Towards Iot-Ddos Prevention Using Edge Computing

Towards Iot-Ddos Prevention Using Edge Computing

Towards IoT-DDoS Prevention Using Edge Computing Ketan Bhardwaj, Joaquin Chung Miranda, Ada Gavrilovska Georgia Institute of Technology Abstract Google’s Project Shield [9], Akamai [11] or CloudFlare [12], Application-level DDoS attacks mounted using compro- who offer on-demand DDoS protection as a service. mised IoT devices are emerging as a critical problem. The Can the Edge Help? In this paper, we explore an approach application-level and seemingly legitimate nature of traffic which leverages computational resources in the edge of the in such attacks renders most existing solutions ineffective, network to accelerate the defense from IoT-DDoS attacks, and and the sheer amount and distribution of the generated traffic arrest them before they can cause considerable damage to both make mitigation extremely costly. This paper proposes a new the attack target as well the Internet infrastructure itself. approach which leverages edge computing to deploy edge We are motivated by the following observations. First, de- functions that gather information about incoming traffic and tection of a DDoS is best done close to the victim, whereas its communicate that information via a fast-path with a nearby mitigation and prevention are most effective close to the attack detection service. This accelerates the detection and the arrest source. Second, the emergence of a new infrastructure tier of such attacks, limiting their damaging impact. Preliminary at the edge of the network, including mobile edge computing investigation shows promise for up to 10x faster detection that (MEC) access points [33], fog computing gateways [26], and reduces up to 82% of the Internet traffic due to IoT-DDoS. similar elements, presents opportunities to dynamically provi- sion edge functions [25, 48, 44] to handle the vast amounts of 1 Introduction Internet traffic created by IoT devices. We posit that this edge tier provides a new vantage point The IoT-DDoS Problem. Safeguarding the web infrastruc- closer to the source, which has not been considered in other ture and services against the highly damaging Distributed approaches to counter IoT-DDoS. However, the edge sees Denial-of-Service (DDoS) attacks is a difficult and pressing limited network traffic, and is limited in terms of compute need today. Conventionally, DDoS campaigns are carried out resources. The edge can neither capture the aggregate network by botnets which utilize an army of infected computers/devices traffic required for IoT-DDoS detection, nor can it scale re- to overwhelm a target web service or Internet infrastructure sources needed for mitigation like the elastic cloud . As a element with malicious traffic. Such attacks have been studied result, simply deploying existing approaches to absorb DDoS extensively in the past. Recently a new and more damaging using infrastructure provisioning will not suffice at the edge. kind of application-level DDoS attacks are emerging, where We observe, however, that the edge of the network – the compromised Internet of Things (IoT) devices are used as wireless and cellular gateways providing connectivity for IoT attackers. Examples include the attacks on KrebsOnSecu- devices with the Internet – have capabilities needed for limited rity [8] and Dyn [7] by the Mirai botnet [5]. We refer to this processing of IoT packets. These resources can be sufficient type of attacks as IoT-DDoS. IoT-DDoS attacks pose a critical for capturing lightweight information profiles of the IoT problem to be solved for broad adoption of IoT. packets that stream through them. Examples can be as trivial IoT-DDoS challenges current DDoS security measures in as packet counts, or reduced packet information containing new ways. The recent application-level IoT-DDoS attacks header-only data, or more sophisticated algorithms for sketch- evade existing attack detection solutions such as network intru- ing streamed data. If these information profiles can be more sion detection systems (NIDS) because the data in the attack rapidly aggregated, relative to what’s possible when aggregat- traffic appears to be, or is indeed originating from legitimate ing the original full-featured IoT traffic, and if the information IP addresses of IoT devices. The sheer amount of the traffic they carry correlates sufficiently well with the information generated in an IoT-DDoS [5] makes the cost associated with necessary to detect an attack, they create a path to acceler- deploying mitigation solutions so high that only a few compa- ate detection of an impending IoT-DDoS and deployment of nies with massive infrastructure can afford to handle it, such as appropriate defense mechanisms at the edge infrastructure. 