Skip to main content
Erschienen in: Journal of Network and Systems Management 3/2018

08.09.2017

Towards Deployable, Distributed ISP Traffic Filtering for the Cloud-Era

verfasst von: Ramesh Subbaraman

Erschienen in: Journal of Network and Systems Management | Ausgabe 3/2018

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Traditionally Internet Service Providers (ISPs) have used a centralized traffic filtering architecture, wherein unwanted traffic heading towards a customer who subscribes to their filtering service is diverted to a security data center (SDC); from where only traffic deemed wanted is re-routed back to the customer using an overlay network of tunnels. Given the huge volumes of traffic that are being seen today, this centralized architecture’s scalability is already being stretched from a network capacity point of view. Moreover, the traffic diversion mechanism used necessitates configuring and maintaining tunnels, which is a network management overhead. We argue that this centralized architecture and tunnel necessitating traffic diversion mechanism will not scale as we move further along into the era where ISPs are becoming or providing connectivity to cloud providers. We propose a distributed architecture with multiple SDCs that scales from a capacity perspective, and describe how a standardized router capability, Border Gateway Protocol—Flow Specifications, can be used to selectively propagate traffic diversion routes which eliminates the need for tunnels. Furthermore, we show how the assigning of arriving traffic to specific SDCs can be modeled and solved as a mathematical optimization problem, which enables automated instantiation of the filtering service and also helps quantify the benefits of the distributed architecture from a capacity utilization perspective.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Fußnoten
1
While the roles of these protocols and elements in the traffic filtering context are outlined as needed, a full description of each of them is beyond the scope of this paper.
 
2
In the context of this paper, back bone complexes refer to larger facilities usually exclusive to the ISP that house routing and compute equipment; and are typically located in more sparsely populated areas where space, power, land and other costs are lower.
 
3
The same practical considerations as in Sect. 5.1 apply—here we still aggregrate by the customer’s prefixes, but they are now source prefixes rather than destination prefixes.
 
4
The model is not specific to OSPF—in general the shortest paths could be instead computed in a manner consistent with another IGP such as IS–IS.
 
5
One can also vary the demands (\({\hbox {d}}_{\mathrm{pq}}\)) when launching parallel instances of the problem as a means to do some what-if analysis before picking a solution to instantiate.
 
