IEEE COMMUNICATIONS LETTERS, VOL. 14, NO. 5, MAY 2010

RRED: Robust RED Algorithm to Counter Low-Rate Denial-of-Service Attacks Changwang Zhang, Jianping Yin, Zhiping Cai, and Weifeng Chen

Abstract—The existing Random Early Detection (RED) algorithm and its variants are found vulnerable to emerging attacks, especially the Low-rate Denial-of-Service (LDoS) attacks. In this letter we propose a Robust RED (RRED) algorithm to improve the TCP throughput against LDoS attacks. The basic idea behind the RRED is to detect and filter out attack packets before a normal RED algorithm is applied to incoming flows. We conduct a set of simulations to evaluate the performance of the proposed RRED algorithm. The results show that, compared to existing RED-like algorithms, the RRED algorithm nearly fully preserves the TCP throughput in the presence of LDoS attacks. Index Terms—AQM, low-rate DoS attack, RED, robust.

I. I NTRODUCTION

I

N the past decades, quite a few Active Queue Management (AQM) algorithms such as Random Early Detection (RED) [1] and its variants have been proposed to handle congestion and to improve the TCP performance ([1], [2], [3], [4]). Although these AQM algorithms are highly robust to diverse network conditions, most of them were designed without considering their robustness against network attacks, such as the Denial-of-Service (DoS) attacks that have been identified as a major threat to today’s Internet services. Example DoS attacks include TCP SYN attacks, ICMP directed broadcasts and DNS flood attacks. These attacks normally generate highrate transmission of packets toward the victim node. They can be detected and alleviated [5]. Recently a new kind of DoS attack, low-rate DoS attack, has been proposed in [6] that exploits TCP’s retransmission timeout mechanism to reduce TCP throughput without being detected. Compared to traditional flooding based DoS attacks, the low-rate DoS attack does not employ a “sledge-hammer” approach of high-rate transmission of packets, and consequently eludes detection. RED-like algorithms have already been found to be notably vulnerable to LDoS attacks [7]. In this letter, we propose a novel Robust RED (RRED) algorithm to thwart the LDoS attacks. The RRED algorithm consists of a new detection algorithm and a traditional RED algorithm. The basic idea behind the RRED is to detect and filter out LDoS attack packets from incoming flows before they feed to the RED algorithm. Bloom filter techniques [8] have Manuscript received July 6, 2009. The associate editor coordinating the review of this letter and approving it for publication was F.-N. Pavlidou. This work is supported in part by the National Natural Science Foundation of China (No.60970034, No.60603062, and No.60903040) and Natural Science Foundation of Hunan Province (06JJ3035). C. Zhang, J. Yin, and Z. Cai are with the School of Computer Science, National University of Defense Technology, Changsha, China (e-mail: [email protected]). W. Chen is with the Department of Math & Computer Science, California University of Pennsylvania, USA.

Tb Rb Ta Fig. 1.

LDoS attack stream.

been used in the implementation of the RRED algorithm to manage potentially numerous incoming flows and increase the detection accuracy. We conduct a set of simulations to evaluate the performance of the proposed algorithm. Experiment results show that the RRED algorithm is highly robust when the router is under an LDoS attack. The TCP traffic remains its ideal rate and TCP throughput is nearly fully preserved. II. LD O S ATTACKS Following the notations in [6] and [9], we describe an LDoS attack using three parameters (𝑇𝑎 , 𝑇𝑏 , 𝑅𝑏 ). As shown in Fig. 1, 𝑇𝑎 represents the attack period, 𝑇𝑏 represents the attack burst width, and 𝑅𝑏 represents the attack burst rate. The LDoS attack exploits TCP’s slow-time-scale dynamics of retransmission time-out (RTO) mechanisms to reduce TCP throughput [6]. Basically, an attacker can cause a TCP flow to repeatedly enter a RTO state by sending high-rate (𝑅𝑏 ), but short-duration bursts (𝑇𝑏 ), and repeating periodically at slower RTO time-scales (𝑇𝑎 ). The TCP throughput at the attacked node will be significantly reduced while the attacker will have low average rate making it difficult to be detected. A critical observation needs to be noted here. Within a benign TCP flow, the sender will delay sending new packets if loss is detected (e.g., a packet is dropped). Consequently, a packet is suspected to be an attacking packet if it is sent within a short-range after a packet is dropped. This is the basic idea of our detection algorithm presented in Section III. III. ROBUST RED (RRED) In this section, we explain the design and implementation of the RRED algorithm. Fig. 2 describes the basic architecture of the RRED algorithm. A detection and filter block is added in front of a regular RED block on a router. The basic idea behind the RRED is to detect and filter out LDoS attack packets from incoming flows before they feed to the RED algorithm. How to distinguish an attacking packet from normal TCP packets

