透過您的圖書館登入
IP:18.227.111.192
  • 學位論文

透過流量分組與隨機化延時緩解脈衝分散式阻斷服務攻擊

Mitigating Pulsing DDoS Attack with Flow Grouping and Latency Randomization

指導教授 : 葉丙成
共同指導教授 : 蕭旭君(Hsu-Chun Hsiao)
若您是本文的作者,可授權文章由華藝線上圖書館中協助推廣。

摘要


脈衝分散式阻斷服務攻擊通過不同發送源的低速流量 (low-rate flow) 集結成一 個短的流量脈衝,對於部分動態網路而言其產生效果與洪水式攻擊相當。然而, 在異質網路中,因為其組成為不同計算資源的設備,外加先前的研究提出的防禦 機制皆需要部屬在運算能力較強的設備上才能監測和緩解攻擊,這將造成運算較 弱的設備上無法部署相關防禦機制抵禦脈衝分散式阻斷服務攻擊。為此,我們提 出了一種名為 FLARE 的防禦機制,透過運算能力較強的設備協力合作而保護異 質網路中的所有網通設備。具體來說,FLARE 可分為三個階段,第一階段是在運 算能力較強的設備上將具有相同估計抵達受害者時間的流量進行分組。這些資訊 將進行交換用以識別出可疑的組。第二階段是透過修改被標記為可疑組別內流量 的路徑延遲,以破壞攻擊者所建立的時間同步。第三階段則是 FLARE 透過監測 抓到的可疑流量找出那些反覆被抓到的,並將其標記為惡意與在一段時間內阻止 它們的訪問。我們進一步將 FLARE 擴展為三種模型,主要在權衡脈衝檢測延遲 和計算資源之間的要求。實驗結果顯示,流量分組的總體準確率為 92%;在四次脈衝後,平均錯誤阻斷率低於 1%。

並列摘要


A pulsing DDoS attack produces the effect of persistent flooding to many Internet services that dynamically adjust settings. Such an attack sends a short traffic pulse through low-rate traffic from various sources of bots. Prior research proposed defense algorithms on a network device with powerful computing resources to monitor and mitigate such attacks. However, a heterogeneous network consisting of devices with diverse computing resources may fail to deploy such defense algorithms on a resource-constrained device. Instead of improving the prior defense approach to fit devices with diverse computing resources, we propose a defense approach named FLARE that collaborates powerful computing devices to protect resource-constrained devices. FLARE exchanges traffic information between powerful computing devices to explore the flows that intend to participate in constructing pulses at the victim and further block their access to the network. Specifically, FLARE has three phases, starting with powerful devices grouping flows with the same estimated arrival time at the victim and exchanging them to identify suspiciousness. Second, FLARE randomizes the path latency of a suspicious group to disrupt time synchronization between bots. Third, with those phases running continuously, FLARE considers those suspicious flows that are repeatedly caught as malicious and blocks them for a period of time. We further extend FLARE into three models with trade-offs between detection delay and required computing resources. Our experiment results show an overall 92% of accuracy on grouping flows and an under 1% of mis-blocking ratio after four pulses.

參考文獻


[1] A. Agarwal, Z. Liu, and S. Seshan. HeteroSketch: Coordinating network-wide monitoring in heterogeneous and dynamic networks. In 19th USENIX Symposium on Networked Systems Design and Implementation (NSDI 22), pages 719–741, Renton, WA, Apr. 2022. USENIX Association.
[2] J. Baird. pybloom. https://github.com/jaybaird/python-bloomfilter,2014.
[3] J. Barr. New aws auto scaling–unified scaling for your cloud applications, Jan 2018.
[4] A. Bremler-Barr, E. Brosh, and M. Sides. Ddos attack on cloud auto-scaling mechanisms. In IEEE INFOCOM 2017 - IEEE Conference on Computer Communications, pages 1–9, 2017.
[5] CAIDA. The caida ucsd anonymized oc48 internet traces, Jan. 15 2003. https://www.caida.org/catalog/datasets/passive_oc48_dataset.

延伸閱讀