1 ShadowNet. Motivated by these observations , we propose Mobile I C ShadowNet – an architecture that makes the edge the first line S D Cloud Core P N of defense against IoT-DDoS. It achieves its goals in the fol- } IoT Web lowing manner. First, appropriate edge functions are deployed IoT Edge nodes Service on the distributed edge infrastructure, on behalf of a backend running Old vantage Devices points for IoT application seeking protection. The role of these edge ShadowNet ShadowNet edge fast-path DDoS Defense functions are to sketch the profiles of IoT traffic streaming functions from a given edge location. Second, the edge function estab- Response-less lishes a fast path between itself and a special ShadowNet web ShadowNet service. The edge function uses the fast path to send small New vantage point Service for DDoS Defense Cloud shadow-packets with locally-derived information about IoT Figure 1: ShadowNet Overview traffic to the ShadowNet web service. ShadowNet can then ag- gregate that information about the IoT traffic distributed across technique is hit-and-run DDoS attacks [5] in which the attacker a number of edge nodes, detect an imminent IoT-DDoS at- sends multiple short bursts of quick response traffic followed tack, and respond with some proactive defensive action. The by periods of inactivity, making it very challenging to manage. approach assumes that an edge function and web service can DDoS Defenses. The objective of DDoS defenses is to de- mutually attest each other to establish trust between them. tect the attack as soon as possible, and to mitigate it. DDoS In this paper, we present the ShadowNet idea, and argue defenses can be source-based, destination-based, network- that a possible outcome is accelerated detection and response based, or a hybrid. They can be deployed before the at- to an attack, potentially even before it reaches the target. Con- tack (prevention), during the attack (detection), and after cretely, we present encouraging preliminary results from ex- the attack (source identification and response). In the many periments we carried out on an initial ShadowNet prototype. years of DDoS history, many detection and mitigation mech- We demonstrate that ShadowNet can detect an impeding IoT- anisms have been proposed (source-end detection [45, 39], DDoS attack up to 10x faster than the best case detection at secure overlay networks [46, 28, 42], SDN/NFV based ap- victim, and prevents injection of up to 82% of the traffic in the proaches [40, 43, 31, 30] and cloud based approaches [41, 49]). Internet infrastructure by compromised IoT devices. In that However, in all cases, Internet users and infrastructure still sense, ShadowNet represents a major contribution towards incur damage, as the Dyn attack of 2016 can testify [7]. defenses against IoT-DDoS attacks. IoT and Edge Computing. Edge computing—the use of computational resources closer to end devices, at the edge 2 Motivation of network—is an attractive approach to addressing latency and bandwidth demands of emerging applications. Going be- We present a brief discussion of the technology landscape that yond point solutions, the vision of edge computing, where motivates the design of ShadowNet. web services deploy their edge functions in a multi-tenant DDoS Attacks. DDoS attacks were observed first in the early infrastructure, is proposed by researchers [25, 44] and indus- 2000’s when several web sites (e.g., Yahoo, eBay, Amazon, try initiatives [1, 3]. Edge computing and IoT are deeply and ZDnet) were taken offline, incurring significant financial interrelated. First, the anticipated data deluge from tens of losses [41]. In December 2010, the group Anonymous targeted billions of connected devices, potentially related to critical in- the web sites of Mastercard, PayPal, Visa, and PostFinance frastructure and services, is a major driver for edge computing [49]. Most recently, in 2016, the Krebs On Security [8] and – the only way to operate on this data with low latencies and Dyn [7] websites were victims of massive DDoS attacks facil- low data movement costs is by moving computation closer itated by IoT devices. Based on reports from industry leaders to them, along the network edge. Second, the architecture in DDoS protection services, such as Arbor Networks [22], of IoT deployments is a natural fit for edge computing, as, Akamai [19], F5 [32], Incapsula [13], and Neustar [6], DDoS for energy-related reasons, IoT device connect through the attacks in general are becoming bigger, more complex and Internet through low-power protocols via wireless or cellular more frequent. In summary, IoT-DDoS is a formidable prob- gateways [37, 47, 29], examplifying edge nodes. lem due to its scale, complexity and frequency, which can prove to be a roadblock for IoT adoption. 3 Overview DDoS Network Traffic Patterns. DDoS network traffic Figure 1 shows the components of the ShadowNet architecture. patterns mostly depend on the tools used to launch the attack. With ShadowNet, these edge nodes are securely provisioned Bukac [27] studied the traffic characteristics of common DoS to run application-specific edge functions that handle requests tools such as High Orbit Ion Cannon (HOIC) [14], HULK [15], for corresponding web services. The edge functions use a Low Orbit Ion Cannon (LOIC) [16], OWASP HTTP tool [18], fast path, faster than the original path to the application web and Slowloris [21].

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    7 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us