Vous êtes sur la page 1sur 7

focused on mitigating the effects of the

attacks. This approach provides an


Speedy IP trace effective stopgap measure, but doesn’t

back (SIPT) eliminate the problem or discourage


attackers.
for
INTRODUCTION:
identifying DOS In a denial-of-service (DoS) attack,

attacks an attacker attempts to prevent


legitimate user from accessing
information or services by targeting his
ABSTRACT: computer and its network connection, or
Denial-of-service (DoS) is a type of the computers and network of the sites
attack in networks in which an attacker that he is trying to use. Eg: flooding the
may be able to prevent legitimate users network with information.
from accessing email, web sites, online In a distributed denial-of-service
accounts(banking, etc.), or other services (DDoS) attack, an attacker may use
that rely on the affected computer. other user’s computer to attack another
Unfortunately, mechanisms for dealing computer. By taking advantage of
with DoS attacks haven’t advanced at security vulnerabilities or weaknesses,
the same pace as the attacks themselves. an attacker could take control of other
This paper presents a new method computers, thereby sending huge
for identifying denial-of-service attacks amounts of data to a web site or send
that uses the attacker’s media access spam to particular email addresses. The
control address for identification and attack is "distributed", because the
trace back. Our approach to thwarting attacker is using multiple computers, to
DoS attacks, also called Speedy IP launch the denial-of-service attack. They
Trace back (SIPT), uses the boundary can explicitly conceal their origin by
router the attacker is connected to, directly compromising individual slave,
allows identification after the attack, and or zom-bie, host computers without the
imposes minimal extra load on the computer owner’s knowledge.
network. Most research in this area has
For example, a remote master machine media access control (MAC) address, we
can send packets from many different can identify the attacker and find the
slave computers under its control. attack path.
Attackers can also implicitly conceal the With SIPT, each router determines if
attack’s origin with a reflector that an incoming packet originated from a
responds to false requests the slaves send directly connected client or another
on the victim’s behalf. router. If the packet came from a client,
This traceback problem is driven by the router inserts a data link connection
the operational need to control and identifier for the source (client) and the
contain attacks. Even though packets IP address of its own incoming interface.
have a source and destination IP address, The packet is then forwarded as usual. If
the source is frequently falsified, the packet came from a router, it is
allowing DoS attacks to occur. simply forwarded without any addition.
With this additional source link address
SIPT FOR IDENTIFYING THE information in the packet, the destination
BOUNDARY ROUTER : can identify the attacker’s boundary
Existing techniques to combat router.
DoS attacks focus on finding the entire
set of routers that the attack packet has EXISTING MECHANISMS:
traversed. However, knowing the A variety of IP trace back techniques
packet’s actual path doesn’t really help exist. However, all have their own
to find the attacker. Statistically, packets drawbacks. Some of the existing
don’t usually follow many different mechanisms are:
paths while moving between the source INGRESS FILTERING :
The ingress filtering
and destination.
approach configures routers to block
Speedy IP Traceback (SIPT)
packets that arrive with illegitimate
method finds boundary router (the router
source addresses. This requires a router
connected directly to the client) or a
with enough power to examine the
particular client’s Linux embedded
source address of every packet, and
appliance firewall router. Once we know
sufficient knowledge to distinguish
the boundary router and the attacker’s
between legitimate and illegitimate Some assume that administrators
addresses. can store, or log, all packets that traverse
a router or network to investigate attacks
LINK TESTING : even after they have stopped.
Administrators use two different types of Administrators could handle this by
link tests: input debugging and using a fixed amount of storage capacity
controlled flooding. and logging recent data while purging
Input Debugging: With this test, old data as needed. They could also use
administrators capture and record packet slicing, which only records each
specific details on IP packets that packet’s IP header information. This
traverse networks. Once administrators technique could potentially affect system
know that an attack is in progress, they and network performance through
must find a unique characteristic increased traffic from logged data and
common across attack packets. This is higher router CPU and memory
called the attack signature, which is utilization.
used to differentiate attack traffic and
determine the inbound interface. ICMP Traceback:
Controlled Flooding: Internet Control Message Protocol
This involves sending large bursts (ICMP) traceback forwards packets so
of traffic link by link upstream and that routers can, with a low probability,
monitoring the impact on the rate of generate a traceback message that’s sent
received attacking packets. While an along to the destination. With enough
attack is in progress, an administrator traceback messages from enough routers
can run extended pings across each along the path, the traceback can
upstream link to see which has an effect determine the traffic source and path.
on attacking traffic. Once the
administrator finds this link on the router
closest to the victim, the process is
repeated with the next router upstream.

