Distributed Denial of Service Attacks
eBook - ePub

Distributed Denial of Service Attacks

Real-world Detection and Mitigation

  1. 398 pages
  2. English
  3. ePUB (mobile friendly)
  4. Available on iOS & Android
eBook - ePub

Distributed Denial of Service Attacks

Real-world Detection and Mitigation

About this book

Distributed Denial of Service (DDoS) attacks have become more destructive, wide-spread and harder to control over time. This book allows students to understand how these attacks are constructed, the security flaws they leverage, why they are effective, how they can be detected, and how they can be mitigated. Students use software defined networking (SDN) technology to created and execute controlled DDoS experiments. They learn how to deploy networks, analyze network performance, and create resilient systems.

This book is used for graduate level computer engineering instruction at Clemson University. It augments the traditional graduate computing curricula by integrating: Internet deployment, network security, ethics, contemporary social issues, and engineering principles into a laboratory based course of instruction. Unique features of this book include:

  • A history of DDoS attacks that includes attacker motivations
  • Discussion of cyber-war, censorship, and Internet black-outs
  • SDN based DDoS laboratory assignments
  • Up-to-date review of current DDoS attack techniques and tools
  • Review of the current laws that globally relate to DDoS
  • Abuse of DNS, NTP, BGP and other parts of the global Internet infrastructure to attack networks
  • Mathematics of Internet traffic measurement
  • Game theory for DDoS resilience
  • Construction of content distribution systems that absorb DDoS attacks

This book assumes familiarity with computing, Internet design, appropriate background in mathematics, and some programming skills. It provides analysis and reference material for networking engineers and researchers. By increasing student knowledge in security, and networking; it adds breadth and depth to advanced computing curricula.

Trusted by 375,005 students

Access to over 1.5 million titles for a fair monthly price.

Study more efficiently using our study tools.

