补救DDoS攻击的方法

ID:25515

大小:0.21 MB

页数:7页

时间:2022-12-01

金币:15

上传者:战必胜
Towards Remediating DDoS Attacks
ArtursLavrenovs
NATOCCDCOE,Tallinn,Estonia
Arturs.Lavrenovs@ccdcoe.org
DOI:10.34190/IWS.21.046
Abstract:TheInternetinfrastructurehasbeenstrugglingwithdistributeddenialofservice(DDoS)attacksformorethantwo
decades.Thispaper reviewsaspects of current remediationstrategiesfor reflectedamplifiedDDoS attacks and identifies
elementsthatareinsufficientlyresearchedwhichmightbehinderingremediationefforts.Itidentifiesadditionalactorswho
shouldbe playingaroleintheseeffortsandreviewstheirincentivesandmotivation.Theissuehaslongb eenwhetheritis
possibletoremediateabusedprotoc olsfasterthan theprotocolsgetdeprecatedwhiledevicesusingthemremainfunctional
untiltheendoftheirlife.Itnowappearsthatitis.TheMemcacheprotocolattackcapacitywasonly319MbpsinMay2020
butitwas1.7Tbpsonlytwoyearspreviously.Thusitcanbeconsideredfullyremediated.Thepaperexamineswhythiswas
asuccessfulremediationeffortandwhetheritcouldbeappliedtoothercommonlyabusedprotocolsbyusingthereflector
capacity measurement methodology. In contrast, the longterm abused DNS protocol has not seen a significant drop in
capacity,whichislingeringaround27.5Tbps.
Keywords:DDoSattacks,DDoSattackcapacity,DDoSattackremediation,reflectors,amplifiers
1. Introduction
ThefirstDDoSnetworkattackwastwodecadesagoandwassoonfollowedbyreflectedamplifiedDDoSattacks
that have been plaguing th e In ternet ever since. Although the number of reflectors observed by scanning
projects has been steadily decreasing, the attack capacity is evergrowing and is setting new records. A
reasonableobserverwouldassumethatourtechnologicalsocietyiscapableofsolvingthislongknowntechnical
challenge,andperh apswonderwhywehavenot.
ThispaperdiscussesonlyreflectedamplifiedDDoSattacksandwhiletheattackers’ desiredeffectforthevictims
is the same and may be common across different types of attack, the remediation strategies differ widely.
Compromised devices participating in a botnet and causing direct attacks attract more attention from law
enforcementagencies,Internetserviceproviders(ISP),andindustry.
ThetwofoldproblemoftheabilitytospoofsourceIPaddressesinthenetworkandalargenumberofreflectors
istherootcauseoftheissue.Anattackercapableofrentingorcompromisingahostconnectedtoamismanaged
networkcanusetheavailableuploadbandwidthbysendingpacketswiththespoofed IPaddressofthevictim
topubliclyreachablenetworkservices,whichinreturnresponddirectlytothevictimusuallywithalargerp acket
size.Thecurrentremediationstrategyistheproliferation ofnetworkconfiguration,ensuringthat on lypackets
withlegitimatesourceIPaddressesenterth eInternetfromindividualnetworks(BC P38,BCP84)andremoving
reflectors. Both thepercentage of networksthat are spoofableand the number ofreflectorsper commonly
abused protocol s havedecreased, which indicates that theremediation strategy is working, at least to some
extent,whiletheDDoSattacksarebreakingcapacityrecords.
Addressing the DDoS problem in 2020 has become more important than ever. The global pandemic almost
instantlyshiftedthewholeeducationsystemandjobsthatcanbedoneonlinetothehome.Accessingdifferent
remotesystemshasbecomeanecessityforallthoseaffected.DDoSattacksagainstman yorganisationscould
previously have had only a limited negative effect and reputational damage and the daily operations of
employeesandstudentscouldcontinueinpersonorvialocallyaccessiblesystems.Nowtheattackcanstopall
workandeducationforremoteusersrelyingonthe targetedsystem.Thishasbecomeareality;DDoSattacks
againstanelearningplatfor mbyasinglehigh schoolstudentdisruptedaccesstoonlineclassesforaweekfor
170,000users(Freed,2020).Whatcou ldbetheworldwideeconomical impactifanewrecordbreakingDDoS
attacktargetsthelargestonlinecollaborationtools?
2. Relatedwork
DDoSis a widely researched topic.It primarily follows atypicalpatternof newtechnology emerging, such as
SDN,blockchain,AI,andresearch ersapplyingittotheDDoSproblembutusually whentheattackhasalready
reachedthevictim.Therootcauseof theissueistwofold:theabilitytospoofthesourceIPaddressesandalarge
152
资源描述:

当前文档最多预览五页,下载文档查看全文

此文档下载收益归作者所有

当前文档最多预览五页,下载文档查看全文
温馨提示:
1. 部分包含数学公式或PPT动画的文件,查看预览时可能会显示错乱或异常,文件下载后无此问题,请放心下载。
2. 本文档由用户上传,版权归属用户,天天文库负责整理代发布。如果您对本文档版权有争议请及时联系客服。
3. 下载前请仔细阅读文档内容,确认文档内容符合您的需求后进行下载,若出现内容与标题不符可向本站投诉处理。
4. 下载文档时可能由于网络波动等原因无法下载或下载错误,付费完成后未能成功下载的用户请联系客服处理。
关闭