Detection and Honeypot Based Redirection To Counter Ddos Attacks in Isp Domain
Detection and Honeypot Based Redirection To Counter Ddos Attacks in Isp Domain
Detection and Honeypot Based Redirection To Counter Ddos Attacks in Isp Domain
Authorized licensed use limited to: NATIONAL INSTITUTE OF TECHNOLOGY TIRUCHIRAPALLI. Downloaded on May 11, 2009 at 02:50 from IEEE Xplore. Restrictions apply.
Section 4. Section 5 shows the results and analysis. distribution of traffic features. For low as well as high
Last, the conclusion and the future work are presented rate attacks, traffic distributions have appreciable
in Section 6. deviation from normal to provide signs of DDoS
attack. The characterization of attack traffic is done by
2. Related Work first choosing suspicious flows based on volume and
then monitoring acks sent by the server for these flows.
Existing DDoS solutions are classified into four These schemes focus only on detection of attack
broad categories in [2]: Prevention, Detection and whereas the real culprits i.e. attack sources are not
characterization, Traceback, and Tolerance and trapped. The ideal solution for DDoS defense aims at
mitigation. Prevention is a mechanism which stops the mitigating attack at source. As characterization of
attacks before they are actually launched. The attack sources is very difficult to achieve ideally so a
approaches to stop IP spoofing [5], filtering malicious feasible solution is to redirect traffic from suspected
IP addresses based on experience [6], and repairing attack sources that can work in efficient manner to
security holes by patches [7] falls under this category. tolerate the attack. We also aim to sustain the services
The process of identifying that a network or server is of our protected server under high bandwidth DDoS
under attack after launch of the attack is called attacks using tolerance based scheme , however in our
detection. Detection can be passive, proactive, and on- work we have complemented tolerance and mitigation
line. Characterization means differentiating attack by dynamically rate limiting incoming traffic at edges
packets from legitimate packets. Signature based [8] based on share of traffic per edge router, and per flow.
techniques can detect attacks launched using known
DDoS attack tools, however to detect novel attacks 3. Approach
anomaly based techniques [9-11] are currently in Figure 1 shows the procedural flowchart of the
practice. Traceback aims to locate the actual attack approach.
sources regardless of the spoofed source IP addresses
used by attackers. Traceback solutions includes
controlled flooding [12], overlay network [13], ICMP Monitoring of Flows
messages [14], and IP packet marking [15] [16] based
techniques. Finally, Tolerance and mitigation aims to
Statistical Analysis
eliminate or curtail the effects of an attack and try to
maximize the quality of services under attack.
A commonly used detection approach is either Detec tion
192
Authorized licensed use limited to: NATIONAL INSTITUTE OF TECHNOLOGY TIRUCHIRAPALLI. Downloaded on May 11, 2009 at 02:50 from IEEE Xplore. Restrictions apply.
traffic destined to our server and not the complete ( H c ( X ) > ( H n ( X ) + a × d )) ∪
traffic is monitored at link through which POP is ( H c ( X ) < ( H n ( X ) − a × d )) ( 2)
connected to the server to backbone. POP collects
Here a ∈ I where I is set of integers and d is
information in a time window and calculates sample
deviation threshold. Tolerance factor a is a design
entropy H (X ) .
parameter and d is absolute maximum deviation in
A metric that captures the degree of dispersal or
concentration of a distribution is sample entropy. We Entropy H ( X ) from average value H n ( X ) while
start with frequency distribution profiling for network without attack.
X = {n i , i = 1,......, N } that feature i occurs n i times in the
sample. Then the sample entropy H ( X ) is 3.2. Characterization
H (X ) = −∑
N
( p i ) × log 2 ( p i ) (1)
In detection phase if H c ( X ) is more than normal
i =1
∑i =1 n i
N
Where p i = ni / S and S =
H n ( X ) then suspected malicious flows tend to have
The value of sample entropy lies in the range lower frequency values of packet arrivals and the
0 − log 2 N . The metric takes on the value 0 when the attack is termed as low rate degradation attack. While
distribution is maximally concentrated, i.e., all if H c ( X ) is less than normal H n ( X ) then
observations are the same. Sample entropy takes on the
value log 2 N when the distribution is maximally suspected malicious flows have high values of number
of packet arrivals and the attack is coined as high rate.