IEEE COMMUNICATIONS LETTERS, VOL. 14, NO. 5, MAY 2010

Fig. 2.

Architecture of Roust RED (RRED).

is critical in the RRED design. This is achieved based on the observation mentioned in Section II. All incoming TCP packets to a router belong to different flows. Here, a flow is defined by a 5-tuple (Source IP, Source Port, Destination IP, Destination Port, Protocol). We use an indicator 𝑓.𝐼 to judge whether flow 𝑓 is an LDoS attack flow or a normal TCP flow. Specifically, 𝑓.𝐼 is calculated as follows. If a packet from flow 𝑓 is considered to be an attacking packet (described below), 𝑓.𝐼 is decreased by one; if it is considered to be a normal packet, 𝑓.𝐼 is increased by one. Then an incoming packet from a flow with a negative 𝑓.𝐼 is filtered. Packets from a flow with a positive or zero 𝑓.𝐼 will further feed to the RED block. An incoming packet from flow 𝑓 is suspected to be an attacking packet if it arrives within a short-range after a packet from 𝑓 that is dropped by the detection and filter block or after a packet from any flow that is dropped by the RED block. The following process is used to define this short-range. For every flow 𝑓 (either a normal TCP flow or an LDoS flow), let 𝑓.𝑇1 be the arrival time of the last packet from 𝑓 that is dropped by the detection and filter block. Let 𝑇2 be the arrival time of the last packet from any flow that is dropped by the RED block. The short-range is defined as [𝑇𝑚𝑎𝑥 , 𝑇𝑚𝑎𝑥 + 𝑇 ∗ ], in which 𝑇𝑚𝑎𝑥 = 𝑀 𝐴𝑋(𝑓.𝑇1 , 𝑇2 ). If the arrival time of an incoming packet from flow 𝑓 falls into this range, the packet is suspected to be an attacking packet. Note that 𝑇1 is flow specific while 𝑇2 is global, which capture the fundamental characteristics of an LDoS attack flow and the global impact of the attack on the whole network, respectively. A proper value should be chosen for 𝑇 ∗ to (i) filter most attacking packets, and to (ii) pass most normal packets. In this letter, we empirically choose 𝑇 ∗ to be 10ms, which works quite well for diverse LDoS attacks, as will be seen in Section IV. Our future work is to design a mechanism that can adaptively change 𝑇 ∗ on the fly. Fig. 3 shows the pseudo codes of the RRED algorithm. We have implemented the RRED algorithm in C. Anyone interested in the code can contact the authors. In Fig. 3, 𝑝𝑘𝑡 denotes an incoming packet; 𝑓 is the flow index hashed using 𝑝𝑘𝑡’s source-destination address pair via function 𝑅𝑅𝐸𝐷 − 𝐹 𝐿𝑂𝑊 𝐻𝐴𝑆𝐻(). A router may receive packets from potentially numerous flows whereas we need to keep 𝑇1 and 𝐼 for each flow. To solve this problem we use Bloom-filters technique that is similar to SFB [3]. The Bloom filters in our RRED implementation are constructed with 𝐿 levels with each level containing 𝑁

