首页> 外文OA文献 >A composable approach to design of newer techniques for large-scale denial-of-service attack attribution
【2h】

A composable approach to design of newer techniques for large-scale denial-of-service attack attribution

机译:用于大规模拒绝服务攻击归因的新型技术设计的可组合方法

代理获取
本网站仅为用户提供外文OA文献查询和代理获取服务,本网站没有原文。下单后我们将采用程序或人工为您竭诚获取高质量的原文,但由于OA文献来源多样且变更频繁,仍可能出现获取不到、文献不完整或与标题不符等情况,如果获取不到我们将提供退款服务。请知悉。
获取外文期刊封面目录资料

摘要

Since its early days, the Internet has witnessed not only a phenomenal growth, but also a large number of security attacks, and in recent years, denial-of-service (DoS) attacks have emerged as one of the top threats. The stateless and destination-oriented Internet routing combined with the ability to harness a large number of compromised machines and the relative ease and low costs of launching such attacks has made this a hard problem to address. Additionally, the myriad requirements of scalability, incremental deployment, adequate user privacy protections, and appropriate economic incentives has further complicated the design of DDoS defense mechanisms. While the many research proposals to date have focussed differently on prevention, mitigation, or traceback of DDoS attacks, the lack of a comprehensive approach satisfying the different design criteria for successful attack attribution is indeed disturbing.Our first contribution here has been the design of a composable data model that has helped us represent the various dimensions of the attack attribution problem, particularly the performance attributes of accuracy, effectiveness, speed and overhead, as orthogonal and mutually independent design considerations. We have then designed custom optimizations along each of these dimensions, and have further integrated them into a single composite model, to provide strong performance guarantees. Thus, the proposed model has given us a single framework that can not only address the individual shortcomings of the various known attack attribution techniques, but also provide a more wholesome counter-measure against DDoS attacks.Our second contribution here has been a concrete implementation based on the proposed composable data model, having adopted a graph-theoretic approach to identify and subsequently stitch together individual edge fragments in the Internet graph to reveal the true routing path of any network data packet. The proposed approach has been analyzed through theoretical and experimental evaluation across multiple metrics, including scalability, incremental deployment, speed and efficiency of the distributed algorithm, and finally the total overhead associated with its deployment. We have thereby shown that it is realistically feasible to provide strong performance and scalability guarantees for Internet-wide attack attribution.Our third contribution here has further advanced the state of the art by directly identifying individual path fragments in the Internet graph, having adopted a distributed divide-and-conquer approach employing simple recurrence relations as individual building blocks. A detailed analysis of the proposed approach on real-life Internet topologies with respect to network storage and traffic overhead, has provided a more realistic characterization. Thus, not only does the proposed approach lend well for simplified operations at scale but can also provide robust network-wide performance and security guarantees for Internet-wide attack attribution.Our final contribution here has introduced the notion of anonymity in the overall attack attribution process to significantly broaden its scope. The highly invasive nature of wide-spread data gathering for network traceback continues to violate one of the key principles of Internet use today - the ability to stay anonymous and operate freely without retribution. In this regard, we have successfully reconciled these mutually divergent requirements to make it not only economically feasible and politically viable but also socially acceptable.This work opens up several directions for future research - analysis of existing attack attribution techniques to identify further scope for improvements, incorporation of newer attributes into the design framework of the composable data model abstraction, and finally design of newer attack attribution techniques that comprehensively integrate the various attack prevention, mitigation and traceback techniques in an efficient manner.
机译:自成立以来,互联网不仅目睹了惊人的增长,而且还见证了大量的安全攻击,并且近年来,拒绝服务(DoS)攻击已成为主要威胁之一。无状态和面向目标的Internet路由,加上能够利用大量受感染机器的能力,以及发动此类攻击的相对简便和低成本,使得这成为一个很难解决的问题。此外,对可伸缩性,增量部署,适当的用户隐私保护以及适当的经济激励的无数要求进一步使DDoS防御机制的设计复杂化。迄今为止,尽管许多研究建议都将重点放在DDoS攻击的预防,缓解或追溯上,但缺乏能够满足成功攻击归因的不同设计标准的综合方法的确令人不安。可组合的数据模型已经帮助我们描述了攻击归因问题的各个方面,尤其是作为正交和相互独立的设计考虑因素的准确性,有效性,速度和开销的性能属性。然后,我们针对每个维度设计了自定义优化,并将它们进一步集成到单个组合模型中,以提供强大的性能保证。因此,提出的模型为我们提供了一个单一的框架,该框架不仅可以解决各种已知攻击归因技术的各个缺点,而且还可以提供针对DDoS攻击的更健康的对策。我们的第二个贡献是基于具体的实现在提出的可组合数据模型上,我们采用了图论方法来识别并随后将Internet图中的各个边缘片段缝合在一起,以揭示任何网络数据包的真实路由路径。通过多种指标的理论和实验评估,对所提出的方法进行了分析,包括可伸缩性,增量部署,分布式算法的速度和效率,以及与部署相关的总开销。因此,我们表明为Internet范围的攻击归因提供强大的性能和可伸缩性保证是切实可行的。我们的第三项贡献是通过直接识别Internet图中的各个路径片段,采用了分布式,从而进一步提高了现有技术水平。采用简单递归关系作为单独构造块的分而治之方法。在网络存储和流量开销方面对现实Internet拓扑的拟议方法进行的详细分析,提供了更现实的特征。因此,所提出的方法不仅可以很好地简化大规模操作,而且可以为整个Internet的攻击归因提供强大的网络范围性能和安全保证。我们在这里的最终贡献是在整个攻击归因过程中引入了匿名性的概念。大大拓宽其范围。用于网络回溯的广泛数据收集具有高度侵入性,这继续违反了当今Internet使用的主要原则之一-保持匿名和自由运行而无需报答的能力。在这方面,我们已经成功地调和了这些相互不同的要求,以使其不仅在经济上可行且在政治上可行,而且在社会上也可以接受。这项工作为未来的研究开辟了多个方向-分析现有的攻击归因技术,以确定进一步的改进范围,将较新的属性合并到可组合数据模型抽象的设计框架中,最后设计较新的攻击归因技术,从而以有效的方式全面集成了各种攻击预防,缓解和追溯技术。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
代理获取

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号