dispersed, i.e. n1 = n 2 = ....n n . We have done time series
Once the attack is launched at POP Ps , we have
analysis of traffic at POP Ps connected to protected aggregate of attack flows and normal flows. Let F
server. Consider a random process represent set of active flows. Then
{ X (t ), t = j∆, j ∈ N } running at Ps , where ∆ a F = Fn ∪ Fa (Fn ∩ Fa = φ) (3)
constant time interval is called time window, N is the
Where Fn represent actual normal flows and Fa is set
set of positive integers, and for each t , X (t ) is a
of actual attack flows. Our main task in this module is
random variable. Here X (t ) represents the number of *
to find Fa = { f 1 , f 2 ,... f m } ⊂ F
packet arrivals for a flow in t − ∆ , t . The entropy can
the set of m malicious flows. Ideally,
be computed as above.
It is found in our simulation without attack that ( Fa* ∩ Fa = F a) AND( Fa* ∩ Fn = φ )
Entropy H ( X ) value varies within very narrow limits Now the main problem is to find m :-
after slow start phase is over. This variation becomes • as for low rate attacks, m number of least
narrower if we increase ∆ i.e. monitoring period. We *
measured packet arrival flows constitute Fa .
take average of H (X ) and designate that as normal
• and for high rate attacks, m number of
entropy H n ( X ) . The basic idea is to remove small highest measured packet arrival flows form
scale perturbations by averaging over slightly longer- Fa* .
intervals of time. However it is also desirable that the
window duration should not exceed a limit. By this To answer these questions if we can find Φ a , the
way, normal profile of traffic in terms of entropy is expected total attack traffic then from following
obtained by our approach. To detect the attack, the
equation, we can find m and Fa* .
entropy H c ( X ) is calculated in shorter time m
window ∆ . We assume that the system is under attack
at time ta , which means that all attacking sources start
∑X
j =1
i
j
(t d + ∆) ≤ Φ a (4)
emitting continuously, whenever there is appreciable Where i is designated flow, j varying from 1 to m
deviation from H n ( X ) , attack is said to be detected. for least or highest measured packet arrivals, and
The network is in normal state for time t < t a and X (t d + ∆) represent packet arrivals for flow i in
next time window after attack is detected. The
turns into attacked state in time t a . Let t d denote our
expected value Φ a , is calculated as Φ a = Φ td − Φ n ,
estimate on t a . At time t d following event triggers
where Φ td the total traffic is received in {t d − ∆, t d }
193
Authorized licensed use limited to: NATIONAL INSTITUTE OF TECHNOLOGY TIRUCHIRAPALLI. Downloaded on May 11, 2009 at 02:50 from IEEE Xplore. Restrictions apply.
and Φ n is averaged total traffic till t d − ∆ from the
time bottleneck link utilization is 1.
*
The set Fa got through this process is further pruned
by omitting flows from F which have been active at
time t d − ∆ since we assume that all attack flows
start at the same time.
flows enroute or resetting sessions they are actively Point of Presence (POP)
Link between ISPs POP Link to server
Honeypot Server
Protected FTP Server
redirected from hostile sources to a honeypot. Customer domain
194
Authorized licensed use limited to: NATIONAL INSTITUTE OF TECHNOLOGY TIRUCHIRAPALLI. Downloaded on May 11, 2009 at 02:50 from IEEE Xplore. Restrictions apply.
5. Results and Discussion 9
Various aspects are discussed in this section: 8.9
8.8
5.1. Threshold setting 8.7
Entropy (H)
8.6 Normal
8.5
We conducted simulation experiments for finding 8.4 Under
out threshold for entropy under normal condition as per 8.3 Attack
simulation parameters given in previous section. The 8.2
normal range of entropy by using frequency 8.1
8
distribution of number of packets per flow ID
1.5
6.3
11.1
15.9
20.7
25.5
30.3
35.1
39.9
44.7
49.5
54.3
59.1
(SourceIP, SourcePort, DestinationIP, and Time (seconds)
DestinationPort) in time windows of 0.2 seconds is
shown in fig. 3. Simulation is also carried by taking Figure 2: Entropy for low rate DDoS attack
longer window of 1.0 second. Deviations are still lesser
as expected however average is almost same.