𝑅𝑅𝐸𝐷 − 𝐸𝑁 𝑄𝑈 𝐸(𝑝𝑘𝑡) 1: 𝑓 ← 𝑅𝑅𝐸𝐷 − 𝐹 𝐿𝑂𝑊 𝐻𝐴𝑆𝐻(𝑝𝑘𝑡) 2: 𝑇𝑚𝑎𝑥 ← 𝑀 𝐴𝑋(𝐹 𝑙𝑜𝑤[𝑓 ].𝑇1 , 𝑇2 ) 3: if 𝑝𝑘𝑡.𝑎𝑟𝑟𝑖𝑣𝑎𝑙𝑡𝑖𝑚𝑒 ∈ [𝑇𝑚𝑎𝑥 , 𝑇𝑚𝑎𝑥 + 𝑇 ∗ ] then 𝑟𝑒𝑑𝑢𝑐𝑒 𝑙𝑜𝑐𝑎𝑙 𝑖𝑛𝑑𝑖𝑐𝑎𝑡𝑜𝑟 𝑏𝑦 1 𝑓 𝑜𝑟 𝑒𝑎𝑐ℎ 𝑏𝑖𝑛 𝑜𝑓 𝑓 4: 5: else 𝑖𝑛𝑐𝑟𝑒𝑎𝑠𝑒 𝑙𝑜𝑐𝑎𝑙 𝑖𝑛𝑑𝑖𝑐𝑎𝑡𝑜𝑟 𝑏𝑦 1 𝑓 𝑜𝑟 𝑒𝑎𝑐ℎ 𝑏𝑖𝑛 𝑜𝑓 𝑓 6: 7: end if 8: 𝐹 𝑙𝑜𝑤[𝑓 ].𝐼 ← 𝑚𝑎𝑥𝑖𝑚𝑢𝑚 𝑜𝑓 𝑙𝑜𝑐𝑎𝑙 𝐼 𝑓 𝑟𝑜𝑚 𝑏𝑖𝑛𝑠 𝑜𝑓 𝑓 9: if 𝐹 𝑙𝑜𝑤[𝑓 ].𝐼 >= 0 then 10: 𝑅𝐸𝐷−𝐸𝑁 𝑄𝑈 𝐸(𝑝𝑘𝑡) //𝑝𝑎𝑠𝑠 𝑝𝑘𝑡 𝑡𝑜 𝑡ℎ𝑒 𝑅𝐸𝐷 𝑏𝑙𝑜𝑐𝑘 11: if 𝑅𝐸𝐷 𝑑𝑟𝑜𝑝𝑠 𝑝𝑘𝑡 then 𝑇2 ← 𝑝𝑘𝑡.𝑎𝑟𝑟𝑖𝑣𝑎𝑙𝑡𝑖𝑚𝑒 12: 13: end if 14: else 15: 𝐹 𝑙𝑜𝑤[𝑓 ].𝑇1 ← 𝑝𝑘𝑡.𝑎𝑟𝑟𝑖𝑣𝑎𝑙𝑡𝑖𝑚𝑒 𝑑𝑟𝑜𝑝(𝑝𝑘𝑡) 16: 17: end if 18: return Fig. 3.

Pseudo codes of the RRED algorithm.

bins. Each level has an independent hash function. A flow is mapped to a total of 𝐿 bins, each in one level. Specifically, an 𝐿-tuple (𝑏1 , 𝑏2 , ..., 𝑏𝐿 ) where 𝑏𝑗 ∈ [1, ..., 𝑁 ] uniquely identifies a flow. Each bin maintains a local indicator. The filter is updated following the procedure below. If a packet from a flow 𝑓 is suspected to be an attacking packet, all the 𝐿 bins corresponding to 𝑓 reduce their local indicators by 1. Similarly, if a packet is a normal packet, all the local indicators are increased by 1 (lines 4 and 6 in Fig. 3). Note that an LDoS flow may share a bin with a normal flow on a particular level. To avoid the situation that a normal flow is polluted by an LDoS flow due to the shared bins, we empirically set an upper bound 10 and lower bound -1 for each bin’s local indicator. More specifically, an LDoS flow cannot pollute a normal flow by reducing the local indicator of the shared bin to a low negative number. Finally, the indicator 𝑓.𝐼 of flow 𝑓 equals to the maximum value of the 𝐿 local indicators from the 𝐿 bins corresponding to 𝑓 (line 8 in Fig. 3). IV. P ERFORMANCE E VALUATION In this section, we use NS-2 simulator [10] to conduct a set of simulations to evaluate the performance of proposed RRED algorithm in the presence of LDoS attacks. Several other AQM algorithms including RED [1], RED-PD [2], SFB [3], AVQ [4], and DropTail are used in the comparison. Note that LDoS attacks exploit TCP’s retransmission timeout mechanism thus we only consider TCP flows in this letter. Fig. 5 shows the experimental topology. The queue size of the bottleneck link is 50 packets. AQM algorithms are used on the bottleneck queue, and other queues use DropTail. A TCP (𝑁 𝑒𝑤𝑟𝑒𝑛𝑜) based FTP flow with packet size of 1000 bytes is generated from each user (User 1 to User 30). LDoS traffic is generated from Attacker 1 to Attacker 20 by sending UDP packets with packet size of 50 bytes. The parameters of RRED are set as 𝐿=2, 𝑁 =23, and 𝑇 ∗ =10ms. Here, 𝐿 and 𝑁 of RRED are set as the same values

