首页> 外文会议>IEEE Symposium on Security and Privacy >On the Feasibility of Rerouting-Based DDoS Defenses
【24h】

On the Feasibility of Rerouting-Based DDoS Defenses

机译:基于重路由的DDoS防御的可行性

获取原文

摘要

Large botnet-based flooding attacks have recently demonstrated unprecedented damage. However, the best-known end-to-end availability guarantees against flooding attacks require costly global-scale coordination among autonomous systems (ASes). A recent proposal called routing around congestion (or RAC) attempts to offer strong end-to-end availability to a selected critical flow by dynamically rerouting it to an uncongested detour path without requiring any inter-AS coordination. This paper presents an in-depth analysis of the (in)feasibility of the RAC defense and points out that its rerouting approach, though intriguing, cannot possibly solve the challenging flooding problem. An effective RAC solution should find an inter-domain detour path for its critical flow with the two following desired properties: (1) it guarantees the establishment of an arbitrary detour path of its choice, and (2) it isolates the established detour path from non-critical flows so that the path is used exclusively for its critical flow. However, we show a fundamental trade-off between the two desired properties, and as a result, only one of them can be achieved but not both. Worse yet, we show that failing to achieve either of the two properties makes the RAC defense not just ineffective but nearly unusable. When the newly established detour path is not isolated, a new adaptive adversary can detect it in real time and immediately congest the path, defeating the goals of the RAC defense. Conversely, when the establishment of an arbitrary detour path is not guaranteed, more than 80% of critical flows we test have only a small number (e.g., three or less) of detour paths that can actually be established and disjoint from each other, which significantly restricts the available options for the reliable RAC operation. The first lesson of this study is that BGP-based rerouting solutions in the current inter-domain infrastructure seem to be impractical due to implicit assumptions (e.g., the invisibility of poisoning messages) that are unattainable in BGP's current practice. Second, we learn that the analysis of protocol specifications alone is insufficient for the feasibility study of any new defense proposal and, thus, additional rigorous security analysis and various network evaluations, including real-world testing, are required. Finally, our findings in this paper agree well with the conclusion of the major literature about end-to-end guarantees; that is, strong end-to-end availability should be a security feature of the Internet routing by design, not an ad hoc feature obtained via exploiting current routing protocols.
机译:基于僵尸网络的大型洪灾攻击最近表现出前所未有的破坏力。但是,最著名的端到端可用性保证要防止洪泛攻击,需要在自治系统(ASes)之间进行昂贵的全球规模的协调。最近一项称为拥塞路由(或RAC)的提议试图通过动态地将其重新路由到未拥塞的de回路径而无需任何AS间协调,从而为选定的关键流提供强大的端到端可用性。本文对RAC防御的(不)可行性进行了深入分析,并指出,其重新路由方法虽然很有趣,但却无法解决充满挑战的洪水问题。一个有效的RAC解决方案应为其临界流找到一个具有以下两个所需属性的域间绕道:(1)保证建立其选择的任意绕道,以及(2)将已建立的绕道与非关键流量,因此该路径专门用于其关键流量。但是,我们显示了两个所需属性之间的基本权衡,因此,只能实现其中之一,但不能同时实现。更糟糕的是,我们表明,无法同时实现这两个属性,将使RAC防御不仅无效,而且几乎无法使用。当新建立的de回路径未被隔离时,新的自适应对手可以实时检测到它,并立即阻塞该路径,从而破坏了RAC防御的目标。相反,当不能保证建立任意的tour回路径时,我们测试的超过80%的关键流量只有很少(例如三个或更少)的de回路径可以实际建立并且彼此分离。大大限制了可靠RAC操作的可用选项。本研究的第一课是,由于隐含假设(例如中毒消息的隐身性)在BGP当前的实践中无法实现,因此在当前域间基础结构中基于BGP的重路由解决方案似乎不切实际。其次,我们了解到仅对协议规范进行分析不足以进行任何新的防御提议的可行性研究,因此,需要进行额外的严格安全性分析和各种网络评估,包括实际测试。最后,我们在本文中的发现与有关端到端担保的主要文献的结论非常吻合。也就是说,强大的端到端可用性应该是设计中Internet路由的安全功能,而不是通过利用当前路由协议而获得的临时功能。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号