Distributed Denial of Service Attacks & Defenses
Fall 2011
Guest Lecture by: Vamsi Kambhampati
Distributed Denial of Service Attacks & Defenses Guest Lecture - - PowerPoint PPT Presentation
Distributed Denial of Service Attacks & Defenses Guest Lecture by: Vamsi Kambhampati Fall 2011 Distributed Denial of Service (DDoS) Exhaust resources of a target, or the resources it depends on Resources: CPU, Memory, Bandwidth
Guest Lecture by: Vamsi Kambhampati
legitimate packets also dropped destination attacker packets dropped attacker congested router legitimate client attacker
time rate pkts/sec congestion at router Legitimate flow Attacker flow congested router
congested router
time rate pkts/sec misbehaving aggregate gains throughput well-behaved aggregate looses throughput
time rate pkts/sec well-behaved traffic slows down when destination requests misbehaving traffic does not slow down when destination requests destination
destination
packet
routers insert edge information destination constructs path from edge information
contributing router congested router
destination identify aggregate responsible for congestion pushback to contributing router
destination source
SYN
pre-capabilities
SYN SYN
destination source
host-capability
SYN
attacker
destination source
DATA
attacker
BOGUS
destination colluder
10ms 10ms
10 legitimate clients 1 ~ 100 attackers
10Mbps, 10ms
bottleneck link