8.5
8.3
It is found that once the utilization of bottleneck 8.1
link is 100%. Entropy value also lies in small range as
Entropy (H)
7.9
7.7 H(3Mbps)
depicted in fig. 2. 7.5 H(N)
Maximum absolute deviation from average ( d ):- 7.3
7.1
0.03393 6.9
The server as per its capacity planning and normal 6.7
1.5
6.3
11.1
15.9
20.7
25.5
30.3
35.1
39.9
44.7
49.5
54.3
59.1
normally have an estimate of maximum number of
clients to be served at any instant of time. On these Time(seconds)
bases though we have bottleneck of 310Mbps but still Figure 3: Entropy for high rate DDoS attack
on the higher side for better link utilization we assume
to serve up to 400 legitimate clients with maximum However initially it can rise but with proper
1Mbps (average 0.8Mbps) request bytes per client. adjustment of window and start time, the same can also
Though our work is simulation based, but on actual be lumped. In this case, the flows which have
network for profiling purpose this kind of experiments comparatively higher share of packets are reasons of
can be conducted to find H n ( X ) and d . anomaly. Similar trends exist for high rate attacks at
different attack strengths with variation only in
deviation from normal value.
5.2. Detection of attack
As soon as any event in “2” triggers, attack is said 5.3. Variation in response time due to honeypot
to have occurred. Figure 2 shows entropy profile when redirection
our network is put under low rate attack. In this case
attack is launched with 100 attackers with mean rate In figure 4, the average response time increases with
0.3Mbps per attacker. Clearly in first time window increase in attack load for a fixed client load. There
after attack is launched at 20 seconds, there is jump in steep rise in average response time after initial stability
entropy value. The positive jump and persistent high is because of the fact that as the aggregate load (client
value as compared to normal reflects that it is a low load and attack load) become greater than bottleneck
rate attack and the flows which are causing this bandwidth of 310 Mbps, the legitimate packets are
anomaly have comparatively lesser frequency than dropped at POP. Repeated attempt for file transfer
already existing ones. In case of high rate attacks, from legitimate clients leads to a sharp increase in
entropy value tends to be lower than normal. In our average response time. The figure 4 also shows an
simulation using total attack strength of 300Mbps with edge over previous case due to presence of Honeypot
100 attackers, the Entropy variation is reflected in server in same IP as FTP server. Although the average
figure 3. response time increases with increase in attack load,
the absolute average response time is less.
195
Authorized licensed use limited to: NATIONAL INSTITUTE OF TECHNOLOGY TIRUCHIRAPALLI. Downloaded on May 11, 2009 at 02:50 from IEEE Xplore. Restrictions apply.
180 Computer Communications Review, Volume 34, Number
Average Response Time
160 April 2004.
No Honeypots;200 Clients
140
Presence of Honeypots;200
Clients
[3] Computer Crime Research Center. “2004 CSI/FBI
120
Computer Crime and Security Survey,” Available at:
http://www.crime- research.org/news/11.06.2004/423/.
100
[4] K. Kumar, R. C. Joshi, and K. Singh, “Detecting Low
80
Rate Degrading and High Bandwidth Disruptive DDoS
60 Attacks in ISP Domain,“ In Proceedings of ISCF-2006, pp.
40 83-88, December, 2006.
20 [5] P. Ferguson, D. Senie, “Network ingress filtering:
0 Defeating denial of ser-vice attacks which employ IP source
0 20 40 60 80 100 address spoofing,” RFC 2267, the Internet Engineering Task
Attack Load Force (IETF), 1998.
Figure 4. Comparison of variation in average [6] T. Peng, C. Leckie, and K. Ramamohanarao,“Protection from
response time with attack load for a given client Distributed Denial of Service attack using history-based IP
load (200 Clients) with and without honeypots. filtering,” In Proceedings of ICC 2003, USA, 2003.