Literatur
3.
Zurück zum Zitat Wen, S., Jia, W., Zhou, W., Zhou, W., Xu, C.: CALD: surviving various application-layer DDoS attacks that mimic flash crowd. In: 4th International Conference on Network and System Security (NSS) (2010) Wen, S., Jia, W., Zhou, W., Zhou, W., Xu, C.: CALD: surviving various application-layer DDoS attacks that mimic flash crowd. In: 4th International Conference on Network and System Security (NSS) (2010)
6.
Zurück zum Zitat Peng, T., Leckie, C., Ramamohanarao, K.: Protection from distributed denial of service attack using history-based IP filtering, networking. In: IEEE International Conference on Communications (ICC), pp. 482–486 (2003) Peng, T., Leckie, C., Ramamohanarao, K.: Protection from distributed denial of service attack using history-based IP filtering, networking. In: IEEE International Conference on Communications (ICC), pp. 482–486 (2003)
7.
Zurück zum Zitat Yoon, M.: Using whitelsting to mitigate DDoS attacks on critical internet sites. IEEE Commun. Mag. 48(7), 110–115 (2010)CrossRef Yoon, M.: Using whitelsting to mitigate DDoS attacks on critical internet sites. IEEE Commun. Mag. 48(7), 110–115 (2010)CrossRef
8.
Zurück zum Zitat Chen, S., Chow, R.: A new perspective in defending against DDoS. In: Proceedings of the 10th IEEE Workshop on Future Trends of Distributed Computing Systems (FTDS) (2004) Chen, S., Chow, R.: A new perspective in defending against DDoS. In: Proceedings of the 10th IEEE Workshop on Future Trends of Distributed Computing Systems (FTDS) (2004)
9.
Zurück zum Zitat Liu, X., Yang, X., Lu, Y.: To filter or to authorize: network-layer DoS defense against multimillion-node botnets. In: Proceedings of the ACM SIGCOMM 2008 conference on Data communication, pp. 195–206 (2008) Liu, X., Yang, X., Lu, Y.: To filter or to authorize: network-layer DoS defense against multimillion-node botnets. In: Proceedings of the ACM SIGCOMM 2008 conference on Data communication, pp. 195–206 (2008)
12.
Zurück zum Zitat Rosen, E., Rekhter, Y.: BGP/MPLS IP Virtual Private Networks (VPNs), RFC 4364. RFC Editor (2006) Rosen, E., Rekhter, Y.: BGP/MPLS IP Virtual Private Networks (VPNs), RFC 4364. RFC Editor (2006)
19.
Zurück zum Zitat Yuksel, M., Ramakrishnan, K., Kalyanaraman, S., Houle, J., Sadhvani, R.: Required extra capacity: estimating over-provisioning in a single class of service IP backbone. IEEE Trans. Netw. Serv. Manag. 56(17), 3723–3743 (2011) Yuksel, M., Ramakrishnan, K., Kalyanaraman, S., Houle, J., Sadhvani, R.: Required extra capacity: estimating over-provisioning in a single class of service IP backbone. IEEE Trans. Netw. Serv. Manag. 56(17), 3723–3743 (2011)
27.
Zurück zum Zitat Handley, M., Greenhalg, A.: Steps Towards a DoS-Resistant Internet Architecture, SIGCOMM04 workshops (2004) Handley, M., Greenhalg, A.: Steps Towards a DoS-Resistant Internet Architecture, SIGCOMM04 workshops (2004)
28.
Zurück zum Zitat Huici, F., Handley, M.: An edge to edge filtering archi-tecture against DoS. ACM SIGCOMM Comput. Commun. Rev. 37(2), 39–50 (2007)CrossRef Huici, F., Handley, M.: An edge to edge filtering archi-tecture against DoS. ACM SIGCOMM Comput. Commun. Rev. 37(2), 39–50 (2007)CrossRef
29.
Zurück zum Zitat Greenhalg, A., Mark, H., Huici, F.: Using routing and tunneling to combat DoS attacks. In: Proceedings of the USENIX Steps to Reducing Unwanted Traffic on the Internet (SRUTI) (2005) Greenhalg, A., Mark, H., Huici, F.: Using routing and tunneling to combat DoS attacks. In: Proceedings of the USENIX Steps to Reducing Unwanted Traffic on the Internet (SRUTI) (2005)
30.
Zurück zum Zitat Ramachandran, V., Nandi, S.: Bleeding edge distributed denial of service (DDoS) attack mitigation techniques for ISPs. In: Proceedings of 8th International Conference on Information Technology (2005) Ramachandran, V., Nandi, S.: Bleeding edge distributed denial of service (DDoS) attack mitigation techniques for ISPs. In: Proceedings of 8th International Conference on Information Technology (2005)
31.
Zurück zum Zitat Lim, S., Ha, J., Kim, H., Kim, Y., Yang, S.: A SDN-oriented DDoS blocking scheme for botnet-based attacks. In: Sixth International Conference on Ubiquitous and Future Networks (ICUFN) (2014) Lim, S., Ha, J., Kim, H., Kim, Y., Yang, S.: A SDN-oriented DDoS blocking scheme for botnet-based attacks. In: Sixth International Conference on Ubiquitous and Future Networks (ICUFN) (2014)
32.
Zurück zum Zitat Moon, Y., Choi, S., Kim, H., Yoo, C.: A hybrid defense technique for ISP against the distributed denial of service attacks. Appl. Math. Inf. Sci. 8(5), 2347–2359 (2014)CrossRef Moon, Y., Choi, S., Kim, H., Yoo, C.: A hybrid defense technique for ISP against the distributed denial of service attacks. Appl. Math. Inf. Sci. 8(5), 2347–2359 (2014)CrossRef
33.
Zurück zum Zitat Sahay, R., Blanc, G., Zhang, Z., Debar, H: Towards Autonomic DDoS Mitigation using Software Defined Networking, NDSS workshop on security of emerging networking technologies (SENT) (2015) Sahay, R., Blanc, G., Zhang, Z., Debar, H: Towards Autonomic DDoS Mitigation using Software Defined Networking, NDSS workshop on security of emerging networking technologies (SENT) (2015)
34.
Zurück zum Zitat Bouet, M., Leguay, J., Conan, V.: Cost-based placement of vDPI functions in NFV infrastructures. Int. J. Netw. Manag. 25, 490–506 (2015)CrossRef Bouet, M., Leguay, J., Conan, V.: Cost-based placement of vDPI functions in NFV infrastructures. Int. J. Netw. Manag. 25, 490–506 (2015)CrossRef