ZHANG et al.:RRED:ROBUSTREDALGORITHMTOCOUNTERLOW-RATEDENIAL-OF-SERVICEATTACKS

4

3

1 (a) 0 0.2

Fig. 4.

DropTail RED RED−PD AVQ SFB RRED

2

0.5

1 1.5 Ta: LDoS attack period (s)

4

3

2

1

0 0

2

5

DropTail RED RED−PD AVQ SFB RRED

(b)

100 200 300 400 500 Tb: LDoS attack burst width (ms)

600

4

3

2

1

0 0.1

DropTail RED RED−PD AVQ SFB RRED

(c)

0.2 0.3 0.4 Rb: LDoS attack burst rate (Mbps)

0.5

TCP throughput under attack. (a) Ta =[0.2, 2], Tb=200 and Rb=0.25; (b) Ta =1, Tb=[0, 600] and Rb=0.25, (c) Ta =1, Tb=200 and Rb=[0.1, 0.5].

Ă

Ă

Fig. 5.

TCP throughput under attack (Mbps)

5 TCP throughput under attack (Mbps)

TCP throughput under attack (Mbps)

5

Experimental topology. TABLE I E XPERIMENTAL PARAMETERS Experiments

𝑇𝑎 (s)

𝑇𝑏 (ms)

𝑅𝑏 (Mbps)

Set one Set two Set three

[0.2, 2] 1 1

200 [0, 600] 200

0.25 0.25 [0.1, 0.5]

Further experiments show that the false positive of RRED on bursty but non malicious HTTP flows is less than 2% when we fix 𝑇𝑎 =1, 𝑇𝑏 =200 and 𝑅𝑏 =0.25 while varying the average number of new HTTP connections started in each second from 100 to 1000. Although we focus on TCP flows in this letter, an interesting issue will be to consider the performance of RRED on UDP flows due to the fact that UDP senders do not reduce their transmission rate. The RRED algorithm shown in Fig. 3 declares a flow to be an attacking flow only if major packets in the flow are sent within the short-range after a packet is dropped. Thus we believe that the current RRED will suspect a UDP flow if the UDP flow behaves non-responsively. Further investigation on the fairness issue will be part of our future work. V. C ONCLUSION

as SFB [3] for comparison, and 𝑇 ∗ is chosen empirically. The RED we employ here is based on packet count rather than packet byte, which is more sensitive to the small packets of LDoS attack flows. The other parameters of the AQM algorithms are all NS-2 default values. For the three parameters of the LDoS attack, we choose 𝑇𝑎 =1s since [6] reported that LDoS attacks with 𝑇𝑎 ≈ 1𝑠 are most effective. 𝑇𝑏 is set to 200ms and 𝑅𝑏 is set as 0.25Mbps so that the aggregate 𝑅𝑏 of 20 attackers is equal to the bottleneck bandwidth of the network (5Mbps). With these three parameters, we conduct three sets of experiments to evaluate and compare the performance of the AQM algorithms. For each set, we fix two values and vary the other value (see Table I). For example, for set one, we vary 𝑇𝑎 from 0.2 to 2 while fixing 𝑇𝑏 and 𝑅𝑏 . Varying these three parameters aims to investigate the robustness of the RRED algorithm if an attacker changes its resending behavior during an attack. Fig. 4 shows the experimental results corresponding to the three sets of parameters. The results show that the RRED algorithm is highly robust. The TCP throughput, which is close to the link capacity, is nearly fully preserved in diverse LDoS attacks. The results also confirm that the existing RED-like algorithms are notably vulnerable under LDoS attacks due to the oscillating TCP queue size caused by the attacks [7]. Their performance is worse than DropTail in the presence of LDoS attacks. The TCP throughput of RED-like algorithms declines as 𝑇𝑏 or 𝑅𝑏 increases.

