An effective defense mechanism against DoS/DDoS attacks in flow-based routers

  • Authors:
  • PyungKoo Park;HeeKyoung Yi;SangJin Hong;JaeCheul Ryu

  • Affiliations:
  • ETRI;Chungnam National University;ETRI;Chungnam National University

  • Venue:
  • Proceedings of the 8th International Conference on Advances in Mobile Computing and Multimedia
  • Year:
  • 2010

Quantified Score

Hi-index 0.01

Visualization

Abstract

Due to proliferation of diverse network applications, DoS/DDoS attacks are evolving. Many studies have been performed and implemented in on/off-line network devices such as routers and IDS/IPS. While IDS/IPS is powerful enough to handle deep packet inspection (DPI) tasks, routers are better suited in real-time and line-speed processing requirements. Since the routers are designed to handle IP packet header information, if one can devise an DoS/DDoS detection/prevention methods that utilizes the router specific features it will be best for the in-line and real-time processing. We introduce a Flow based DoS/DDoS detection algorithm(FDDA) that detects Distributed Denial of Service (DDoS) attacks by monitoring TTL and ID fields of incoming packet's IP header. As DDoS attacks are based on IP source address spoofing, the TTL and ID fields may have abnormal behavior. The device keeps track of 8-tuple flow table. The behavior of these two fields is monitored to determine DoS/DDoS attack situation. The effectiveness of our method is such that it is implemented flow-based routers and devices.