Detecting SYN flooding attacks

Proceedings - IEEE INFOCOM - Tập 3 - Trang 1530-1539
Haining Wang1, Danlu Zhang1, Kang G. Shin1
1EECS Department, University of Michigan, Ann Arbor, MI, USA

Tóm tắt

We propose a simple and robust mechanism for detecting SYN flooding attacks. Instead of monitoring the ongoing traffic at the front end (like firewall or proxy) or a victim server itself, we detect the SYN flooding attacks at leaf routers that connect end hosts to the Internet. The simplicity of our detection mechanism lies in its statelessness and low computation overhead, which make the detection mechanism itself immune to flooding attacks. Our detection mechanism is based on the protocol behavior of TCP SYN-FIN (RST) pairs, and is an instance of the Seqnential Change Point Detection [l]. To make the detection mecbanism insensitive to site and access pattern, a non-parametric Cnmnlative Sum (CUSUM) method [4] is applied, thus making the detection mechanism much more generally applicable and its deployment much easier. The efficacy of this detection mechanism is validated by trace-driven simulations. The evaluation results show that the detection mechanism has short detection latency and high detection accuracy. Moreover, due to its proximity to the flooding sources, our mechanism not only sets alarms upon detection of ongoing SYN flooding attacks, but also reveals the location of the flooding sources without resorting to expensive IP traceback.

Từ khóa

#Floods #Web server #Network servers #Web and internet services #Computer crime #Robustness #Monitoring #Access protocols #Delay #IP networks

Tài liệu tham khảo

10.1145/1132026.1132027 zhang, 0, A multi-layer IPsec protocol, 9th USENIX Security Symposium August 2000 lemon, 0, Resisting SYN flooding DoS attacks with a SYN cache, Proceedings of USENIX BSDCon'2002 February 2002 mccreary, 0, Trends in wide area IP traffic patterns - a view from ames internet exchange, Proceedings of ITC'2000 September 2000 wang, 2001, Layer-4 service differentiation and isolation gil, 0, MULTOPS: A data-structure for bandwidth attack detection, 2001 USENIX Security Symposium August 2001 wu, 2001, Intention-driven ICMP traceback lakshman, 0, High speed policy-based packet forwarding using efficient multi-dimensional range matching, Proceedings of ACM SIGCOMM September 1998 gribble, 0, System design issues for internet middleware services: Deductions from a large client trace, USENIX Proceedings of the Symposium on Internet Technologies and Systems 99 December 1997 gupta, 0, Packet classification on multiple fields, Proc ACM SIGCOMM September 1999 ferguson, 1998, Network ingress filtering: Defeating denial of service attacks which employ IP source address spoofing, RFC 2267 10.1109/MC.2000.839316 park, 0, On the effectiveness of probabilistic packet marking for IP traceback under denial of service attack, Proc of IEEE INFOCOM'2001 March 2001 0 10.1145/383059.383061 10.1109/90.392383 postel, 1981, Transmission control protocol, request for comments 793 savage, 0, Practical network support for IP traceback, Proceedings of ACM SIGCOMM'2000 August 2000 10.1109/SECPRI.1997.601338 10.1145/378420.378789 song, 0, Advanced and authenticated marking schemes for IP traceback, Proc of IEEE INFOCOM'2001 March 2001 10.1145/383059.383060 bernstein, 0, Linux kernel SYN cookies firewall project bellovin, 2000, ICMP traceback messages 10.1002/047120644X.ch15 basseville, 1993, Detection of Abrupt Changes Theory and Application srinivasan, 0, Fast and scalable layer four switching, Proceedings of ACM SIGCOMM September 1998 10.1145/339331.339413 0, SynDefender 10.1109/65.642356 10.1145/115992.116003 stevens, 1994, TCP/IP Illustrated, 1 10.1007/978-94-015-8163-9 dittrich, 0, Distributed denial of service (DDoS) attacks/tools page darmohray, 2000, Hot spares for DoS attacks, login, 25