[7] X. Geng, and A.B. Whinston, “Defeating Distributed
Denial of Service attacks,” IEEE IT Professional ,pp 36–42,
This is due to the fact that suspected attack flows 2002.
are directed towards Honeypot server and FTP server [8] M. Roesch, “Snort—Lightweight Intrusion Detection
remains free of attack, thus giving average response for Networks,” In Proceedings of LISA ’99, 1999.
time that maintains QoS. [9] T. M. Gil, and M. Poletto, “Multops: a data-structure for
bandwidth attack detection," In Proceedings of the 10th
6. Conclusions and future work USENIX Security Symposium, 2001.
[10] R. B. Blazek, H. Kim, B. Rozovskii, and A.
Tartakovsky, “A novel approach to detection of denial-of-
Our detection scheme is able to identify low rate service attacks via adaptive sequential and batch sequential
and high rate DDoS attacks reliably in ISP domain. change-point detection methods," In Proceedings of IEEE
The appreciable change in entropy indicates that traffic Systems, Man and Cybernetics Information Assurance
flow distributions are an effective way of detecting Workshop, 2001.
DDoS attacks. The increased entropy value signs low [11] J. Mirkovic, G. Prier, and P. Reiher, “Attacking DDoS
rate attack whereas dip in level of entropy marks high at the source,” In Proceedings of ICNP 2002, Paris,
rate attack. The characterization of flows is done in France, pp. 312–321, 2002.
subsequent time windows giving a real time solution. [12] H. Burch, and B. Cheswick, “Tracing anonymous
packets to their approximate source,” In Proceedings of 2000
The flows tagged as suspicious are redirected to
USENIX LISA Conference, pp.319–327, 2000.
honeypots. The proposed scheme greatly reduces the [13] R. Stone, “CenterTrack: An IP overlay network for
response time for legitimate users in the presence of an tracking DoS floods,” In Proceedings of 2000 USENIX
attack. Hence the scheme has the potential to defend Security Symposium, pp. 199–212, July 2000.
against DDoS attacks along with maintaining a [14] S. Bellovin, “The ICMP traceback message,” IETF
desirable QOS. Ns-2 has been used as a testbed for Internet Draft, 2000.
validation of the scheme. [15] D. Dean, M. Franklin, and A. Stubblefield, “An
The characterization of flows is volume based algebraic approach to IP traceback," ACM Transactions on
wherein sophisticated attacker may be able to emulate Information and System Security 5(2), 119-137, 2002.
[16] U.K. Tupakula, and V. Varadharajan, “A practical
the legitimate traffic. To overcome this, signal
method to counteract Denial of Service Attacks, “
processing based techniques can be used in conjunction Proceedings of the 26th Australian Computer
with the proposed scheme. Secondly, the overhead of Conference in Research and Practice in Information
state monitoring pose a DoS attack in itself. Future Technology, ACM International Conference Proceeding
focus is to distribute these overheads amongst multiple Series, pp. 204–275, 2003.
ingress POPs of ISP and validate the scheme using [17] A. Sardana , B. Gandhi and R. C. Joshi, “A Novel
goodput and NPSR as evaluation parameters. Framework for Characterization, Source Identification and
Mitigation of DoS Attacks, ” In Proceedings of ISCF-2006,
References pp. 99-108, December, 2006.
[18] NS Documentation Available:
[1] R.K.C. Chang, “Defending against Flooding-Based http://www.isi.edu/nsnam/ns
Distributed Denial-of-Service Attacks: A Tutorial,” IEEE [19] GT-ITM Traffic Generator Documentation and tool
Communication Magazine, 2002. http://www.cc.gatech.edu/fac/EllenLegura/graphs.html
[2] J. Mirkovic, and P. Reiher, “A Taxonomy of DDoS
Attack and DDoS defense Mechanisms,” ACM SIGCOMM
196
Authorized licensed use limited to: NATIONAL INSTITUTE OF TECHNOLOGY TIRUCHIRAPALLI. Downloaded on May 11, 2009 at 02:50 from IEEE Xplore. Restrictions apply.