Abstract
In the recent past, Distributed Denial of Service (DDoS) attacks have become more abundant and present one of the most serious security threats. In a DDoS attack, the attacker controls a botnet of daemons residing in vulnerable hosts that send a significant amount of traffic to flood the victim or the network infrastructure. In this paper, a common type of DDoS attacks known as “TCP SYN-Flood” is studied. This type of attack uses spoofed Internet Protocol (IP) addresses for SYN packets by exploiting the weakness in Transmission Control Protocol (TCP) 3-Way handshake used by the TCP/IP suite of protocols, which make the web servers unreachable for legitimate users or even worse, it might lead to server crash. In this paper, a resilient, efficient, lightweight, and robust IP traceback algorithm is proposed using an IP tracing packet for each attack path. The proposed algorithm suggests that edge routers—where the attack starts from—observe the traffic pattern passing through, and if the observed traffic carries the signature of TCP SYN-Flood DDoS attack and a high percentage of it is destined to a particular web server(s), it starts the tracing process by generating an IP trace packet, which accompanies the attack path recording the routers’ IP addresses on the path between the attacker/daemon and the victim, which can extract the path and react properly upon receiving it by discarding any SYN packets originating from that attacker/daemon. To our knowledge, this is the first research that efficiently traces these kinds of attacks while they are running. The proposed solution has low computation and message overhead, efficient detection and tracing time, and converges in near optimal time. The results are validated using extensive simulation runs.
Subject
Electrical and Electronic Engineering,Biochemistry,Instrumentation,Atomic and Molecular Physics, and Optics,Analytical Chemistry
Reference44 articles.
1. From information security to cyber security;Comput. Secur.,2013
2. A survey of distributed denial-of-service attack, prevention, and mitigation techniques;Mahjabin;Int. J. Distrib. Sens. Netw.,2017
3. (2022, November 14). NETSCOUT Arbor Confirms 1.7 Tbps DDoS Attack|NETSCOUT. Available online: https://www.netscout.com/blog/asert/netscout-arbor-confirms-17-tbps-ddos-attack-terabit-attack-era/.
4. Maciel, R., Araujo, J., Dantas, J., Melo, C., Guedes, E., and Maciel, P. (2018, January 23–26). Impact of a DDoS attack on computer systems: An approach based on an attack tree model. Proceedings of the 2018 Annual IEEE International Systems Conference (SysCon), Vancouver, BC, Canada.
5. DDoS Attacks at the Application Layer: Challenges and Research Perspectives for Safeguarding Web Applications;Praseed;IEEE Commun. Surv. Tutor.,2019
Cited by
8 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献