Information

Year
2020
Print ISBN
9780367491543
eBook ISBN
9781351817646
1
Introduction
As a result of growing dependence on the Internet by both the general public and service providers, the availability of Internet services has become a concern. While DoS attacks cause inconvenience for users and revenue loss for service providers, their effects on critical infrastructures like the smart grid and public utilities could be catastrophic. For example, an attack on a smart grid system can cause cascaded power failures and lead to a major blackout.
In this book, we study Distributed Denial of Service (DDoS) attacks by using operational network data. Testing and developing DoS practical attack detection and mitigation systems is crucial. However, it was previously not possible to use operational networks for studying DoS. Therefore most studies used computer simulations. We experiment using operational system data and perform real attacks without disturbing the original system. This lets us evaluate the performance of our approaches compared with a real ground truth.
Using our approach, we analyzed the detection performance of anomaly-based DDoS detection approaches using both the packet count and entropy of packet header fields. These approaches are tested on low and high network utilization levels to see the effect network excess capacity has on attack detection. We compared our results with previously published ones and pointed out the significant differences we found. These differences were caused by the inappropriate assumptions about network background and attack traffic in network simulations. In addition, we present a new detection approach: Cusum - Entropy which performs additional signal processing on the entropy of the packet header field to improve detection efficiency.
Information theory metrics, like Shannon entropy and generalized entropy, are common in recent DDoS detection publications. They are effective features for detecting these attacks. However, intrusion detection systems (IDS) using entropy-based detection approaches can easily become victims of spoofing attacks. An attacker can sniff the network and calculate background traffic entropy before a (D)DoS attack starts. They can spoof attack packets to keep the entropy value in the expected range during the attack. We explain the vulnerability of entropy-based network monitoring systems. Then, we presented a proof of concept entropy spoofing attack and show that by exploiting this vulnerability, the attacker can either avoid detection or degrade detection performance to an unacceptable level.
Attack detection is important for DDoS mitigation systems. The performance of detection approaches varies depending on the network conditions like changing utilization level. It is even possible to conceal a network anomaly in order to deceive a detection system. In addition, when a detection system moves away from the victim on the network, accurate detection requires more time; and most of the time it is too late when an attack is detected. We designed our mitigation system to increase service availability by scaling up the system resources using multiple cloud service providers when it is necessary. The system reduces the operation cost by reducing the number of caches when they are unnecessary. The experiment results showed the effectiveness of the proposed system.
This book provides an extensive analysis of the Distributed Denial of Service (DDoS) problem using operational network data. To design an effective attack mitigation system, it is important to understand how attackers leverage system flaws. Researchers should investigate the techniques attackers use and recreate the attack scenarios to gain better insight. In addition, to have a better understanding of system behavior under different circumstances, an operational system data should be used in these studies. When designing a DDoS mitigation system, understanding how to perform a successful DDoS attack on an operational network, fundamental concepts of detecting these attacks and deceiving the attack detection approaches are invaluable knowledge.
1.1Performance Testing and Analysis of DDoS Detection Approaches
When studying Internet security, researchers typically cannot test new methods on the operational network, because of the risk of disturbing users. Most studies use simulated network background and attack traffic [69, 113, 570], scenario specific data sets [349, 653], or simulated attacks on live traffic traces [100, 96, 294, 195, 438, 114]. However there is no known formula for modeling network traffic [613], so it is not possible to accurately simulate it. Results obtained when using DDoS detection approaches on an operational network should differ significantly from simulation-based results.
In this work, we presented a novel approach to performing a disruptive network security experiment using operational network data without jeopardizing the network. We used Clemson University campus network traffic as background traffic and performed DDoS attacks on our experiment setup using the Clemson University Condor [135] computer cluster. We used this approach to analyze the efficiency of detection methods on an operational network. We concentrated on anomaly-based detection approaches using packet count and entropy of packet header fields. These approaches are tested on low and high network utilization levels to see the effect of network excess capacity on attack detection.
1.2Deceiving DDoS Detection
Information theory-based metrics (Hartley entropy, Shannon entropy, Renyi’s entropy, generalized entropy, Kullback-Leibler divergence and generalized information distribution) are popular and widely used for intrusion detection because of their low computation overhead [63]. Google Scholar cites more than 250 entropy-based DDoS detection journal articles and conference papers published in 2014.
We presented an important vulnerability of network monitoring systems using entropy. We introduced a proof of concept spoofing attack showing it is possible to deceive entropy-based DoS detection approaches [454, 455]. To deceive entropy-based DoS detection, we generated spoofed packets to make the traffic entropy during the attack indistinguishable from the entropy before the attack. Our attack not only deceived the detection approach, but also helped the denial of service attack. Furthermore, entropy spoofing can be combined with DDoS attacks to generate attack traffic which is invisible to entropy-based DDoS detection systems. In addition, false positives also degrade detection and by using entropy spoofing an attacker can generate false positives to degrade detection efficiency.
1.3DDoS Mitigation
Detecting a DDoS attack before it reaches the victim is important. The attack detection becomes more difficult and accurate detection requires more time when the detection system moves away from the victim on the network [641] and generally it is too late by the time a DDoS flooding attack is detected.
Instead of waiting for an accurate detection to start mitigation, using cloud services, such as Amazon EC2 and Rackspace, to mitigate DDoS attacks [309, 369, 636] is a known technique. However, mitigation costs are very high for getting dedicated redundant resources. In addition, DDoS attacks might cause disruption of the services of clouds which allocate resources on demand [607, 632] and relying on one cloud service provider creates a single point of failure for the mitigation system.
We designed our mitigation system to increase service availability by scaling up the system resources using multiple cloud service providers when it is necessary. In our proposed system, the web server is hidden behind web caches. During an attack or a flash crowd, the server load will be distributed over multiple web caches, which are located in physically separated places. The system will reduce the operation cost by reducing the number of caches when they are not necessary.
1.4Organization
The content of this book is outlined as follows. This chapter, Chapter 1 describes the motivation behind the work by exploring the issues and challenges of DDoS attack detection and mitigation. It also provides motivation for our topic.
Chapter 2 gives background about DDoS attacks, their history and their current state. We present a literature review of DDoS attack detection and mitigation approaches and point out shortcomings with the current art. This is followed by Chapter 3, which provides a detailed history of the major stages in the development of DDoS attacks. They were originally little more than pranks that took advantage of the weakness of the early infrastructure. Over time they have evolved to be sophisticated distributed criminal enterprises that can generate enough traffic to overwhelm small countries. They have become instruments of war between nation states.
We follow the historical evolution of DDoS with a discussion of legal issues in Chapter 4. This chapter explains the laws related to DDoS attacks. We note that penalties for executing a DDoS attack can be rather severe. A number of hacktivists have been surprised by the ramifications of their participating in protests that use DDoS attacks. We will also discuss the ethical arguments for and against possible uses of DDoS attacks.
Chapter 5 discusses Internet Protocol (IP) network traffic. We will illustrate example histograms of IP network traffic. This introduction will help students understand what network communications traffic looks like, why IP histograms look the way they do, and the chall...