35.
Zurück zum Zitat Wang, B., Zheng, Y., Lou, W., Hou, Y.: DDoS attack protection in the era of cloud computing and software-defined networking. Comput. Netw. 81, 308319 (2015)CrossRef Wang, B., Zheng, Y., Lou, W., Hou, Y.: DDoS attack protection in the era of cloud computing and software-defined networking. Comput. Netw. 81, 308319 (2015)CrossRef
36.
Zurück zum Zitat Bawany, N., Shamsi, J., Salah, K.: DDoS attack detection and mitigation using SDN: methods, practices, and solutions. Arab. J. Sci. Eng. 42(2), 425441 (2017)CrossRef Bawany, N., Shamsi, J., Salah, K.: DDoS attack detection and mitigation using SDN: methods, practices, and solutions. Arab. J. Sci. Eng. 42(2), 425441 (2017)CrossRef
37.
Zurück zum Zitat Addis, B., Belabed, D., Bouet, M., Secci, S.: Virtual network functions placement and routing optimization. In: IEEE 4th International Conference on Cloud Networking (CloudNet) (2015) Addis, B., Belabed, D., Bouet, M., Secci, S.: Virtual network functions placement and routing optimization. In: IEEE 4th International Conference on Cloud Networking (CloudNet) (2015)
38.
Zurück zum Zitat Mahajan, R., Bellovin, S., Floyd, S., Ioannidis, J., Paxson, V., Shenker, S.: Controlling high bandwidth aggregates in the network. ACM Comput. Commun. Rev. (CCR) 32, 62–73 (2002)CrossRef Mahajan, R., Bellovin, S., Floyd, S., Ioannidis, J., Paxson, V., Shenker, S.: Controlling high bandwidth aggregates in the network. ACM Comput. Commun. Rev. (CCR) 32, 62–73 (2002)CrossRef
39.
Zurück zum Zitat Zargar, S., Joshi, J., Tipper, D.: A survey of defense mechanisms against distributed denial of service (DDoS) flooding attacks. IEEE Commun. Surv. Tutor. 15(4), 2046–2069 (2013)CrossRef Zargar, S., Joshi, J., Tipper, D.: A survey of defense mechanisms against distributed denial of service (DDoS) flooding attacks. IEEE Commun. Surv. Tutor. 15(4), 2046–2069 (2013)CrossRef
40.
Zurück zum Zitat Huston, G., Michaelson, G.: Validation of Route Origination Using the Resource Certificate Public Key Infrastructure (PKI) and Route Origin Authorizations (ROAs), RFC 6483. RFC Editor (2012) Huston, G., Michaelson, G.: Validation of Route Origination Using the Resource Certificate Public Key Infrastructure (PKI) and Route Origin Authorizations (ROAs), RFC 6483. RFC Editor (2012)
41.
Zurück zum Zitat Kent, S., Lynn, C., Seo, K.: Secure Border Gateway Protocol (S-BGP). IEEE J. Sel. Areas Commun. 18(4), 582–592 (2000)CrossRef Kent, S., Lynn, C., Seo, K.: Secure Border Gateway Protocol (S-BGP). IEEE J. Sel. Areas Commun. 18(4), 582–592 (2000)CrossRef
42.
Zurück zum Zitat Kent, S., Lynn, C., Mikkelson, J., Seo, K.: Secure border gateway protocol (S-BGP)—real world performance and deployment issues. In: Proceedings of Symposium on Network and Distributed Systems Security (NDSS) (2000) Kent, S., Lynn, C., Mikkelson, J., Seo, K.: Secure border gateway protocol (S-BGP)—real world performance and deployment issues. In: Proceedings of Symposium on Network and Distributed Systems Security (NDSS) (2000)
44.
Zurück zum Zitat Sekar, V., Duffield, N., Spatscheck, O., Van der Merwe, J., Zhang, H.: LADS: Large-scale Automated DDoS Detection System. In: Proc. of USENIX ATC, pp. 171–184 (2006) Sekar, V., Duffield, N., Spatscheck, O., Van der Merwe, J., Zhang, H.: LADS: Large-scale Automated DDoS Detection System. In: Proc. of USENIX ATC, pp. 171–184 (2006)
45.
Zurück zum Zitat Verkaik, P., Spatscheck, O., Van der Merwe, J., Snoeren, A.: Primed: community-of-interest-based DDoS mitigation, ACM SIGCOMM’06 Workshops (2006) Verkaik, P., Spatscheck, O., Van der Merwe, J., Snoeren, A.: Primed: community-of-interest-based DDoS mitigation, ACM SIGCOMM’06 Workshops (2006)
48.
Zurück zum Zitat Jung, J., Krishnamurthy, B., Rabinovich, M.: Flash crowds and denial of service attacks: characterizations and implications for CDNs and web sites. In: Proceedings of the 11th International Conference on World Wide Web. pp. 293–304 Jung, J., Krishnamurthy, B., Rabinovich, M.: Flash crowds and denial of service attacks: characterizations and implications for CDNs and web sites. In: Proceedings of the 11th International Conference on World Wide Web. pp. 293–304
49.
Zurück zum Zitat Le, Q., Zhanikeev, M., Tanaka, Y.: Methods for distinguishing flash crowds from spoofed DoS attacks. In: 3rd EuroNGI Conference on Next Generation Internet Networks (2007) Le, Q., Zhanikeev, M., Tanaka, Y.: Methods for distinguishing flash crowds from spoofed DoS attacks. In: 3rd EuroNGI Conference on Next Generation Internet Networks (2007)
59.
Zurück zum Zitat National Science Foundation, Federally Funded R&D Cen-ters Master Government List, National Center for Science and Engineering Statistics (2010) National Science Foundation, Federally Funded R&D Cen-ters Master Government List, National Center for Science and Engineering Statistics (2010)
Metadaten
Titel
Towards Deployable, Distributed ISP Traffic Filtering for the Cloud-Era
verfasst von
Ramesh Subbaraman
Publikationsdatum
08.09.2017
Verlag
Springer US
Erschienen in
Journal of Network and Systems Management / Ausgabe 3/2018
Print ISSN: 1064-7570
Elektronische ISSN: 1573-7705
DOI
https://doi.org/10.1007/s10922-017-9424-1

Weitere Artikel der Ausgabe 3/2018

Journal of Network and Systems Management 3/2018 Zur Ausgabe

Premium Partner