Skip to main content
Top
Published in: Journal of Network and Systems Management 3/2018

08-09-2017

Towards Deployable, Distributed ISP Traffic Filtering for the Cloud-Era

Author: Ramesh Subbaraman

Published in: Journal of Network and Systems Management | Issue 3/2018

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Traditionally Internet Service Providers (ISPs) have used a centralized traffic filtering architecture, wherein unwanted traffic heading towards a customer who subscribes to their filtering service is diverted to a security data center (SDC); from where only traffic deemed wanted is re-routed back to the customer using an overlay network of tunnels. Given the huge volumes of traffic that are being seen today, this centralized architecture’s scalability is already being stretched from a network capacity point of view. Moreover, the traffic diversion mechanism used necessitates configuring and maintaining tunnels, which is a network management overhead. We argue that this centralized architecture and tunnel necessitating traffic diversion mechanism will not scale as we move further along into the era where ISPs are becoming or providing connectivity to cloud providers. We propose a distributed architecture with multiple SDCs that scales from a capacity perspective, and describe how a standardized router capability, Border Gateway Protocol—Flow Specifications, can be used to selectively propagate traffic diversion routes which eliminates the need for tunnels. Furthermore, we show how the assigning of arriving traffic to specific SDCs can be modeled and solved as a mathematical optimization problem, which enables automated instantiation of the filtering service and also helps quantify the benefits of the distributed architecture from a capacity utilization perspective.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Footnotes
1
While the roles of these protocols and elements in the traffic filtering context are outlined as needed, a full description of each of them is beyond the scope of this paper.
 
2
In the context of this paper, back bone complexes refer to larger facilities usually exclusive to the ISP that house routing and compute equipment; and are typically located in more sparsely populated areas where space, power, land and other costs are lower.
 
3
The same practical considerations as in Sect. 5.1 apply—here we still aggregrate by the customer’s prefixes, but they are now source prefixes rather than destination prefixes.
 
4
The model is not specific to OSPF—in general the shortest paths could be instead computed in a manner consistent with another IGP such as IS–IS.
 
5
One can also vary the demands (\({\hbox {d}}_{\mathrm{pq}}\)) when launching parallel instances of the problem as a means to do some what-if analysis before picking a solution to instantiate.
 