We have proposed and implement a Robust RED (RRED) to counter LDoS attacks in this letter. Simulations and analysis show that the RRED algorithm (i) is highly robust, (ii) can significantly improve the performance of TCP under LDoS attacks, (iii) obviously outperforms existing RED-like algorithms against LDoS attacks. R EFERENCES [1] S. Floyd and V. Jacobson, “Random early detection gateways for congestion avoidance,” IEEE/ACM Trans. Networking, vol. 1, no. 4, pp. 397–413, 1993. [2] R. Mahajan, S. Floyd, and D. Wetherall, “Controlling high-bandwidth flows at the congested router,” in IEEE ICNP, 2001. [3] F. Wu-Chang, D. D. Kandlur, D. Saha, and K. G. Shin, “Stochastic fair blue: a queue management algorithm for enforcing fairness,” in IEEE INFOCOM, 2001. [4] S. S. Kunniyur and R. Srikant, “An adaptive virtual queue (AVQ) algorithm for active queue management,” IEEE/ACM Trans. Networking, vol. 12, no. 2, pp. 286–299, 2004. [5] R. K. C. Chang, “Defending against flooding-based distributed denialof-service attacks: a tutorial,” IEEE Commun. Mag., vol. 40, no. 10, pp. 42–51, 2002. [6] A. Kuzmanovic and E. W. Knightly, “Low-rate TCP-targeted denial of service attacks and counter strategies,” IEEE/ACM Trans. Netw., vol. 14, no. 4, pp. 683–696, 2006. [7] M. Guirguis, A. Bestavros, and I. Matta, “Exploiting the transients of adaptation for RoQ attacks on Internet resources,” in IEEE ICNP, 2004. [8] M. Paynter and T. Kocak, “Fully pipelined bloom filter architecture,” IEEE Commun. Lett., vol. 12, no. 11, pp. 855–857, 2008. [9] A. Shevtekar and N. Ansari, “A router-based technique to mitigate reduction of quality (RoQ) attacks,” Computer Networks, vol. 52, no. 5, pp. 957–970, 2008. [10] S. McCanne and S. Floyd, “The network simulator - ns-2,” 2008.

RRED: Robust RED Algorithm to Counter Low-Rate Denial-of-Service ...

IN the past decades, quite a few Active Queue Management. (AQM) algorithms such as Random Early Detection (RED). [1] and its variants have been proposed to handle congestion and to improve the TCP performance ([1], [2], [3], [4]). Although these AQM algorithms are highly robust to diverse network conditions, most of ...

346KB Sizes 1 Downloads 166 Views

Recommend Documents

A Robust Color Image Quantization Algorithm Based on ...
Clustering Ensemble. Yuchou Chang1, Dah-Jye Lee1, Yi Hong2, James Archibald1, and Dong Liang3. 1Department of Electrical and Computer Engineering, ...

A Robust Algorithm for Local Obstacle Avoidance
Jun 3, 2010 - Engineering, India. Index Terms— Gaussian ... Library along with Microsoft Visual Studio for programming. The robot is equipped with ...

A Robust Algorithm for Characterizing Anisotropic Local ...
755 College Road East, Princeton, NJ 08540, USA. 2. INRIA Rhône- ...... lung walls and near rib structures. All the 14 ... Academic Press, San Diego, 1990. 5.