LOGGING:
Some have proposed using reserved
and unused fields in the IP header to
support this feature. Although adding
more information to IP headers might
increase fragmentation, an administrator
could create a coding scheme to ensure
that traceback information doesn’t cause
packets to exceed the maximum
transmission unit.
Attackers could also forge the
information in this field, similar to
spoofing the source address. However,
an administrator could put a security or
authentication measure in place to
prevent this. One other drawback: Packet
marking would need to be implemented
globally within the Internet to be of real
value.
Table 1 shows the relative advantages
and disadvantages of the new approach
(SIPT) and each traceback technique.
Packet Marking:
One inventive idea is to insert traceback
information directly into IP headers as
they traverse routers. As Figure 2 shows,
this would let a DoS attack victim glean
the attack traffic’s true path from the
original packet. This technique would
also eliminate attacker’s ability to
conceal the true source.
into the packet’s IP header using one of
the several available packet-marking
techniques.
This marking process inserts the
attacker identification information
(AII). After marking, the system
forwards the packet as usual. If the
packet didn’t arrive from a directly
connected client, but instead from
another upstream router, it is forwarded
as usual without any marking.
Every packet that the server receives is
hence marked with the MAC address of
the machine that sent it and the IP
address of the router the machine is
connected to. The server is thus armed
with enough information to establish the
origin of every packet it receives. The
marking must be done at the first router
because it alone knows the client’s MAC
address. Subsequently, the attacker’s
source MAC address will be lost when
the MAC header is replaced in the next
HOW SIPT WORKS : hop. Several available intrusion
The router plays a vital role in detection systems will detect a DoS
SIPT. For packets originating from a attack and trigger our system into
directly connected client, the router action.The server then captures the
inserts the client’s data link identifier attack packets either by pattern analysis,
(available in the source MAC field of the or by a hash-table counting method.
MAC header) and its own IP address As Figure 3 shows, we used the hash-
(the address of the incoming interface) table counting method in our all-Linux
implementation. This new approach
extracts the AII from the packet and
stores it in the hash table after
classifying or hashing it on the basis of
the MAC address. This approach also
maintains a record of the number of
packets arriving from the same machine
and containing the same AII.
On building the hash table, we could CONCLUSION :
clearly identify the machine(s) that sent Since our method has
traffic in anomalously large proportions. backward compatibility and supports
These were then blacklisted as attack incremental deployment, the probability
machines. We could also identify when of finding an attacker will increase with
more than one machine sent the percentage of routers capable of
anomalously large proportions of traffic, running our trace back algorithm. For
a capability that makes our system useful our implementation, we trust the
for fighting DDoS attacks. authenticity of the MAC addresses.
After this, an administrator can Although IP address spoofing is
quickly and easily perform the common, statistics show that MAC
traceback. The server refers to the AII address spoofing is less prevalent.
and retrieves the IP address of the router However, future MAC address
the attacker is directly connected to and spoofing can’t be ruled out. In any case,
the ttacker’s MAC address. The system even if the MAC address is spoofed,
can identify the attacker with just these this method manages to pinpoint the
two pieces of information. boundary router, which in itself amounts
to solving a major portion of the IP
traceback problem.
The SIPT approach doesn’t
constitute a hop-by-hop traceback.
Instead, it directly finds the boundary
router connected to the attacker. Besides
being a faster method for finding the IEEE/ACM Trans. Networking, June
attacker, SIPT results in a lower network 2001, pp. 226-237.
overload than other methods. Although 4. C. Gong and K. Sarac, “IP Traceback
tuned for defense of DoS, SIPT can be with Packet Marking
used to single out other kinds of attacks and Logging,” Proc. South Central
once the trace has identified an attack Information Security
packet. Symp. (SCISS 04), Univ. of North
Considering the vast scope of Texas, 2004, p. 1.
networking issues and problems, many 5. S. Bellovin, M. Leech, and T. Taylor,
more layers of implementation might be “ICMP Traceback Messages,”
needed as we proceed with deployment. Network Working Group Internet draft,
Mar. 2000;
REFERENCES: www.cs.columbia.edu/~smb/papers/draft
1. S. Specht and R. Lee, “Distributed
-bellovin-itrace-00.txt.
Denial of Service: Taxonomies of
Attacks, Tools, and Countermeasures,”
Proc. 17th Int’l Conf. Parallel and
Distributed Computing Systems
http://palms.ee.princeton.edu/PALMSop
en/DDoS%20Final%20PDCS%20
Paper.pdf.
2. P. Ferguson and D. Senie, Network
Ingress Filtering: Defeating
Denial of Service Attacks which Employ
IP Source Address
Spoofing, IETF RFC 2827, May 2000;
www.rfceditor.
org/rfc/rfc2827.txt.
3. S. Savage et al., “Network Support for
IP Traceback,”

Vous aimerez peut-être aussi