Bridging Missing Gaps in Evaluating DDoS Research
Lumin Shi, Samuel Mergendahl, Devkishen Sisodia, Jun Li {luminshi, smergend, dsisodia, lijun}@cs.uoregon.edu University of Oregon
Preliminary Work Paper (Short Paper)
Bridging Missing Gaps in Evaluating DDoS Research Lumin Shi, Samuel - - PowerPoint PPT Presentation
Bridging Missing Gaps in Evaluating DDoS Research Lumin Shi, Samuel Mergendahl, Devkishen Sisodia, Jun Li {luminshi, smergend, dsisodia, lijun}@cs.uoregon.edu University of Oregon Preliminary Work Paper (Short Paper) DDoS Attacks Today
Lumin Shi, Samuel Mergendahl, Devkishen Sisodia, Jun Li {luminshi, smergend, dsisodia, lijun}@cs.uoregon.edu University of Oregon
Preliminary Work Paper (Short Paper)
§ Most DDoS attacks have common patterns of the attack traffic [1]
easy
§ Attacks have started to employ advanced attack techniques:
2
1. https://www.netscout.com/report/ 2. https://www.imperva.com/blog/pulse-wave-ddos-pins-down-multiple-targets/ 3. https://ddos-guard.net/en/info/blog-detail/hidden-threat-of-pulse-wave-ddos-attacks 4. https://www.netscout.com/blog/asert/evolution-new-ddos-technique 5. https://www.zdnet.com/article/carpet-bombing-ddos-attack-takes-down-south-african-isp-for-an-entire-day/
§ Pulsing-based attacks inundate network links with short and periodic traffic bursts
flows [1]
number of bots
3
1. CICADAS, AsiaCCS, 2016
0.00% 10.00% 20.00% 30.00% 40.00% 50.00% 60.00% 70.00% 80.00% 90.00% 100.00% t0 t1 t2 t3 t4 t5 t6 t7 t8 t9 t10 t11
Bandwidth Utilization Over Time
Benign Traffic Attack Traffic
Possible link bandwidth utilization
§ Carpet-bombing attacks address multiple networks/hosts of a network.
scheme [1]
degradation.
networks (e.g., AS X).
4
1. The CrossFire Attack, IEEE Symposium on Security and Privacy, 2013
AS X
AS a AS b AS c
33% 33% 33% 99.99%
§ Only a matter of time before more attacks with advanced attack techniques § We need to know more about these advanced attacks in action § Study them in a network with realistic background traffic
6
§ A DDoS detection system facilitates better attack mitigation § To better evaluate the efficacy of a detection system
§ Must evaluate detection systems with realistic background traffic and mitigation systems
7
§ DDoS victims (un)knowingly disconnect benign connections during attack mitigation
§ Networks starting to adapt fine-grained mitigation solutions
§ Limited traffic filtering capacity
benign hosts
§ We need realistic IP assignment in DDoS mitigation evaluation
8
§ A container-based system
10
End Host End Host veth Router veth Router Physical link An example topology in DDoS SandBox
Container (Node) Links
Legend:
§ Inputs:
topology
§ Topology generator
§ Traffic mimicker
fine-grained time-series flows
§ Node images
§ SandBox Driver
11
12
Traffic Mimicker Traffic Mimicker veth FRRouting AS Y (c.0.0.0/8) veth Quagga AS X (a.b.0.0/16) Physical link Background traffic Main Sandbox Components BGP-related info Traffic trace/stream Experiment specs
Required Inputs
SandBox Driver
§ A mini Internet
§ We evaluate our proof-of-concept (PoC) from two aspects:
§ Two machines:
§ Software environment:
13
14
§ An example traceroute result from an educational network to a cloud provider § We can find a corresponding AS-level path on bgpview.io
§ The relationship of system instantiation time and number of Quagga routers § The 3-core machine w/ 24GB memory can support about 100 routers
15
50 100 150 Number oI Quagga Routers 50 100 150 200 250 System Instantiation Time (Sec)
3-core vm 96-core vm
§ Integrating Traffic Mimicker into the SandBox
§ Many challenges that we did not cover in the short paper
§ Implementing a set of well-received DDoS attack and defense projects § Allow the SandBox to distribute container nodes across a cluster of machines for higher scalability § Consider solutions with better support and compatibility as the SandBox driver
managing network interfaces
16
§ A list of evaluation missing gaps in DDoS research § A container-based emulation system that creates a mini Internet § A repository of DDoS attack and defense implementations § Much work ahead J
17
§ We appreciate the useful comments from our paper reviewers § We would love to hear your feedback § You can reach us via any of the email addresses below:
§ {luminshi, smergend, dsisodia, lijun}@cs.uoregon.edu
18