...
首页> 外文期刊>IEEE/ACM Transactions on Networking >Defending against distributed denial-of-service attacks with max-min fair server-centric router throttles
【24h】

Defending against distributed denial-of-service attacks with max-min fair server-centric router throttles

机译:使用以服务器为中心的最大,最小公平的节流阀来防御分布式拒绝服务攻击

获取原文
获取原文并翻译 | 示例
           

摘要

Our work targets a network architecture and accompanying algorithms for countering distributed denial-of-service (DDoS) attacks directed at an Internet server. The basic mechanism is for a server under stress to install a router throttle at selected upstream routers. The throttle can be the leaky-bucket rate at which a router can forward packets destined for the server. Hence, before aggressive packets can converge to overwhelm the server, participating routers proactively regulate the contributing packet rates to more moderate levels, thus forestalling an impending attack. In allocating the server capacity among the routers, we propose a notion of level-k max-min fairness. We first present a control-theoretic model to evaluate algorithm convergence under a variety of system parameters. In addition, we present packet network simulation results using a realistic global network topology, and various models of good user and attacker distributions and behavior. Using a generator model of web requests parameterized by empirical data, we also evaluate the impact of throttling in protecting user access to a web server. First, for aggressive attackers, the throttle mechanism is highly effective in preferentially dropping attacker traffic over good user traffic. In particular, level-k max-min fairness gives better good-user protection than recursive pushback of max-min fair rate limits proposed in the literature. Second, throttling can regulate the experienced server load to below its design limit - in the presence of user dynamics - so that the server can remain operational during a DDoS attack. Lastly, we present implementation results of our prototype on a Pentium III/866 MHz machine. The results show that router throttling has low deployment overhead in time and memory.
机译:我们的工作针对网络体系结构和相关算法,以应对针对Internet服务器的分布式拒绝服务(DDoS)攻击。基本机制是让处于压力下的服务器在选定的上游路由器上安装路由器限制。限制可以是路由器可以转发发往服务器的数据包的漏桶率。因此,在攻击性数据包收敛到使服务器不堪重负之前,参与的路由器会主动将贡献的数据包速率调整到更适中的水平,从而避免了即将来临的攻击。在路由器之间分配服务器容量时,我们提出了k级最大-最小公平性的概念。我们首先提出一种控制理论模型,以评估各种系统参数下的算法收敛性。另外,我们使用现实的全局网络拓扑以及良好的用户和攻击者分布以及行为的各种模型,给出了分组网络仿真结果。使用由经验数据参数化的Web请求生成器模型,我们还评估了节流对保护用户对Web服务器访问的影响。首先,对于激进的攻击者而言,节流机制在优先丢弃攻击者流量而不是良好用户流量方面非常有效。特别是,k级最大-最小公平性比文献中提出的最大-最小公平率限制的递归推回提供了更好的良好用户保护。其次,在用户动态的情况下,节流可以将有经验的服务器负载调节到其设计极限以下,这样服务器就可以在DDoS攻击期间保持运行状态。最后,我们介绍了在Pentium III / 866 MHz机器上的原型实现结果。结果表明,路由器节流在时间和内存方面的部署开销较低。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号