1 Background
Distributed Denial of Service (DDoS) is a type of resource-consuming attack, which exploits a large number of attack resources and uses standard protocols for attacking. DDoS attacks consume a large amount of target object network resources or server resources, so that the target object cannot provide network services normally. At present, DDoS attack is one of the most powerful and indefensible attacks on the Internet, and due to the extensive use of mobile devices and IoT devices in recent years, it is easier for DDoS attackers to attack with real attack sources (broilers). In 2018, the threat of DDoS attacks is still increasing. the traffic of DDoS reflection attack using memcached server vulnerabilities reached a peak of 1.7 Tbps. The opening ceremony of pyeongchang winter Olympics was subjected to DDoS attacks for up to 12 h. The industries affected by DDoS attack include banks, governments and games.
The current anti-DDoS modes mainly include three modes: one is single-point operation, such as self-built anti-DDoS equipment in the machine room [1]; the Second is cloud protection which achieve unified protection through flow lead; The third is joint prevention within an organization (called a domain) [2], such as anti-DDoS linkage processing and cloud cleaning centers. However, the current attack presents a distributed and large traffic trend, and the attack sources are spread all over the world. As far as the current situation is concerned, a certain range of defenses can no longer meet the anti-DDoS attack requirements, and comprehensive cross-network collaboration is required [3]. In order to shield operator differences from defending DDoS attacks across the entire network (global), the IETF working group proposed the DOTS framework [4], which is used to automate and standardize DDoS countermeasures and to shield differences in various anti-ddos solutions.
The existing DOTS implementation mechanisms have two problems: the first is that the mitigation request only defines the IP address, port range, protocol type, FQDN (fully qualified domain name), URI of the attacked target, but does not contain the attack type or bandwidth. As a result, the amount of information that is being attacked by the attacking target is insufficient. The second problem is that DOTS framework only uses BGP to process attack traffic. The near-source black hole operation will discard all traffic, which directly leads to the normal traffic loss of the attacked object. On the basis of DOTS, this paper proposes a flexible extended DOTS architecture that can perceive the attack types. Firstly, by extending the mitigation request method of signal channel and clarifying the attack type, the Mitigator can specifically handle the attack in the mitigation request; The second is to add request methods of the DDoS http mitigation and shunt policy module, which can adaptively select attack defense method according to the attack site, and improve the DDoS defense under the DOTS framework.
2 Existing Technologies and Shortcomings
At present, the main technologies of DDOS attack protection include: single point device protection, reverse proxy (cloud protection) and linkage defense.
Single point protection relies on the independent deployment of DDOS devices for protection. This method is simple to deploy, but due to the limited processing ability of a single device for attacks, it has insufficient capacity to deal with large traffic attacks that cause network congestion. Moreover, it is difficult to conduct uniform detection and disposal when different devices are deployed upstream and downstream in one network [5].
Reverse proxy, also known as cloud protection, is a dedicated cloud platform that implements DDOS attack detection and filtering. When the system detects abnormal traffic, it actively redirects traffic to the cloud acceleration server, and the cloud protection equipment will perform cleaning operation and then re-injected to the router of the business system [6]. The cloud protection method adopts centralized deployment, which is suitable for the cleaning needs of small and medium-sized enterprises or services; However, in the case of large-scale traffic attack, the cost of flow lead is huge and may cause new network congestion. Therefore, the cloud cleaning method is not suitable for large-scale traffic cleaning.
The linkage disposal technology is to construct a linkage system separately, analyze the data such as attack alarms issued by different anti-DDOS devices, coordinate and dispose of them. The advantage of adopting this mode is that it can deal with attacks in complex networks, especially in the case of attacks against large traffic, which can mobilize the processing capabilities of existing networks to achieve near-source distributed cleaning Under the premise of not adding new equipment, more effective cleaning of larger attack traffic can be realized, especially suitable for scenarios such as Metropolitan area network, IDC, customer business collaborative protection and so on [7].
