摘要(英) |
As modern technology advances, the Internet has evolved beyond its initial purpose as a military communication tool. It now integrates resources, services, and applications using advanced cloud and IoT technologies, creating a complex, heterogeneous system. Network administrators, in response to demands for efficient system management and timely issue resolution, have adopted network monitoring systems. Among these, the Zabbix network monitoring tool, notable for its open-source nature and strong community support, effectively detects and manages system outages caused by instability, performance bottlenecks, or networking challenges. This tool ensures a high level of network and service availability, providing organizations with a stable approach to infrastructure management.
DDoS attacks are powerful threats that can make networks and services unavailable. Due to their high variability and difficulty in tracing, there still lacks a comprehensive solution to handle. The increasing number of botnets and widespread distribution of DDoS tools have significantly reduced the cost for attackers to launch DDoS attacks. On the contrary, for general users, the importance of the network is rapidly rising. This contrast makes DDoS attacks happens a lot in recent years. Most current defense methods require additional software, hardware support, or the acquisition of services. Therefore, defending against DDoS attacks often depends on the financial capacity of each enterprise or organization.
In this study, utilizing Zabbix as a monitoring tool, we propose an automated route blackholing mechanism to counter DDoS attacks. We introduce the UDP Reflection Amplification (URA) detection module to detect DDoS activities, and we implement the automated Remote Trigger Blackhole (RTBH) module to mitigate the impact of such attacks. This approach offers a cost-effective solution specifically for alleviating the effects of DDoS attacks |
參考文獻 |
[1] S. Lee et al. "Network monitoring: Present and future," Computer Networks, pp. 84-98, 2014.
[2] J. Hernantes et al. "IT Infrastructure-Monitoring Tools," IEEE Software, vol. 32, no. 4, pp. 88-93, 2015.
[3] S. T. Zargar et al. "A Survey of Defense Mechanisms Against Distributed Denial of Service (DDoS) Flooding Attacks," IEEE Communications Surveys & Tutorials, vol. 15, no. 4, pp. 2046-2069, 2013.
[4] NETSCOUT, "DDoS THREAT INTELLIGENCE REPORT 2022," [Online]. Available: https://www.netscout.com/threatreport/global-highlights/ [Accessed 10 Aug. 2023].
[5] Cloudflare, "Cloudflare DDoS threat report 2022 Q3," [Online]. Available: https://blog.cloudflare.com/cloudflare-ddos-threat-report-2022-q3/ [Accessed 10 Aug. 2023].
[6] Microsoft, "2022 in review: DDoS attack trends and insights," [Online]. Available: https://www.microsoft.com/en-us/security/blog/2023/02/21/2022-in-review-ddos-attack-trends-and-insights/ [Accessed 10 Aug. 2023].
[7] Wikipedia, "2022 Ukraine cyberattacks," [Online]. Available: https://en.wikipedia.org/wiki/2022_Ukraine_cyberattacks [Accessed 10 Aug. 2023].
[8] VentureBeat, "DDoS attack was largest ever in Ukraine," [Online]. Available: https://venturebeat.com/security/ddos-attack-was-largestever- in-ukraine-russia-suspected/ [Accessed 10 Aug. 2023].
[9] A. Zand et al., "Demystifying DDoS as a Service," IEEE Communications Magazine, vol. 55, no. 7, pp. 14-21, 2017.
[10] R. Kumar et al.,"Detecting Denial of Service Attacks in the Cloud," 2016 IEEE 14th Intl Conf on Dependable, Autonomic and Secure Computing, pp. 309-316, 2016.
[11] J. Hu et al., "A simple and efficient hidden Markov model scheme for host-based anomaly intrusion detection," IEEE Network, vol. 23, no. 1, pp. 42-47, 2009.
[12] S. Kaur and T. Sharma, "Efficient load balancing using improved central load balancing technique," 2018 2nd International Conference on Inventive Systems and Control, pp. 1-5, 2018.
[13] M. S. Elsayed and M. A. Azer, "Detection and Countermeasures of DDoS Attacks in Cloud Computing," 2018 Tenth International Conference on Ubiquitous and Future Networks, pp. 708-713, 2018.
[14] K. Giotis et al., "Leveraging SDN for Efficient Anomaly Detection and Mitigation on Legacy Networks," 2014 Third European Workshop on Software Defined Networks, pp. 85-90, 2014.
[15] F. Ö. Sönmez and B. G. Kılıç, "A Decision Support System for Optimal Selection of Enterprise Information Security Preventative Actions," IEEE Transactions on Network and Service Management, vol. 18, no. 3, pp. 3260-3279, 2021.
