Ddos Attacks
Total Page:16
File Type:pdf, Size:1020Kb
INFORMATION TECHNOLOGY Bhattacharyya • DDoS Attacks Kalita Evolution, Detection, Prevention, DDoS Reaction, and Tolerance DDoS Attacks DDoS DDoS Attacks: Evolution, Detection, Prevention, Reaction, and Tolerance discusses the evolution of distributed denial-of-service (DDoS) attacks, how to detect a DDoS attack when one is mounted, how to prevent such attacks from taking place, and how to react when a DDoS attack is in progress, with the goal of tolerating the attack. It introduces Attacks types and characteristics of DDoS attacks, reasons why such attacks are often successful, what aspects of the network infrastructure are usual targets, and methods used to launch Evolution, Detection, attacks. The book elaborates upon the emerging botnet technology, current trends in the evolution Prevention, Reaction, and use of botnet technology, its role in facilitating the launching of DDoS attacks, and challenges in countering the role of botnets in the proliferation of DDoS attacks. It intro- duces statistical and machine learning methods applied in the detection and prevention of and Tolerance DDoS attacks in order to provide a clear understanding of the state of the art. It presents DDoS reaction and tolerance mechanisms with a view to studying their effectiveness in protecting network resources without compromising the quality of services. To practically understand how attackers plan and mount DDoS attacks, the authors discuss the development of a testbed that can be used to perform experiments such as attack launching, monitoring of network traffic, and detection of attacks, as well as for testing strategies for prevention, reaction, and mitigation. Finally, the authors address current issues and challenges that need to be overcome to provide even better defense against DDoS attacks. Dhruba Kumar Bhattacharyya K26076 Jugal Kumar Kalita 6000 Broken Sound Parkway, NW Suite 300, Boca Raton, FL 33487 711 Third Avenue New York, NY 10017 2 Park Square, Milton Park Abingdon, Oxon OX14 4RN, UK www.crcpress.com @nettrain i \K26076_FM" | 2016/3/17 | 14:34 | page 3 | #3 i i i @nettrain i i i i i \K26076_FM" | 2016/3/17 | 14:34 | page 2 | #2 i i i DDoS Attacks Evolution, Detection, Prevention, Reaction, and Tolerance @nettrain i i i i i \K26076_FM" | 2016/3/17 | 14:34 | page 3 | #3 i i i @nettrain i i i i i \K26076_FM" | 2016/3/17 | 14:34 | page 4 | #4 i i i DDoS Attacks Evolution, Detection, Prevention, Reaction, and Tolerance Dhruba Kumar Bhattacharyya Jugal Kumar Kalita Boca Raton London New York CRC Press is an imprint of the Taylor & Francis Group, an informa business @nettrain i i i i CRC Press Taylor & Francis Group 6000 Broken Sound Parkway NW, Suite 300 Boca Raton, FL 33487-2742 © 2016 by Taylor & Francis Group, LLC CRC Press is an imprint of Taylor & Francis Group, an Informa business No claim to original U.S. Government works Version Date: 20160308 International Standard Book Number-13: 978-1-4987-2965-9 (eBook - PDF) This book contains information obtained from authentic and highly regarded sources. Reasonable efforts have been made to publish reliable data and information, but the author and publisher cannot assume responsibility for the validity of all materials or the consequences of their use. The authors and publishers have attempted to trace the copyright holders of all material reproduced in this publication and apologize to copyright holders if permission to publish in this form has not been obtained. If any copyright material has not been acknowledged please write and let us know so we may rectify in any future reprint. Except as permitted under U.S. Copyright Law, no part of this book may be reprinted, reproduced, transmitted, or utilized in any form by any electronic, mechanical, or other means, now known or hereafter invented, including photocopying, microfilming, and recording, or in any information stor- age or retrieval system, without written permission from the publishers. For permission to photocopy or use material electronically from this work, please access www.copy- right.com (http://www.copyright.com/) or contact the Copyright Clearance Center, Inc. (CCC), 222 Rosewood Drive, Danvers, MA 01923, 978-750-8400. CCC is a not-for-profit organization that pro- vides licenses and registration for a variety of users. For organizations that have been granted a