Literature
3.
go back to reference Wen, S., Jia, W., Zhou, W., Zhou, W., Xu, C.: CALD: surviving various application-layer DDoS attacks that mimic flash crowd. In: 4th International Conference on Network and System Security (NSS) (2010) Wen, S., Jia, W., Zhou, W., Zhou, W., Xu, C.: CALD: surviving various application-layer DDoS attacks that mimic flash crowd. In: 4th International Conference on Network and System Security (NSS) (2010)
6.
go back to reference Peng, T., Leckie, C., Ramamohanarao, K.: Protection from distributed denial of service attack using history-based IP filtering, networking. In: IEEE International Conference on Communications (ICC), pp. 482–486 (2003) Peng, T., Leckie, C., Ramamohanarao, K.: Protection from distributed denial of service attack using history-based IP filtering, networking. In: IEEE International Conference on Communications (ICC), pp. 482–486 (2003)
7.
go back to reference Yoon, M.: Using whitelsting to mitigate DDoS attacks on critical internet sites. IEEE Commun. Mag. 48(7), 110–115 (2010)CrossRef Yoon, M.: Using whitelsting to mitigate DDoS attacks on critical internet sites. IEEE Commun. Mag. 48(7), 110–115 (2010)CrossRef
8.
go back to reference Chen, S., Chow, R.: A new perspective in defending against DDoS. In: Proceedings of the 10th IEEE Workshop on Future Trends of Distributed Computing Systems (FTDS) (2004) Chen, S., Chow, R.: A new perspective in defending against DDoS. In: Proceedings of the 10th IEEE Workshop on Future Trends of Distributed Computing Systems (FTDS) (2004)
9.
go back to reference Liu, X., Yang, X., Lu, Y.: To filter or to authorize: network-layer DoS defense against multimillion-node botnets. In: Proceedings of the ACM SIGCOMM 2008 conference on Data communication, pp. 195–206 (2008) Liu, X., Yang, X., Lu, Y.: To filter or to authorize: network-layer DoS defense against multimillion-node botnets. In: Proceedings of the ACM SIGCOMM 2008 conference on Data communication, pp. 195–206 (2008)
12.
go back to reference Rosen, E., Rekhter, Y.: BGP/MPLS IP Virtual Private Networks (VPNs), RFC 4364. RFC Editor (2006) Rosen, E., Rekhter, Y.: BGP/MPLS IP Virtual Private Networks (VPNs), RFC 4364. RFC Editor (2006)
19.
go back to reference Yuksel, M., Ramakrishnan, K., Kalyanaraman, S., Houle, J., Sadhvani, R.: Required extra capacity: estimating over-provisioning in a single class of service IP backbone. IEEE Trans. Netw. Serv. Manag. 56(17), 3723–3743 (2011) Yuksel, M., Ramakrishnan, K., Kalyanaraman, S., Houle, J., Sadhvani, R.: Required extra capacity: estimating over-provisioning in a single class of service IP backbone. IEEE Trans. Netw. Serv. Manag. 56(17), 3723–3743 (2011)
27.
go back to reference Handley, M., Greenhalg, A.: Steps Towards a DoS-Resistant Internet Architecture, SIGCOMM04 workshops (2004) Handley, M., Greenhalg, A.: Steps Towards a DoS-Resistant Internet Architecture, SIGCOMM04 workshops (2004)
28.
go back to reference Huici, F., Handley, M.: An edge to edge filtering archi-tecture against DoS. ACM SIGCOMM Comput. Commun. Rev. 37(2), 39–50 (2007)CrossRef Huici, F., Handley, M.: An edge to edge filtering archi-tecture against DoS. ACM SIGCOMM Comput. Commun. Rev. 37(2), 39–50 (2007)CrossRef
29.
go back to reference Greenhalg, A., Mark, H., Huici, F.: Using routing and tunneling to combat DoS attacks. In: Proceedings of the USENIX Steps to Reducing Unwanted Traffic on the Internet (SRUTI) (2005) Greenhalg, A., Mark, H., Huici, F.: Using routing and tunneling to combat DoS attacks. In: Proceedings of the USENIX Steps to Reducing Unwanted Traffic on the Internet (SRUTI) (2005)
30.
go back to reference Ramachandran, V., Nandi, S.: Bleeding edge distributed denial of service (DDoS) attack mitigation techniques for ISPs. In: Proceedings of 8th International Conference on Information Technology (2005) Ramachandran, V., Nandi, S.: Bleeding edge distributed denial of service (DDoS) attack mitigation techniques for ISPs. In: Proceedings of 8th International Conference on Information Technology (2005)
31.
go back to reference Lim, S., Ha, J., Kim, H., Kim, Y., Yang, S.: A SDN-oriented DDoS blocking scheme for botnet-based attacks. In: Sixth International Conference on Ubiquitous and Future Networks (ICUFN) (2014) Lim, S., Ha, J., Kim, H., Kim, Y., Yang, S.: A SDN-oriented DDoS blocking scheme for botnet-based attacks. In: Sixth International Conference on Ubiquitous and Future Networks (ICUFN) (2014)
32.
go back to reference Moon, Y., Choi, S., Kim, H., Yoo, C.: A hybrid defense technique for ISP against the distributed denial of service attacks. Appl. Math. Inf. Sci. 8(5), 2347–2359 (2014)CrossRef Moon, Y., Choi, S., Kim, H., Yoo, C.: A hybrid defense technique for ISP against the distributed denial of service attacks. Appl. Math. Inf. Sci. 8(5), 2347–2359 (2014)CrossRef
33.
go back to reference Sahay, R., Blanc, G., Zhang, Z., Debar, H: Towards Autonomic DDoS Mitigation using Software Defined Networking, NDSS workshop on security of emerging networking technologies (SENT) (2015) Sahay, R., Blanc, G., Zhang, Z., Debar, H: Towards Autonomic DDoS Mitigation using Software Defined Networking, NDSS workshop on security of emerging networking technologies (SENT) (2015)
34.
go back to reference Bouet, M., Leguay, J., Conan, V.: Cost-based placement of vDPI functions in NFV infrastructures. Int. J. Netw. Manag. 25, 490–506 (2015)CrossRef Bouet, M., Leguay, J., Conan, V.: Cost-based placement of vDPI functions in NFV infrastructures. Int. J. Netw. Manag. 25, 490–506 (2015)CrossRef