[16] S. Dong, K. Abbas and R. Jain, "A Survey on Distributed Denial of Service (DDoS) Attacks in SDN and Cloud Computing Environments," IEEE Access, vol. 7, pp. 80813-80828, 2019
[17] D. Yin, L. Zhang and K. Yang, "A DDoS Attack Detection and Mitigation With Software-Defined Internet of Things Framework," IEEE Access, vol. 6, pp. 24694-24705, 2018
[18] M. A. Aladaileh et al., " Detection Techniques of Distributed Denial of Service Attacks on Software-Defined Networking Controller–A Review" IEEE Access, vol. 8, pp. 143985-143995, 2020.
[19] J. Mirkovic et al., "Source-end DDoS defense," Second IEEE International Symposium on Network Computing and Applications, 2003.
[20] R. R. Brooks et al., "Distributed Denial of Service (DDoS): A History," in IEEE Annals of the History of Computing, vol. 44, no. 2, pp. 44-54, 2022.
[21] C. Liu et al., "Detect the reflection amplification attack based on UDP protocol," International Conference on Communications and Networking, pp. 260-265, 2015.
[22] Wikipedia, "memcached", [Online]. Available:https://en.wikipedia.org/wiki/Memcached.
[23] Cloudflare, "What is a memcached DDoS attack?," [Online]. Available: https://www.cloudflare.com/learning/ddos/memcached-ddos-attack/ [Accessed 10 Aug. 2023].
[24] Cloudflare. "Memcrashed - Major amplification attacks from UDP port 11211," [Online]. Available: https://blog.cloudflare.com/memcrashed-major-amplification-attacks-from-port-11211/ [Accessed 10 Aug. 2023].
[25] Cloudflare: "Understanding and mitigating NTP-based DDoS attacks," [Online]. Available: https://blog.cloudflare.com/understanding-and-mitigating-ntp-based-ddos-attacks/ [Accessed 10 Aug. 2023].
[26] Akamai: "What Is a CLDAP Reflection DDoS Attack?" [Online]. Available: https://www.akamai.com/glossary/what-is-a-cldap-reflection-ddos-attack/ [Accessed 10 Aug. 2023].
[27] P. Blazek et al., "Scalable DDoS Mitigation System," 2019 42nd International Conference on Telecommunications and Signal Processing, 2019, pp. 617-620
[28] Chang Liu et al., " Detect the reflection amplification attack based on UDP protocol," 2015 10th International Conference on Communications and Networking, 2015, pp. 260-265
[29] S. Mescheryakov et al., "Adaptive control of cloud computing resources in the Internet telecommunication multiservice system," 2014 6th International Congress on Ultra Modern Telecommunications and Control Systems and Workshops, pp. 287-293, 2014.
[30] RFC Editor, "BGP RFC 4271," [Online]. Available: https://www.rfc-editor.org/rfc/rfc4271 [Accessed 10 Aug. 2023].
[31] Cisco, "BGP Best Path Selection Algorithm," [Online]. Available: https://www.cisco.com/c/en/us/support/docs/ip/border-gateway-protocol-bgp/13753-25.html [Accessed 10 Aug. 2023].
[32] RFC Editor, "Remote Triggered Black Hole Filtering 5635," [Online]. Available: https://www.rfc-editor.org/rfc/rfc5635 [Accessed 10 Aug. 2023].
[33] "remotely triggered black hole filtering - destination based and source based", [Online]. Available: https://www.cisco.com/c/dam/en_us/about/security/intelligence/blackhole.pdf [Accessed 10 Aug. 2023].
[34] TRex, [Online]. Available: https://trex-tgn.cisco.com/ [Accessed 10 Aug. 2023].
[35] OffensivePython/Saddam: DDoS Amplification Tool - GitHub, [Online]. Available: https://github.com/OffensivePython/Saddam [Accessed 10 Aug. 2023].
[36] "Saddam-new is a simple reflection and amplification DoS attack tool based on Saddam," [Online]. Available: https://github.com/S4kur4/Saddam-new [Accessed 10 Aug. 2023].
[37] "The BIRD Internet Routing Daemon", [Online]. Available: https://bird.network.cz/ [Accessed 10 Aug. 2023].
[38] "CloudEOS and vEOS Router", [Online]. Available:https://www.arista.com/en/cg-veos-router/veos-router-overview [Accessed 10 Aug. 2023].
[39] "FRRouting Project", [Online]. Available:https://frrouting.org/ [Accessed 10 Aug. 2023].
[40] "CVE-2018-1000115," [Online]. Available: https://www.cvedetails.com/cve/CVE-2018-1000115/ [Accessed 10 Aug. 2023].
[41] "CVE-2013-5211," [Online]. Available: https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2013-5211 [Accessed 10 Aug. 2023]. |