Mitigating distributed denial of service attacks with Multiprotocol Label Switching--Traffic Engineering (MPLS-TE)

Approved for public release, distribution unlimited === Approved for public release, distribution unlimited === A Denial of Service (DoS) occurs when legitimate users are prevented from using a service over a computer network. A Distributed Denial of Service (DDoS) attack is a more serious form of D...

Full description

Bibliographic Details
Main Author: Vordos, Ioannis
Other Authors: Xie, Geoffrey
Published: Monterey, California. Naval Postgraduate School 2012
Online Access:http://hdl.handle.net/10945/4817
id ndltd-nps.edu-oai-calhoun.nps.edu-10945-4817
record_format oai_dc
spelling ndltd-nps.edu-oai-calhoun.nps.edu-10945-48172014-12-04T04:08:51Z Mitigating distributed denial of service attacks with Multiprotocol Label Switching--Traffic Engineering (MPLS-TE) Vordos, Ioannis Xie, Geoffrey Fulp, John D. Naval Postgraduate School (U.S.) Approved for public release, distribution unlimited Approved for public release, distribution unlimited A Denial of Service (DoS) occurs when legitimate users are prevented from using a service over a computer network. A Distributed Denial of Service (DDoS) attack is a more serious form of DoS in which an attacker uses the combined power of many hosts to flood and exhaust the networking or computing resources of a target server. In recent years, DDoS attacks have become a major threat to both civilian and military networks. Multi-Protocol Label Switching with Traffic Engineering (MPLS-TE) is an emerging technology that allows explicit, bandwidth-guaranteed packet forwarding paths to be established for different traffic flows. It provides a means for diverting packets of a suspected DDoS attack for analysis and cleaning before forwarding them to the actual destination. The objective of this research was to implement and evaluate the performance of an MPLS-TE based solution against DDoS attacks on a realistic test-bed network consisting of Cisco routers. The test-bed has been integrated with Snort®, an open source Intrusion Detection System (IDS), to achieve automatic detection and to mitigate DDoS attacks. The test-bed network was subject to a series of malicious traffic flows with varying degrees of intensity. The results demonstrated that MPLS-TE is very effective in mitigating such attacks. The overall system response time and the router CPU loads are comparable to those reported by two former NPS theses that examined alternative solutions based on BGP blackhole routing. 2012-03-14T17:43:14Z 2012-03-14T17:43:14Z 2009-03 Thesis http://hdl.handle.net/10945/4817 319715623 This publication is a work of the U.S. Government as defined in Title 17, United States Code, Section 101. As such, it is in the public domain, and under the provisions of Title 17, United States Code, Section 105, it may not be copyrighted Monterey, California. Naval Postgraduate School
collection NDLTD
sources NDLTD
description Approved for public release, distribution unlimited === Approved for public release, distribution unlimited === A Denial of Service (DoS) occurs when legitimate users are prevented from using a service over a computer network. A Distributed Denial of Service (DDoS) attack is a more serious form of DoS in which an attacker uses the combined power of many hosts to flood and exhaust the networking or computing resources of a target server. In recent years, DDoS attacks have become a major threat to both civilian and military networks. Multi-Protocol Label Switching with Traffic Engineering (MPLS-TE) is an emerging technology that allows explicit, bandwidth-guaranteed packet forwarding paths to be established for different traffic flows. It provides a means for diverting packets of a suspected DDoS attack for analysis and cleaning before forwarding them to the actual destination. The objective of this research was to implement and evaluate the performance of an MPLS-TE based solution against DDoS attacks on a realistic test-bed network consisting of Cisco routers. The test-bed has been integrated with Snort®, an open source Intrusion Detection System (IDS), to achieve automatic detection and to mitigate DDoS attacks. The test-bed network was subject to a series of malicious traffic flows with varying degrees of intensity. The results demonstrated that MPLS-TE is very effective in mitigating such attacks. The overall system response time and the router CPU loads are comparable to those reported by two former NPS theses that examined alternative solutions based on BGP blackhole routing.
author2 Xie, Geoffrey
author_facet Xie, Geoffrey
Vordos, Ioannis
author Vordos, Ioannis
spellingShingle Vordos, Ioannis
Mitigating distributed denial of service attacks with Multiprotocol Label Switching--Traffic Engineering (MPLS-TE)
author_sort Vordos, Ioannis
title Mitigating distributed denial of service attacks with Multiprotocol Label Switching--Traffic Engineering (MPLS-TE)
title_short Mitigating distributed denial of service attacks with Multiprotocol Label Switching--Traffic Engineering (MPLS-TE)
title_full Mitigating distributed denial of service attacks with Multiprotocol Label Switching--Traffic Engineering (MPLS-TE)
title_fullStr Mitigating distributed denial of service attacks with Multiprotocol Label Switching--Traffic Engineering (MPLS-TE)
title_full_unstemmed Mitigating distributed denial of service attacks with Multiprotocol Label Switching--Traffic Engineering (MPLS-TE)
title_sort mitigating distributed denial of service attacks with multiprotocol label switching--traffic engineering (mpls-te)
publisher Monterey, California. Naval Postgraduate School
publishDate 2012
url http://hdl.handle.net/10945/4817
work_keys_str_mv AT vordosioannis mitigatingdistributeddenialofserviceattackswithmultiprotocollabelswitchingtrafficengineeringmplste
_version_ 1716726345499672576