skip to main content
10.5555/1973430.1973454guideproceedingsArticle/Chapter ViewAbstractPublication PagesnsdiConference Proceedingsconference-collections
Article

dfence: transparent network-based denial of service mitigation

Published: 11 April 2007 Publication History

Abstract

Denial of service (DoS) attacks are a growing threat to the availability of Internet services. We present dFence, a novel network-based defense system for mitigating DoS attacks. The main thesis of dFence is complete transparency to the existing Internet infrastructure with no software modifications at either routers, or the end hosts. dFence dynamically introduces special-purpose middlebox devices into the data paths of the hosts under attack. By intercepting both directions of IP traffic (to and from attacked hosts) and applying stateful defense policies, dFence middleboxes effectively mitigate a broad range of spoofed and unspoofed attacks. We describe the architecture of the dFence middlebox, mechanisms for ondemand introduction and removal, and DoS mitigation policies, including defenses against DoS attacks on the middlebox itself. We evaluate our prototype implementation based on Intel IXP network processors.

References

[1]
S. Agarwal, T. Dawson, and C. Tryfonas. DDoS mitigation via regional cleaning centers. Sprint ATL Research Report RR04- ATL-013177, January 2004.
[2]
D. Andersen. Mayday: Distributed filtering for Internet services. In Proc. USITS, 2003.
[3]
ANML. DDoS attack tools. http://anml.iu.edu/ddos/ tools.html, 2001.
[4]
D. Bernstein. SYN cookies. http://cr.yp.to/ syncookies.html, 1996.
[5]
A. Broder and M. Mitzenmacher. Network applications of Bloom filters: A survey. Internet Mathematics, 1(4), 2004.
[6]
M. Casado, A. Akella, P. Cao, N. Provos, and S. Shenker. Cookies along trust-boundaries (CAT): Accurate and deployable flood protection. In Proc. SRUTI, 2006.
[7]
Cisco. Policy-based routing. http://www.cisco.com/ warp/public/732/Tech/plicy_wp.htm, 1996.
[8]
Cisco. Cisco Guard DDoS mitigation appliances. http:// www.cisco.com/en/US/products/ps5888/, 2007.
[9]
D. Dagon, C. Zou, and W. Lee. Modeling botnet propagation using time zones. In Proc. NDSS, 2006.
[10]
P. Ferguson and D. Senie. Network ingress filtering: Defeating denial of service attacks which employ IP source address spoofing. http://www.faqs.org/rfcs/rfc2827. html, 2000.
[11]
P. Francis. Firebreak: An IP perimeter defense architecture. http://www.cs.cornell.edu/People/ francis/hotnets-firebreak-v7.pdf, 2004.
[12]
T. Gil and M. Poletto. MULTOPS: A data-structure for bandwidth attack detection. In Proc. USENIX Security, 2001.
[13]
M. Handley, E. Kohler, A. Ghosh, O. Hodson, and P. Radoslavov. Designing extensible IP router software. In Proc. NSDI, 2005.
[14]
Iperf. The TCP/UDP bandwidth measurement tool. http:// dast.nlanr.net/Projects/Iperf/, 2003.
[15]
IXIA. http://www.ixiacom.com, 2006.
[16]
S. Kandula, D. Katabi, M. Jacob, and A. Berger. Botz-4-Sale: Surviving organized DDoS attacks that mimic flash crowds. In Proc. NSDI, 2005.
[17]
A. Keromytis, V. Misra, and D. Rubenstein. SOS: Secure Overlay Services. In Proc. SIGCOMM, 2002.
[18]
Y. Kim, W. Lau, M. Chuah, and J. Chao. PacketScore: Statisticsbased overload control against distributed denial-of-service attacks. In Proc. INFOCOM, 2004.
[19]
