A comprehensive study of queue management as a DoS counter-measure

被引:6
作者
Boteanu, Daniel [1 ]
Fernandez, Jose M. [1 ]
机构
[1] Ecole Polytech Montreal, Montreal, PQ H3C 3A7, Canada
关键词
Network security; Denial of service; DDoS; Dynamic timeout adjustment; Queue management; SYN-flood; DEFENSE; NETWORK; FRAMEWORK; ATTACKS;
D O I
10.1007/s10207-013-0197-6
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The purpose of a denial of service (DoS) attack is to render a network service unavailable for legitimate users. We address the problem of DoS attacks on connection-oriented protocols where the attacker tries to deplete the server connection by initiating communication with the server and then abandoning the communication. The most exploited attack in this category is the SYN-flood attack but other attacks using the same approach in stateful communication protocols also fall into this category. Our goals are twofold: first, to develop a mathematical model allowing us to analyse the trade-off between the attacker and the defender resources and second, to offer prevention mechanisms that can be used to defend against this category of attacks. We model the server queue of connections using Markov chains to establish a relationship between the server capacity, the attack rate and the impact on the service level. We analyse two methods of adjusting the timeout, threshold and linear, and we couple them with three policies of assigning the timeout to connections: the deterministic policy, the deferred policy and the utopian Poisson policy. First, theoretical modelling confirms that for any given strategy, there exists a linear trade-off between attack rate and targeted server queue size. However, the ratio that needs to be kept between them in order to maintain a similar level of quality of service differs between strategies; in that sense some are better than others. In particular, theoretical modelling also indicates that the linear deferred timeout strategy is very similar in performance to the linear Poisson timeout strategy, which in turn outperforms all the other dynamic timeout strategies. The dynamic timeout strategies always outperform the classical fixed timeout method. Our model is very general and can be used to capture the behaviour of the server queue during connection depletion attacks at various levels in the TCP protocol stack. We confirm the theoretical findings using stochastic simulations and network experiments of SYN-flood attacks. We also show how the model can be used when analysing a TCP connection establishment flood or a ticket reservation flood. The protection strategies we suggest are robust to changes in the attack model and our implementation is very efficient and transparent with respect to the server and applications it tries to protect. The strategies could therefore be easily integrated into existing operating systems and applications, or implemented in separate network devices.
引用
收藏
页码:347 / 382
页数:36
相关论文
共 68 条
[1]  
Adair S., 2008, GAMBLING WEBSITES AT
[2]  
Al-Duwairi B., 2005, INFOCOM 2005
[3]  
[Anonymous], 1999, RFC2616: Hypertext Transfer Protocol
[4]  
[Anonymous], 2004, The RTT distribution of TCP flows in the Internet and its impact on TCP-based flow control
[5]   ALPi: A DDoS defense system for high-speed networks [J].
Ayres, Paulo E. ;
Sun, Huizhong ;
Chao, H. Jonathan ;
Lau, Wing Cheong .
IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 2006, 24 (10) :1864-1876
[6]  
Beaumont-Gay M., 2007, ICIMP 2007
[7]  
Bellaiche M., 2007, MONAM 2007
[8]  
BERNSTEIN D, 2003, SYN COOKIES
[9]  
Boteanu D, 2007, LECT NOTES COMPUT SC, V4779, P263
[10]  
Boteanu D, 2007, QOP'07: PROCEEDINGS OF THE 2007 ACM WORKSHOP ON QUALITY OF PROTECTION, P34