首页> 外文学位 >Scalable defense against Internet bandwidth flooding attacks.
【24h】

Scalable defense against Internet bandwidth flooding attacks.

机译:防御Internet带宽泛洪攻击的可扩展防御。

获取原文
获取原文并翻译 | 示例

摘要

During a distributed bandwidth-flooding attack, a large number of attack sources coordinate to send a high volume of undesired traffic to the victim with the purpose of exhausting its bandwidth. These attacks have proved difficult (sometimes impossible) to combat, as they require that action be taken before the victim's tail circuit. Current practice is typically restricted to the victim's administrator asking their ISP to manually install filters to block the attack, an approach increasingly insufficient as attacks become more sophisticated. The intuitive response is to automate this process, i.e., enable the victim to automatically compute undesired-traffic signatures and send filtering requests to its ISP. Yet, this approach faces significant challenges: Given the magnitude of currently witnessed attacks, it is unlikely that an ISP alone has enough resources to protect multiple attacked clients. Moreover, asking for help from other ISPs is complicated, in that it requires special inter-ISP relationships that do not exist today and raises security issues.; This dissertation presents Active Internet Traffic Filtering (AITF), an IP-layer defense mechanism against distributed bandwidth-flooding attacks that addresses these challenges. Three key points guide AITF design: An "attack source" is defined as an entity that has been asked to stop sending certain traffic and has been caught disobeying; this definition simplifies the task of the network and prevents misclassification of innocent hosts. Second, attack traffic is blocked at routers located close to the attack sources; this is key for the mechanism's scalability, as each network becomes responsible for blocking its own misbehaving clients. Finally, a network that hosts attack sources either cooperates and helps block attack traffic, or risks losing its access to the victim, which provides an incentive to cooperate.; We show that AITF preserves a significant percentage of the victim's bandwidth, while the per-client cost for each participating ISP is already affordable by today's ISPs and not expected to increase as the Internet grows. We also show that AITF can be incrementally deployed in the Internet without any special inter-ISP relationships. We conclude that the IP-layer of the Internet can provide an effective, scalable and deployable solution against distributed bandwidth-flooding attacks.
机译:在分布式带宽泛滥攻击中,大量攻击源进行协调,以向受害者发送大量不希望的流量,以耗尽其带宽。事实证明,这些攻击很难(有时是不可能)进行打击,因为它们要求在受害者的尾巴电路之前采取行动。当前的做法通常仅限于受害者的管理员要求其ISP手动安装过滤器以阻止攻击,随着攻击变得越来越复杂,这种方法越来越不足。直观的响应是使该过程自动化,即使受害者能够自动计算不需要的流量签名并将过滤请求发送到其ISP。但是,这种方法面临着严峻的挑战:鉴于当前目睹的攻击规模之大,仅一个ISP不可能拥有足够的资源来保护多个受攻击的客户端。而且,向其他ISP寻求帮助很复杂,因为它需要特殊的ISP间关系,而这种关系目前不存在,并且会引发安全问题。本文提出了主动互联网流量过滤(AITF),一种针对分布式带宽泛滥攻击的IP层防御机制,可以应对这些挑战。 AITF设计的三个关键点:“攻击源”定义为已被要求停止发送某些流量并且被发现违规的实体。此定义简化了网络的任务,并防止了无辜主机的错误分类。其次,攻击流量在靠近攻击源的路由器处被阻塞。这是该机制可扩展性的关键,因为每个网络都有责任阻止其自身行为异常的客户端。最终,托管攻击源的网络要么合作并帮助阻止攻击流量,要么冒失去与受害者联系的风险,这激发了合作的动机。我们表明,AITF保留了受害者带宽的很大一部分,而每个参与ISP的每客户端成本已经由当今的ISP负担得起,并且预计不会随着Internet的增长而增加。我们还表明,无需任何特殊的ISP间关系,就可以将AITF逐步部署到Internet中。我们得出的结论是,Internet的IP层可以提供一种有效的,可扩展的和可部署的解决方案,以应对分布式带宽泛滥的攻击。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号