R. Kokku, U. Shevade, N. Shah, A. Mahimkar, T. Cho, and H. Vin. Processor scheduler for multi-service routers. In Proc. RTSS, 2006.
[20]
J. Lemon. Resisting SYN flood DoS attacks with a SYN cache. In Proc. BSDCon, 2002.
[21]
R. Mahajan, S. Bellovin, S. Floyd, J. Ioannidis, V. Paxson, and S. Shenker. Controlling high bandwidth aggregates in the network. CCR, 32(3), 2002.
[22]
J. Mirkovic, G. Prier, and P. Reiher. Attacking DDoS at the source. In Proc. ICNP, 2002.
[23]
D. Mosberger and T. Jin. httperf: A tool for measuring web server performance. Performance Evaluation Review, 26(3), 1998.
[24]
D. Pappalardo and E. Messmer. Extortion via DDoS on the rise. Network World, May 16 2005.
[25]
K. Park and H. Lee. On the effectiveness of route-based packet filtering for distributed DoS attack prevention in power-law internets. In Proc. SIGCOMM, 2001.
[26]
Prolexic. The Prolexic Zombie Report. http://www. prolexic.com/zr/, 2007.
[27]
S. Savage, D. Wetherall, A. Karlin, and T. Anderson. Network support for IP traceback. IEEE/ACM Trans. Netw., 9(3), 2001.
[28]
V. Sekar, N. Duffield, K. van der Merwe, O. Spatscheck, and H. Zhang. LADS: Large-scale automated DDoS detection system. In Proc. USENIX, 2006.
[29]
A. Snoeren, C. Partridge, L. Sanchez, C. Jones, F. Tchakountio, S. Kent, and W. Strayer. Hash-based IP traceback. In Proc. SIGCOMM, 2001.
[30]
I. Stoica, D. Adkins, S. Zhuang, S. Shenker, and S. Surana. Internet indirection infrastructure. In Proc. SIGCOMM, 2002.
[31]
M. Walfish, J. Stribling, M. Krohn, H. Balakrishnan, R. Morris, and S. Shenker. Middleboxes no longer considered harmful. In Proc. OSDI, 2004.
[32]
M. Walfish, M. Vutukuru, H. Balakrishnan, D. Karger, and S. Shenker. DDoS defense by offense. In Proc. SIGCOMM, 2006.
[33]
H. Wang, D. Zhang, and K. Shin. Detecting SYN flooding attacks. In Proc. INFOCOM, 2002.
[34]
Y. Xu and R. Guerin. On the robustness of router-based denialof-service (DoS) defense systems. CCR, 35(3), 2005.
[35]
A. Yaar, A. Perrig, and D. Song. Pi: A path identification mechanism to defend against DDoS attacks. In Proc. IEEE S&P, 2003.
[36]
A. Yaar, A. Perrig, and D. Song. SIFF: A stateless Internet flow filter to mitigate DDoS flooding attacks. In Proc. IEEE S&P, 2004.
[37]
X. Yang, D. Wetherall, and T. Anderson. A DoS-limiting network architecture. In Proc. SIGCOMM, 2005.
[38]
D. Yau, J. Lui, F. Liang, and Y. Yam. Defending against distributed denial-of-service attacks with max-min fair server-centric router throttles. IEEE/ACM Trans. Netw., 13(1), 2005.

Cited By

View all
  1. dfence: transparent network-based denial of service mitigation

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image Guide Proceedings
    NSDI'07: Proceedings of the 4th USENIX conference on Networked systems design & implementation
    April 2007
    27 pages

    Sponsors

    • VMware
    • Google Inc.
    • Microsoft Research: Microsoft Research
    • Intel: Intel
    • CISCO

    Publisher

    USENIX Association

    United States

    Publication History

    Published: 11 April 2007

    Qualifiers

    • Article

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)0
    • Downloads (Last 6 weeks)0
    Reflects downloads up to 28 Jan 2025

    Other Metrics

    Citations

    Cited By

    View all

    View Options

    View options

    Figures

    Tables

    Media

    Share

    Share

    Share this Publication link

    Share on social media