DOTS is a cross-domain (cross-organization) processing framework for DDoS attacks defined by the IETF, and also is an implementation method of linkage processing technology. The DOTS establishes a general architecture, method and processing mechanism without considering specific attack disposal devices and means [8], which is very suitable for use in the scenarios of network operation and business operation separation. DOTS framework includes the following four parts: Attack Target, DOTS Client, DOTS Server and Mitigator.
- (1)
Attack target is attacked by DDoS, then DOTS Client sent mitigation request to DOTS Server;
- (2)
Receiving requests, DOTS Server parses request packets to obtain attack details, such as IP address information, etc.;
- (3)
Using BGP to generate an optimal path through BGP neighbor relationships;
- (4)
Mitigator chooses one or more of the nearest routers for black holes based on BGP results.
There are two interfaces between DOTS client and DOTS server: Signal Channel [9] and Data Channel. Signal Channel [10] is used for client to seek attack mitigation from server and server to inform client of the state of the mitigation process. The Data Channel is used for related configuration and policy information exchange (between client and server).
There are two implementation shortcomings in the existing DOTS framework: first, only the message communication mechanism is defined, and the attack type transmitted is not defined, which will reduce the Mitigator’s processing capability and efficiency. Second, the existing mechanism only supports mitigation notification through BGP, and the mitigation notification based on BGP can only reach the routing device for traffic lead, but cannot convey the attack type and mitigation mechanism, which is not conducive to timely attack disposal, making it difficult to meet the demand by using BGP traffic lead and disposal.
3 SE DOTS Technical Principle
SE DOTS is to add the definition of attack type in the existing DOTS framework, which can effectively improve the processing efficiency and accuracy of DOTS linkage. At the same time, extend the message communication mechanism based on HTTP to form the processing capability of classification and extension.
3.1 Attack Type Awareness
- (1)
When Attack Target creates an identifier, add the “Target-attack-Type” field;
- (2)
DOTS Client responds to requests and sends messages to DOTS Server according to existing processes;
- (3)
DOTS Server parses the request and generates mitigation request messages according to the type requirements of Mitigator;
SE DOTS adds “target-attack-type” and “target-bandwidth” fields to the mitigation request, which belongs to the Signal message generated by the attack target and sent to DOTS Client.
For the target-DDoS-type field, we define it as a string Type, and define the two fields according to the attack method and extension name. Similar to other existing linkage disposal technologies, there may be problems in the actual network environment, that attack target and mitigator (such as cleaning equipment) belong to different models of different vendors, because different vendors have different definitions of Attack in understanding and implementation. When an attack occurs, some devices may not be considered as an attack, and the effect of linkage cleaning may not be achieved. It is also possible that the detection device considere it as A type attack, while the cleaning device consider it as B type attack. When performing the cleaning schedule, it will cause the problem of incorrect cleaning or over-cleaning. Both of these errors will cause the normal business to fail to link. Therefore, it is necessary to unify the attack definition, form a standard attack definition, and solve the problem of cleaning errors from the source. we give out a complete format for DDoS attacks as [protocol level] [protocol name] [message name/operation name/port] [attack methods feature description field 1] [attack methods feature description field 2] [attack methods describe the standard field], interval between each field operators use “,” symbol or any other symbol agreed.
Based on the perceptual extension, the DOTS Server can accurately inform Mitigator of the objects and attack types that need to be disposed when the mitigation instructions are delivered to the Mitigation, so that the Mitigator can be accurately disposed.
3.2 Disposal Capacity Expansion (Extensible)
DOTS framework currently implements DDoS attack mitigation notification using BGP. Under the existing mechanism, BGP mode mitigation includes two types of measures: First, the traffic is drained through the BGP mechanism, and the dedicated cleaning equipment/cleaning center handle the traffic. Second, black hole routing (discarding) is performed on the traffic through the BGP mechanism. However, there are some deficiencies in how to choose these two kinds of measures [11]: in the case of super-large traffic attack (occupying full bandwidth), it is difficult to schedule the traffic on a large scale in the BGP shunt mode; However, when the attack intensity is lower than the limit, the BGP black hole operation drops all the traffic, which directly leads to the loss of normal traffic of the attacked object.