Robust Metropolis-Hastings Algorithm for Safe ...
that the M-H algorithm with this proposal matrix, robust. M-H algorithm, also .... is a symmetric positive. (semi-)definite matrix; R>(≥)H implies that Rij >(≥)Hij.

A Robust Color Image Quantization Algorithm Based on ...
2Department of Computer Science, City University of Hong Kong, Kowloon, Hong Kong ...... Ph.D. degrees in computer science from the University of.

Counter-Proposal.pdf
If The City Collegian seeks to represent the student body of Seattle Central. Community College, this agreement. Page 1 of 1. Counter-Proposal.pdf.

ROBUST CENTROID RECOGNITION WITH APPLICATION TO ...
ROBUST CENTROID RECOGNITION WITH APPLICATION TO VISUAL SERVOING OF. ROBOT ... software on their web site allowing the examination.

MORE EFFICIENT TESTS ROBUST TO ...
MacKinnon and White (1985) considered a number of possible forms of the estimator. They showed that the HCCME's, ... estimator appears to be serious and disappears very slowly as the number of observations increases. ...... with a few additional inst

ROBUST SPEAKER CLUSTERING STRATEGIES TO ...
based stopping method and the GLR-based merging-cluster selection scheme in the presence of data source variation. The. BIC-based stopping method leads ...

Supplement to "Robust Nonparametric Confidence ...
Page 1 ... INTERVALS FOR REGRESSION-DISCONTINUITY DESIGNS”. (Econometrica ... 38. S.2.6. Consistent Bandwidth Selection for Sharp RD Designs .

Counter strike: source
Buddy guy stones.Counter strike:source.790245150050.House m.d. s05e02.Say yes to ... Hack social pdf.Therevolting cocks. Thefear walking dead.579403219.

Hong Kong tax update - Consultation paper on measures to counter ...
Dec 2, 2016 - businesses, the Group of Twenty (“G20”) and OECD released the BEPS package, .... Hong Kong has an extensive CDTA network with 35 jurisdictions. In order to ... wts consulting (Hong Kong) Ltd · Tax & Business Consulting.

PdF Download Don't Go to the Cosmetics Counter ...
Ever wonder what methylparaben, propylparaben, and butylparaben are doing in your mascara? And what is diazolidinyl urea? All four are potential irritants ...

EC counter affidavit.pdf
file/deliver an affidavit in Form 26, under Section 33-A of the. Representation of the People Act, 1951 read with Rule 4-A of the. Conduct of Elections Rules, 1961, is to enable the voters/electors. af lha aanaarnaA nnnofifr rannrr tn ennrice thcmsel

Prologue to The Master Algorithm - Washington
And the more data they have, the better they get. ... You use a data cube to summarize masses of data, look at it from .... Big data and machine learning greatly.

Add shift to -
not cycle with the data, the mask indices need to be updated whenever the buffer is cycled. - A programmer might need to shift elements in non-circular buffers ...

MULTIPLICATIVE UPDATES ALGORITHM TO ...
VARIATION FUNCTIONAL WITH A NON-NEGATIVITY CONSTRAINT. Paul Rodrıguez. Digital Signal Processing Group. Pontificia Universidad Católica del Perú.

DC_CD_VPD-Measles-Algorithm-to-Determine-Susceptibility-in ...
Page 1 of 1. General. Population. Born BEFORE 1957. No exclusion. Monitor for S/S. If no history of disease, consider titer or. single dose of vaccine. Born in or AFTER 1957. No vaccine doses. Consult with CDPHE (Meghan, Emily or Amanda). for 21-day

Add shift to -
Aug 19, 2017 - This paper proposes adding shift algorithms to the C++ STL which shift elements forward or backward in a range of elements. II. Motivation and ...

Robust Constitutionalism
Oct 5, 2008 - smoke alarms and sprinkler systems, use safe heating and take any other actions to reduce the probability of a fire. The latter strategy is not, as Farrant implies, best-case thinking. We are taking seriously the possibility that our ho

How-to Guide: Tenable.io for Lieberman RED
Additional Information. 19 ... Inc. All other products or services are trademarks of their respective owners. ..... Tenable's customers range from Fortune Global.