35.
go back to reference Wang, B., Zheng, Y., Lou, W., Hou, Y.: DDoS attack protection in the era of cloud computing and software-defined networking. Comput. Netw. 81, 308319 (2015)CrossRef Wang, B., Zheng, Y., Lou, W., Hou, Y.: DDoS attack protection in the era of cloud computing and software-defined networking. Comput. Netw. 81, 308319 (2015)CrossRef
36.
go back to reference Bawany, N., Shamsi, J., Salah, K.: DDoS attack detection and mitigation using SDN: methods, practices, and solutions. Arab. J. Sci. Eng. 42(2), 425441 (2017)CrossRef Bawany, N., Shamsi, J., Salah, K.: DDoS attack detection and mitigation using SDN: methods, practices, and solutions. Arab. J. Sci. Eng. 42(2), 425441 (2017)CrossRef
37.
go back to reference Addis, B., Belabed, D., Bouet, M., Secci, S.: Virtual network functions placement and routing optimization. In: IEEE 4th International Conference on Cloud Networking (CloudNet) (2015) Addis, B., Belabed, D., Bouet, M., Secci, S.: Virtual network functions placement and routing optimization. In: IEEE 4th International Conference on Cloud Networking (CloudNet) (2015)
38.
go back to reference Mahajan, R., Bellovin, S., Floyd, S., Ioannidis, J., Paxson, V., Shenker, S.: Controlling high bandwidth aggregates in the network. ACM Comput. Commun. Rev. (CCR) 32, 62–73 (2002)CrossRef Mahajan, R., Bellovin, S., Floyd, S., Ioannidis, J., Paxson, V., Shenker, S.: Controlling high bandwidth aggregates in the network. ACM Comput. Commun. Rev. (CCR) 32, 62–73 (2002)CrossRef
39.
go back to reference Zargar, S., Joshi, J., Tipper, D.: A survey of defense mechanisms against distributed denial of service (DDoS) flooding attacks. IEEE Commun. Surv. Tutor. 15(4), 2046–2069 (2013)CrossRef Zargar, S., Joshi, J., Tipper, D.: A survey of defense mechanisms against distributed denial of service (DDoS) flooding attacks. IEEE Commun. Surv. Tutor. 15(4), 2046–2069 (2013)CrossRef
40.
go back to reference Huston, G., Michaelson, G.: Validation of Route Origination Using the Resource Certificate Public Key Infrastructure (PKI) and Route Origin Authorizations (ROAs), RFC 6483. RFC Editor (2012) Huston, G., Michaelson, G.: Validation of Route Origination Using the Resource Certificate Public Key Infrastructure (PKI) and Route Origin Authorizations (ROAs), RFC 6483. RFC Editor (2012)
41.
go back to reference Kent, S., Lynn, C., Seo, K.: Secure Border Gateway Protocol (S-BGP). IEEE J. Sel. Areas Commun. 18(4), 582–592 (2000)CrossRef Kent, S., Lynn, C., Seo, K.: Secure Border Gateway Protocol (S-BGP). IEEE J. Sel. Areas Commun. 18(4), 582–592 (2000)CrossRef
42.
go back to reference Kent, S., Lynn, C., Mikkelson, J., Seo, K.: Secure border gateway protocol (S-BGP)—real world performance and deployment issues. In: Proceedings of Symposium on Network and Distributed Systems Security (NDSS) (2000) Kent, S., Lynn, C., Mikkelson, J., Seo, K.: Secure border gateway protocol (S-BGP)—real world performance and deployment issues. In: Proceedings of Symposium on Network and Distributed Systems Security (NDSS) (2000)
44.
go back to reference Sekar, V., Duffield, N., Spatscheck, O., Van der Merwe, J., Zhang, H.: LADS: Large-scale Automated DDoS Detection System. In: Proc. of USENIX ATC, pp. 171–184 (2006) Sekar, V., Duffield, N., Spatscheck, O., Van der Merwe, J., Zhang, H.: LADS: Large-scale Automated DDoS Detection System. In: Proc. of USENIX ATC, pp. 171–184 (2006)
45.
go back to reference Verkaik, P., Spatscheck, O., Van der Merwe, J., Snoeren, A.: Primed: community-of-interest-based DDoS mitigation, ACM SIGCOMM’06 Workshops (2006) Verkaik, P., Spatscheck, O., Van der Merwe, J., Snoeren, A.: Primed: community-of-interest-based DDoS mitigation, ACM SIGCOMM’06 Workshops (2006)
48.
go back to reference Jung, J., Krishnamurthy, B., Rabinovich, M.: Flash crowds and denial of service attacks: characterizations and implications for CDNs and web sites. In: Proceedings of the 11th International Conference on World Wide Web. pp. 293–304 Jung, J., Krishnamurthy, B., Rabinovich, M.: Flash crowds and denial of service attacks: characterizations and implications for CDNs and web sites. In: Proceedings of the 11th International Conference on World Wide Web. pp. 293–304
49.
go back to reference Le, Q., Zhanikeev, M., Tanaka, Y.: Methods for distinguishing flash crowds from spoofed DoS attacks. In: 3rd EuroNGI Conference on Next Generation Internet Networks (2007) Le, Q., Zhanikeev, M., Tanaka, Y.: Methods for distinguishing flash crowds from spoofed DoS attacks. In: 3rd EuroNGI Conference on Next Generation Internet Networks (2007)
59.
go back to reference National Science Foundation, Federally Funded R&D Cen-ters Master Government List, National Center for Science and Engineering Statistics (2010) National Science Foundation, Federally Funded R&D Cen-ters Master Government List, National Center for Science and Engineering Statistics (2010)
Metadata
Title
Towards Deployable, Distributed ISP Traffic Filtering for the Cloud-Era
Author
Ramesh Subbaraman
Publication date
08-09-2017
Publisher
Springer US
Published in
Journal of Network and Systems Management / Issue 3/2018
Print ISSN: 1064-7570
Electronic ISSN: 1573-7705
DOI
https://doi.org/10.1007/s10922-017-9424-1

Other articles of this Issue 3/2018

Journal of Network and Systems Management 3/2018 Go to the issue

Premium Partner