A Robust IP Packets Filtering Mechanism to Protect Servers from DDoS Attacks
碩士 === 國立清華大學 === 資訊系統與應用研究所 === 92 === DDoS attacks have occurred frequently in recent years, impacting the availability of Information Security. They also cause a great deal of damage to enterprises which provide web services. Therefore, the Internet servers need a robust IP packets filtering mech...
Main Authors: | , |
---|---|
Other Authors: | |
Format: | Others |
Language: | en_US |
Published: |
2004
|
Online Access: | http://ndltd.ncl.edu.tw/handle/56783413485292481359 |
id |
ndltd-TW-092NTHU5394011 |
---|---|
record_format |
oai_dc |
spelling |
ndltd-TW-092NTHU53940112015-10-13T13:08:03Z http://ndltd.ncl.edu.tw/handle/56783413485292481359 A Robust IP Packets Filtering Mechanism to Protect Servers from DDoS Attacks 利用一個強韌的封包過濾機制來保護伺服器免於DDoS攻擊 Yi-Kun Peng 彭義昆 碩士 國立清華大學 資訊系統與應用研究所 92 DDoS attacks have occurred frequently in recent years, impacting the availability of Information Security. They also cause a great deal of damage to enterprises which provide web services. Therefore, the Internet servers need a robust IP packets filtering mechanism to strengthen their ability to resist DDoS attacks. To configure a firewall to filter out these attacks is hard due to the open nature of Internet servers. Furthermore, the flooding sources of attacks are spoofed, and the firewall is beset by the task of configuring appropriate rules. To cleverly identify packets that are legitimate from those that are malicious is a difficult task for a firewall. Therefore, we improve the idea of “Hop-Count Filtering” addressed by Cheng Jin, et al. to build a robust IP packets Filtering Mechanism. It can detect and reduce DDoS attacks by inspecting inbound packets with an IP address database. There are distinguishing features about our IP packets filtering mechanism: (1) The IP address database, we call the Address Table, has three fields to identify packets. They are source IP address, hop-counts, and priority. The use of priority field is our idea and allows good users to keep connections on the protected server under any situations. (2) Implement a three-dimension array structure to store our Address Table, and looking up addresses on the Address Table only takes O(1) time . (3) Use probing technologies to actively construct the Address Table, and make it sufficient to detect spoofed packets by having an appropriately sized Address Table. (4) Put a queue monitor on the protected servers to prevent running out of space resources. If it is close to being full, then we will start the filter to save space resources. To establish this robust IP packets filtering mechanism on an edge router or a firewall can dynamically block attacking traffic to protect our servers from DDoS attacks. We used the Netfilter technologies, a framework inside the Linux 2.4.x which is flexible and extendable, to implement it on a victim server. Finally, we use two DDoS attacks scenarios to evaluate this mechanism and analyze the influence of some important parameters on system performance and effectiveness. We will show that this mechanism is effective against DDoS attacks. Hung-Min Sun 孫宏民 2004 學位論文 ; thesis 41 en_US |
collection |
NDLTD |
language |
en_US |
format |
Others
|
sources |
NDLTD |
description |
碩士 === 國立清華大學 === 資訊系統與應用研究所 === 92 === DDoS attacks have occurred frequently in recent years, impacting the availability of Information Security. They also cause a great deal of damage to enterprises which provide web services. Therefore, the Internet servers need a robust IP packets filtering mechanism to strengthen their ability to resist DDoS attacks. To configure a firewall to filter out these attacks is hard due to the open nature of Internet servers. Furthermore, the flooding sources of attacks are spoofed, and the firewall is beset by the task of configuring appropriate rules. To cleverly identify packets that are legitimate from those that are malicious is a difficult task for a firewall. Therefore, we improve the idea of “Hop-Count Filtering” addressed by Cheng Jin, et al. to build a robust IP packets Filtering Mechanism. It can detect and reduce DDoS attacks by inspecting inbound packets with an IP address database. There are distinguishing features about our IP packets filtering mechanism: (1) The IP address database, we call the Address Table, has three fields to identify packets. They are source IP address, hop-counts, and priority. The use of priority field is our idea and allows good users to keep connections on the protected server under any situations. (2) Implement a three-dimension array structure to store our Address Table, and looking up addresses on the Address Table only takes O(1) time . (3) Use probing technologies to actively construct the Address Table, and make it sufficient to detect spoofed packets by having an appropriately sized Address Table. (4) Put a queue monitor on the protected servers to prevent running out of space resources. If it is close to being full, then we will start the filter to save space resources.
To establish this robust IP packets filtering mechanism on an edge router or a firewall can dynamically block attacking traffic to protect our servers from DDoS attacks. We used the Netfilter technologies, a framework inside the Linux 2.4.x which is flexible and extendable, to implement it on a victim server. Finally, we use two DDoS attacks scenarios to evaluate this mechanism and analyze the influence of some important parameters on system performance and effectiveness. We will show that this mechanism is effective against DDoS attacks.
|
author2 |
Hung-Min Sun |
author_facet |
Hung-Min Sun Yi-Kun Peng 彭義昆 |
author |
Yi-Kun Peng 彭義昆 |
spellingShingle |
Yi-Kun Peng 彭義昆 A Robust IP Packets Filtering Mechanism to Protect Servers from DDoS Attacks |
author_sort |
Yi-Kun Peng |
title |
A Robust IP Packets Filtering Mechanism to Protect Servers from DDoS Attacks |
title_short |
A Robust IP Packets Filtering Mechanism to Protect Servers from DDoS Attacks |
title_full |
A Robust IP Packets Filtering Mechanism to Protect Servers from DDoS Attacks |
title_fullStr |
A Robust IP Packets Filtering Mechanism to Protect Servers from DDoS Attacks |
title_full_unstemmed |
A Robust IP Packets Filtering Mechanism to Protect Servers from DDoS Attacks |
title_sort |
robust ip packets filtering mechanism to protect servers from ddos attacks |
publishDate |
2004 |
url |
http://ndltd.ncl.edu.tw/handle/56783413485292481359 |
work_keys_str_mv |
AT yikunpeng arobustippacketsfilteringmechanismtoprotectserversfromddosattacks AT péngyìkūn arobustippacketsfilteringmechanismtoprotectserversfromddosattacks AT yikunpeng lìyòngyīgèqiángrèndefēngbāoguòlǜjīzhìláibǎohùcìfúqìmiǎnyúddosgōngjī AT péngyìkūn lìyòngyīgèqiángrèndefēngbāoguòlǜjīzhìláibǎohùcìfúqìmiǎnyúddosgōngjī AT yikunpeng robustippacketsfilteringmechanismtoprotectserversfromddosattacks AT péngyìkūn robustippacketsfilteringmechanismtoprotectserversfromddosattacks |
_version_ |
1717732133935513600 |