled using these attacks 3,Introduction,The sources of DoS can be single or multiple as seen in Distributed Denial of Servic
4、e attacks (DDoS). DDoS make use of network of computers to launch the attack DDoS can be automated and several hosts can be attacked in minutes. 7,DDoS,Adapted from http:/ Process,Initiate a scan phase in which a large number of hosts (on the order of 100,000 or more) are probed for a known vulnerab
5、ility 7. Compromise the vulnerable hosts to gain access 7. Install the tool on each host 7. Use the compromised hosts for further scanning and compromises 7.,The Survey Papers,Defeating DDoS Attacks by Fixing the Incentive Chain,The authors argue that, although there is room for more improvements in
6、 technological solutions, the priority should be placed on economic solutions 1 Also, the paper argues that a “vast amount of research has been done on technological solutions while only a handful exist on economic aspects” 1. According to the paper “the parties that suffer the most are not in the b
7、est position to defend, while the parties in the best position do not suffer enough to defend” 1.,Defeating DDoS Attacks by Fixing the Incentive Chain,In order to deliver digital content successfully, collaboration of multiple parties are requiredThese include1 (1) Internet Content Providers (ICP) (
8、2) Backbone ISPs (3) Regional ISPs (4) End users Each one of these parties contributes and invests various amounts to the final product. Therefore successful delivery of content or the final product depends on the effort of each party.,An incentive chain is the set of value and monetary transactions
9、 along digital delivery channels 1. It can act as a glue to stick various parties together in collaboration In a DDoS scenario, defensive action taken by ISPs benefit ICPs and end users the most, but ISPs are rarely compensated which discourage them to take action against such attacks 1. The solutio
10、n is to transfer the incentives from the parties that suffer the most to the parties that are in the best position to defend 1. This is achieved by a “usage-based traffic pricing structure that stimulates cooperative filtering” 1.,The Digital Supply Chain and Cooperative Technological Solutions to D
11、DoS Attacks,The digital supply chain consist of the following 1 1. The Internet core, which consists of dozens of interconnected backbone ISPs who collectively maintain the backbone of the Internet. 2. The Internet cloud except the core, which consists of less than 10,000 regional ISPs that connect
12、to the core through one or several backbone ISPs and serve different geographical regions. 3. The edge of the Internet, which consists of around 100,000 networks that are locally administrated. 4. Millions of online computers including content servers and clients,The Digital Supply Chain Adapted fro
13、m 1,Cooperative Filtering,This works in 3 steps 1.Alarming - Intrusion Detection Systems (IDS) identify suspicious traffic and send out alarms.Tracing - Following the alarms, a tracing mechanism kicks in to track back each attack path as far as possible.Filtering - filters along every attack path th
14、at is configured to filter out attack traffic.,Ban IP-Spoofing at the Edge,One approach to filter out attack traffic is to ban IP-spoofing at the edge of the network 1. The reason being, if the source addresses are correct, then the tracing mechanism can accurately trace every bad packet and find th
15、e attackers which could result in the ISP banning those responsible IP Address.We think that even though this approach sounds like very effective, itll be very hard to implement. Especially with NAT (Network Address Translation) being widely used everywhere.If an ISP doesnt take NAT into account and
16、 ban IP Address that send DoS traffic, it could mean a lot of innocent users getting affected. One can argue that IP spoofing can be implemented at the very edge of the network like routers in a home network or a small organization.It can be done, but the problem is that most users in those networks
17、 do not understand what IP spoofing is yet alone DDoS attacks.,Ingress/Egress Filtering,Ingress Filtering controlling of traffic coming into a networkEgress Filtering controlling of traffic leaving from a networkIngress filtering can prevent certain DDoS attacks coming toward a network. Egress filte
18、ring can prevent internal systems from performing outbound IP spoofing attacks.,Cooperative Caching,Another solution is to divert and evenly distribute attack traffic from a victim into a large number of cache servers such that each stream of diverted traffic is not significant enough in volume to c
19、reate any congestion 1 “Cooperative caching is an effective solution to DDoS attacks when cooperative filtering is costly to implement, or when attack traffic is well concealed in legitimate data requests such that pattern recognition is technically difficult” 1 Also, both filtering and caching can
20、be jointly used to more effectively reduce and divert attack traffic.,The flow of the digital content is driven by two major sources 1 (1) End users demand to consume digital content (2) ICPs demand to publish digital contentEnd users and ICPs both pay directly to ISPs for internet connections 1. Re
21、gional ISPs pay larger regional ISPs and backbone ISPs for the internet connectivity 1. This series of payments is called the “incentive chain” 1.,These days most internet connections are subscription based meaning an end user or a regional ISP pays a fixed monthly fee to a regional ISP/backbone 1.T
22、he fee is paid for a certain traffic volume. Furthermore, most ISPs have extra bandwidth that is not being used. Why should ISPs use these unused resources to provide better services and help on cooperative filtering? More importantly, what are the costs and benefits an ISP will get by doing so? The
23、 costs will include administrative work in setting up filters and reduction in transmission performance due to filtering 1. Unfortunately the benefits for the ISPs are little to nothing as long as the DDoS attacks only take the extra bandwidth which the ISP does not use anyway 1.,The lack of increme
- 1.请仔细阅读文档,确保文档完整性,对于不预览、不比对内容而直接下载带来的问题本站不予受理。
- 2.下载的文档,不会出现我们的网址水印。
- 3、该文档所得收入(下载+内容+预览)归上传者、原创作者;如果您是本文档原作者,请点此认领!既往收益都归您。
下载文档到电脑,查找使用更方便
2000 积分 0人已下载
下载 | 加入VIP,交流精品资源 |
- 配套讲稿:
如PPT文件的首页显示word图标,表示该PPT已包含配套word讲稿。双击word图标可打开word文档。
- 特殊限制:
部分文档作品中含有的国旗、国徽等图片,仅作为作品整体效果示例展示,禁止商用。设计者仅对作品中独创性部分享有著作权。
- 关 键 词:
- BYOLALEKANKADRIAQILADISSANAYAKEPPT
