On the effectiveness of route-based packet filtering for distributed DoS attack prevention in power-law internets

  • Authors:
  • Kihong Park;Heejo Lee

  • Affiliations:
  • Network Systems Lab, Department of Computer Sciences, Purdue University, West Lafayette, IN;Ahnlab, Inc., 8F V-Valley Bldg., 724 Suseo-Dong, Kangnam-Ku Seoul 135-744, Korea and Network Systems Lab, Department of Computer Sciences, Purdue University, West Lafayette, IN

  • Venue:
  • Proceedings of the 2001 conference on Applications, technologies, architectures, and protocols for computer communications
  • Year:
  • 2001

Quantified Score

Hi-index 0.01

Visualization

Abstract

Denial of service (DoS) attack on the Internet has become a pressing problem. In this paper, we describe and evaluate route-based distributed packet filtering (DPF), a novel approach to distributed DoS (DDoS) attack prevention. We show that DPF achieves proactiveness and scalability, and we show that there is an intimate relationship between the effectiveness of DPF at mitigating DDoS attack and power-law network topology.The salient features of this work are two-fold. First, we show that DPF is able to proactively filter out a significant fraction of spoofed packet flows and prevent attack packets from reaching their targets in the first place. The IP flows that cannot be proactively curtailed are extremely sparse so that their origin can be localized---i.e., IP traceback---to within a small, constant number of candidate sites. We show that the two proactive and reactive performance effects can be achieved by implementing route-based filtering on less than 20% of Internet autonomous system (AS) sites. Second, we show that the two complementary performance measures are dependent on the properties of the underlying AS graph. In particular, we show that the power-law structure of Internet AS topology leads to connectivity properties which are crucial in facilitating the observed performance effects.