photo- copy license by the CCC, a separate system of payment has been arranged. Trademark Notice: Product or corporate names may be trademarks or registered trademarks, and are used only for identification and explanation without intent to infringe. Visit the Taylor & Francis Web site at http://www.taylorandfrancis.com and the CRC Press Web site at http://www.crcpress.com @nettrain i \K26076" | 2016/3/25 | 12:19 | #1 i i i Contents List of Figures xiii List of Tables xvii Preface xix Acknowledgments xxi Authors xxiii 1 Introduction 1 1.1 Anomalies in Networks . .2 1.2 Distributed Denial-of-Service (DDoS) Attacks . .3 1.3 Causes of DDoS Attacks . .4 1.4 Targets of DDoS Attacks . .5 1.5 Launching of DDoS Attacks . .5 1.6 Current Trends in Botnet Technology . .6 1.7 Machine Learning in DDoS Attack Handling . .6 1.7.1 Traffic Attributes and User-Parameter Selection7 1.7.2 Selection of Metrics or Measures . .7 1.7.3 Analysis of Data . .8 1.7.4 Mode of Detection . .8 1.7.5 Generation of Alarm Information and Reaction .9 1.8 DDoS Defense . .9 1.9 Modules of a DDoS Defense System . 10 1.10 Types of DDoS Defense Systems . 11 1.10.1 Based on Approach . 11 1.10.1.1 DDoS Detection . 11 1.10.1.2 DDoS Prevention . 11 1.10.1.3 DDoS Response . 11 v @nettrain i i i i i \K26076" | 2016/3/25 | 12:19 | #2 i i i vi CONTENTS 1.10.1.4 DDoS Tolerance . 12 1.10.2 Based on Nature of Control . 12 1.10.2.1 Centralized DDoS Defense . 12 1.10.2.2 Hierarchical DDoS Defense . 12 1.10.2.3 Distributed DDoS Defense . 13 1.10.3 Based on Defense Infrastructure . 13 1.10.3.1 Host-Based DDoS Defense . 13 1.10.3.2 Network-Based DDoS Defense . 14 1.10.4 Based on Defense Location . 14 1.10.4.1 Victim-End DDoS Defense . 14 1.10.4.2 Source-End DDoS Defense . 15 1.10.4.3 Intermediate Network DDoS Defense . 15 1.10.5 Based on Technique Used . 15 1.10.5.1 Misuse Detection . 15 1.10.5.2 Anomaly Detection . 16 1.11 DDoS Tools and Systems . 16 1.12 DDoS Defense Evaluation . 17 1.13 Prior Work . 17 1.14 Contribution of This Book . 20 1.15 Organization of This Book . 20 2 DDoS, Machine Learning, Measures 23 2.1 Issues in Internet Design . 25 2.1.1 Complex Edge but Simple Core . 25 2.1.2 Link Bandwidth Mismatch between Core and Edge 25 2.1.3 Routing Principles . 26 2.1.4 Lack of Centralized Network Management . 26 2.1.5 Sharing of Reserved Resources across Data Centers 26 2.2 DDoS Attacks and Their Types . 27 2.2.1 Agent-Handler and IRC-Based DDoS Attack Gen- eration . 28 2.2.2 Types of DDoS Attacks . 28 2.2.2.1 Layer-Specific DDoS Attacks . 28 2.2.2.2 Direct and Reflector-Based DDoS Attacks 30 2.2.2.3 Direct and Indirect DDoS Attacks . 31 2.2.2.4 High-Rate and Low-Rate DDoS Attacks 31 2.2.2.5 Attack Types Based on Rate Dynamics 32 2.3 DDoS Attack Targets . 33 2.3.1 On Infrastructure . 33 2.3.2 On Link . 33 @nettrain i i i i i \K26076" | 2016/3/25 | 12:19 | #3 i i i CONTENTS vii 2.3.3 On Router . 34 2.3.4 On OS . 34 2.3.5 On Defense Mechanism . 34 2.4 Current Trends in DDoS Attacks . 34 2.5 Strength of DDoS Attackers . 36 2.6 Desired Characteristics of DDoS Defense System . 37 2.7 Recent DDoS Attacks . 38 2.8 Machine Learning Background . 39 2.8.1 Supervised and Unsupervised Machine Learning 40 2.8.2 Measures: Similarity and Dissimilarity . 41 2.8.2.1 Dissimilarity Measures . 42 2.8.2.2 Correlation Measures . 43 2.8.2.3 f-Divergence Measures . 46 2.8.2.4 Information Metrics . 48 2.8.3 Discussion . 49 2.9 Some Empirical Studies . 50 2.9.1 Using Information Metrics . 50 2.9.1.1 Testbed Used . 52 2.9.1.2 Datasets Used . 53 2.9.1.3 Results of Empirical Study . 53 2.9.1.4 Discussion . 59 2.9.2 Using Correlation Measures . 59 2.9.2.1 An Example . 60 2.9.3 Using f-Divergence Measures . 62 2.9.3.1 Results . 65 2.9.4 Discussion . 69 2.10 Chapter Summary . 70 3 Botnets: Trends and Challenges 73 3.1 DDoS Attacks Using Stationary Botnets . 74 3.1.1 Botnet Characteristics . 74 3.1.2 Botnet Models . 75 3.1.2.1 Agent Handler Model . 76 3.1.2.2 IRC-Based Model . 76 3.1.2.3 Web-Based Model . 77 3.1.3 Botnet Formation Life Cycle . 78 3.1.4 Stationary Botnet Architecture . 78 3.1.4.1 Botnet Topology . 78 3.1.4.2 Protocols Used . 79 3.1.4.3 Botnet C&C Systems . 80 @nettrain i i i i i \K26076" | 2016/3/25 | 12:19 | #4 i i i viii CONTENTS 3.1.5 Some Stationary Botnets . 83 3.1.6 DDoS Attacks Using Mobile Botnets . 89 3.1.6.1 Mobile Botnet Characteristics . 89 3.1.6.2 C&C Mechanisms in Mobile Botnet .