Cleaning equipment refers to the equipment specially used for DDoS attack traffic cleaning, including hardware and software. Cleaning center refers to a centralized cleaning equipments cluster.
- (1)
Mitigation request issued by DOTS client;
- (2)
DOTS server receives the mitigation request, parses the request, transfers the mitigation parameters to the shunt policy module, and starts the shunt strategy to select the BGP or HTTP mitigation mode;
- (a)
When BGP mode is selected, the processing flow is the same as Fig. 1;
- (b)
When select HTTP mode, send the mitigation request to the corresponding cleaning equipment (or cleaning center). The cleaning equipment (or cleaning center) will trigger the flow lead. After processing, the normal business flow will be injected back into the attack target link.
- (a)
- (1)
DOTS server parsers parameters, including: target-prefix, target-port-range, target-protocol, target-fqdn, lifetime, target-bandwidth, and target-attack-type;
- (2)
Take the parsed parameters as the input of the preferred algorithm:
- (a)
Compare the target-prefix with the IP_list of the protection device to find the corresponding mitigation provider;
- (b)
Select a cleaning device according to the target-protocol;
- (c)
Match the bandwidth to the cleaning device capability, and the cleaning device is completely processed within the cleaning capability range. When the capacity is insufficient, the shunt part performs BGP processing. If the cleaning device is selected, select different cleaning devices according to the target-attack-type.
- (a)
- (3)
According to the results of the preferred algorithm to select disposal method: when the cleaning device is used for protection, the HTTP module is used to construct an HTTP request, such as POST http://ip:port/traffic/…; when using BGP disposal, BGP request is sent using the BGP module construct.
4 SE DOTS Technical Advantages Analysis and Experiments
In SE DOTS, the Attack Target can report all the attacked situations to the DOTS Server through one message sending, while the DOTS Server can release different types of Attack disposal methods through the shunt module, reducing the communication overhead and improving the efficiency and accuracy of disposal.
The bandwidth of link A where the protection object resides: 10G;
traffic model of protection objects: normal service traffic 500M, which are HTTP requests [12] (TCP SYN traffic is generated at the same time); The total limited bandwidth is 1G, and cleaning is performed when the bandwidth exceeds 1G;
Total attack traffic: 0–10G, using hybrid attack traffic model; There are four types of attacks: UDP Flood (20%), MemCached Flood (25%), SYN Flood (30%) and HTTP Flood [13] (25%). MemCached is not included in UDP and the SYN generated by HTTP is not counted repeatedly.
The total bandwidth of BGP traction link B: 20G, the use rate of the flow in this link accounts is 60% (simulates existing network), the maximum limitation is 90%, that means that the maximum drainage capacity is 6G;
Cluster cleaning ability: about 90% of the shunted attack.
SE DOTS attack processing comparative analysis table.
Cleaning rate | Normal flow rate of false cleaning | User access success rate | |
---|---|---|---|
DOTS-BGP-BHR | 80.0% | 63.6% | 36.4% |
DOTS-BGP-FC | 77.5% | 31.9% | 68.1% |
SE DOTS | 94.5% | 0.4% | 99.6% |
The experimental results show that, under the same disposal mechanism, SE DOTS can effectively improve the cleaning capacity by 17.0% compared with the existing mechanism dots-bgp-fc, reducing the mis-cleaning traffic/increasing the user access success rate by 31.5%. This mechanism effectively cooperates with the protection capabilities of the existing network and protects the network smoothly and the healthy operation of the business.
5 Conclusion
In this paper, a comprehensive analysis of DDOS attack protection technology is carried out. Based on the DOTS mechanism of IETF, an SE DOTS framework with the capability of sensing and disposing protocol expansion is designed. Based on the analysis and experimental results, the SE DOTS linkage disposal technology can better identify and handle attacks, ensure the success rate of users accessing services. From the development of the industry, the DOTS linkage disposal technology will be further extended in the scenarios of operators and IDC service providers. It is necessary to further promote industry standardization in subsequent work and reduce the risks brought by DDOS attacks.