On a Mathematical Model for Low-Rate Shrew DDoS

被引:74
作者
Luo, Jingtang [1 ]
Yang, Xiaolong [2 ]
Wang, Jin [2 ]
Xu, Jie [1 ]
Sun, Jian [1 ]
Long, Keping [2 ]
机构
[1] Univ Elect Sci & Technol China, Sch Commun & Informat Engn, Chengdu 611731, Peoples R China
[2] Univ Sci & Technol Beijing, Sch Comp & Commun Engn, Beijing 100083, Peoples R China
基金
中国国家自然科学基金;
关键词
Attack effect; low-rate distributed denial of service (DDoS) attack; mathematical model; shrew attack; DEFENSE;
D O I
10.1109/TIFS.2014.2321034
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
The shrew distributed denial of service (DDoS) attack is very detrimental for many applications, since it can throttle TCP flows to a small fraction of their ideal rate at very low attack cost. Earlier works mainly focused on empirical studies of defending against the shrew DDoS, and very few of them provided analytic results about the attack itself. In this paper, we propose a mathematical model for estimating attack effect of this stealthy type of DDoS. By originally capturing the adjustment behaviors of victim TCPs congestion window, our model can comprehensively evaluate the combined impact of attack pattern (i.e., how the attack is configured) and network environment on attack effect (the existing models failed to consider the impact of network environment). Henceforth, our model has higher accuracy over a wider range of network environments. The relative error of our model remains around 10% for most attack patterns and network environments, whereas the relative error of the benchmark model in previous works has a mean value of 69.57%, and it could be more than 180% in some cases. More importantly, our model reveals some novel properties of the shrew attack from the interaction between attack pattern and network environment, such as the minimum cost formula to launch a successful attack, and the maximum effect formula of a shrew attack. With them, we are able to find out how to adaptively tune the attack parameters (e.g., the DoS burst length) to improve its attack effect in a given network environment, and how to reconfigure the network resource (e.g., the bottleneck buffer size) to mitigate the shrew DDoS with a given attack pattern. Finally, based on our theoretical results, we put forward a simple strategy to defend the shrew attack. The simulation results indicate that this strategy can remarkably increase TCP throughput by nearly half of the bottleneck bandwidth (and can be higher) for general attack patterns.
引用
收藏
页码:1069 / 1083
页数:15
相关论文
共 25 条
[1]  
Allman M, 1999, COMP COMM R, V29, P263, DOI 10.1145/316194.316230
[2]  
[Anonymous], 2009, 2009 IEEE POW EN SOC
[3]  
Appenzeller G., 2004, Sizing Router Buffers, V34
[4]  
Barman D, 2004, GLOB TELECOMM CONF, P1617
[5]   Vulnerability of Network Mechanisms to Sophisticated DDoS Attacks [J].
Ben-Porat, Udi ;
Bremler-Barr, Anat ;
Levy, Hanoch .
IEEE TRANSACTIONS ON COMPUTERS, 2013, 62 (05) :1031-1043
[6]  
Chen H, 2013, IEEE INFOCOM SER, P1780
[7]   Spectral analysis of TCP flows for defense against Reduction-of-Quality attacks [J].
Chen, Yu ;
Hwang, Kai .
2007 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS, VOLS 1-14, 2007, :1203-+
[8]  
Chia-Wei Chang, 2010, IEEE Transactions on Network and Service Management, V7, P1, DOI 10.1109/TNSM.2010.I8P0308
[9]   Statistical bandwidth sharing:: A study of congestion at flow level [J].
Fredj, SB ;
Bonald, T ;
Proutiere, A ;
Régnié, G ;
Roberts, JW .
ACM SIGCOMM COMPUTER COMMUNICATION REVIEW, 2001, 31 (04) :111-122
[10]   Exploiting the transients of adaptation for RoQ attacks on Internet resources [J].
Guirguis, M ;
Bestavros, A ;
Matta, I .
12TH IEEE INTERNATIONAL CONFERENCE ON NETWORK PROTOCOLS - PROCEEDINGS, 2004, :184-195