An inline detection and prevention framework for distributed denial of service attacks

Zhongqiang Chen, Zhongrong Chen, Alex Delis

Research output: Contribution to journalArticlepeer-review

Abstract

By penetrating into a large number of machines and stealthily installing malicious pieces of code, a distributed denial of service (DDoS) attack constructs a hierarchical network and uses it to launch coordinated assaults. DDoS attacks often exhaust the network bandwidth, processing capacity and information resources of victims, thus, leading to unavailability of computing systems services. Various defense mechanisms for the detection, mitigation and/or prevention of DDoS attacks have been suggested including resource redundancy, traceback of attack origins and identification of programs with suspicious behavior. Contemporary DDoS attacks employ sophisticated techniques including formation of hierarchical networks, one-way communication channels, encrypted messages, dynamic ports allocation and source address spoofing to hide the attackers' identities; such techniques make both detection and tracing of DDoS activities a challenge and render traditional DDoS defense mechanisms ineffective. In this paper, we propose the DDoS Container, a comprehensive framework that uses network-based detection methods to overcome the above complex and evasive types of attacks; the framework operates in 'inline' mode to inspect and manipulate ongoing traffic in real-time. By keeping track of connections established by both potential DDoS attacks and legitimate applications, the suggested DDoS Container carries out stateful inspection on data streams and correlates events among sessions. The framework performs stream re-assembly and dissects the resulting aggregations against protocols followed by various known DDoS attacks facilitating their identification. The traffic pattern analysis and data correlation of the framework further enhance its detection accuracy on DDoS traffic camouflaged with encryption. Actions available on identified DDoS traffic range from simple alerting to message blocking and proactive session termination. Experimentation with the prototype of our DDoS Container shows its effectiveness in classifying DDoS traffic.

Original languageEnglish (US)
Pages (from-to)7-40
Number of pages34
JournalComputer Journal
Volume50
Issue number1
DOIs
StatePublished - Jan 2007

Keywords

  • DDoS detection
  • DDoS handlers and agents
  • Distributed denial of service (DDoS) attack
  • Flooding attacks
  • Mitigation techniques prevention mechanisms

ASJC Scopus subject areas

  • Computer Science(all)

Fingerprint Dive into the research topics of 'An inline detection and prevention framework for distributed denial of service attacks'. Together they form a unique fingerprint.

Cite this