Table of contents

  1. Cover
  2. Half Title
  3. Title Page
  4. Copyright Page
  5. Dedication
  6. Contents
  7. Foreword
  8. About the Authors
  9. Acknowledgments
  10. Preface
  11. Contributors
  12. 1. Introduction
  13. 2. What is DDoS?
  14. 3. History and Motivation
  15. 4. Legal Considerations
  16. 5. DDoS Research: Traffic
  17. 6. DDoS Research: Testing
  18. 7. DDoS Research: Evaluation
  19. 8. Attack Detection
  20. 9. Deceiving DDoS Detection
  21. 10. Attack Mitigation
  22. 11. Security and DDoS in SDN: Opportunities and Challenges
  23. 12. Denial of Service Attack in Control Systems
  24. 13. Denial of Service Attack on Phasor Measurement unit
  25. 14. DDoS Lab
  26. 15. Conclusion
  27. 16. Appendix
  28. Bibliography
  29. Index

Frequently asked questions

Yes, you can cancel anytime from the Subscription tab in your account settings on the Perlego website. Your subscription will stay active until the end of your current billing period. Learn how to cancel your subscription
No, books cannot be downloaded as external files, such as PDFs, for use outside of Perlego. However, you can download books within the Perlego app for offline reading on mobile or tablet. Learn how to download books offline
Perlego offers two plans: Essential and Complete
  • Essential is ideal for learners and professionals who enjoy exploring a wide range of subjects. Access the Essential Library with 800,000+ trusted titles and best-sellers across business, personal growth, and the humanities. Includes unlimited reading time and Standard Read Aloud voice.
  • Complete: Perfect for advanced learners and researchers needing full, unrestricted access. Unlock 1.5M+ books across hundreds of subjects, including academic and specialized titles. The Complete Plan also includes advanced features like Premium Read Aloud and Research Assistant.
Both plans are available with monthly, semester, or annual billing cycles.
We are an online textbook subscription service, where you can get access to an entire online library for less than the price of a single book per month. With over 1.5 million books across 990+ topics, we’ve got you covered! Learn about our mission
Look out for the read-aloud symbol on your next book to see if you can listen to it. The read-aloud tool reads text aloud for you, highlighting the text as it is being read. You can pause it, speed it up and slow it down. Learn more about Read Aloud
Yes! You can use the Perlego app on both iOS and Android devices to read anytime, anywhere — even offline. Perfect for commutes or when you’re on the go.
Please note we cannot support devices running on iOS 13 and Android 7 or earlier. Learn more about using the app
Yes, you can access Distributed Denial of Service Attacks by Richard Brooks,İlker Özçelik in PDF and/or ePUB format, as well as other popular books in Computer Science & Computer Networking. We have over 1.5 million books available in our catalogue for you to explore.