Emergence of DDoS resistant augmented Split architecture

Distributed Denials of Service (DDoS) attacks have become the daunting problem for businesses, system administrators and computer system users. Prevention and detection of a DDoS attack is a major research topic for researchers throughout the world. As new remedies are developed to prevent or mitigate DDoS attacks, invaders are continually evolving new methods to circumvent these new procedures. In this paper, we describe various DDoS attack mechanisms, categories, scope of DDoS attacks and their existing countermeasures. In response, we propose to introduce DDoS resistant Augmented Split-protocol (ASp). The migratory nature and role changeover ability of servers in Split-protocol architecture will avoid bottleneck at the server side. It also offers the unique ability to avoid server saturation and compromise from DDoS attacks. The goal of this paper is to present the concept and performance of (ASp) as a defensive tool against DDoS attacks.

[1]  Mark Crovella,et al.  Mining anomalies using traffic feature distributions , 2005, SIGCOMM '05.

[2]  Fengmin Gong,et al.  Deciphering Detection Techniques: Part III Denial of Service Detection , 2003 .

[3]  B. B. Gupta,et al.  Dynamic and Auto Responsive Solution for Distributed Denial-of-Service Attacks Detection in ISP Network , 2012, ArXiv.

[4]  Vinod Yegneswaran,et al.  Characteristics of internet background radiation , 2004, IMC '04.

[5]  Peter Reiher,et al.  A taxonomy of DDoS attack and DDoS defense mechanisms , 2004, CCRV.

[6]  Jun Li,et al.  SAVE: source address validity enforcement protocol , 2002, Proceedings.Twenty-First Annual Joint Conference of the IEEE Computer and Communications Societies.

[7]  Alexander L. Wijesinha,et al.  Split protocol client/server architecture , 2012, 2012 IEEE Symposium on Computers and Communications (ISCC).

[8]  Ruby B. Lee,et al.  Distributed Denial of Service: Taxonomies of Attacks, Tools, and Countermeasures , 2004, PDCS.

[9]  Basil S. Maglaris,et al.  Distributed Management Architecture for Cooperative Detection and Reaction to DDoS Attacks , 2004, Journal of Network and Systems Management.

[10]  Juhi Jain,et al.  Mitigation of Denial of Service (DoS) Attack , 2011 .

[11]  Kotagiri Ramamohanarao,et al.  Survey of network-based defense mechanisms countering the DoS and DDoS problems , 2007, CSUR.

[12]  Bharat S. Rawal,et al.  Multi-client/Multi-server split architecture , 2013, The International Conference on Information Networking 2013 (ICOIN).

[13]  Alexander L. Wijesinha,et al.  The Design and Performance of a Bare PC Web Server , 2008, Int. J. Comput. Their Appl..

[14]  Martin Roesch,et al.  Snort - Lightweight Intrusion Detection for Networks , 1999 .

[15]  Bill Cheswick,et al.  Tracing Anonymous Packets to Their Approximate Source , 2000, LISA.

[16]  Alexander L. Wijesinha,et al.  Mini Web Server Clusters for HTTP Request Splitting , 2011, 2011 IEEE International Conference on High Performance Computing and Communications.

[17]  Heejo Lee,et al.  On the effectiveness of probabilistic packet marking for IP traceback under denial of service attack , 2001, Proceedings IEEE INFOCOM 2001. Conference on Computer Communications. Twentieth Annual Joint Conference of the IEEE Computer and Communications Society (Cat. No.01CH37213).

[18]  Srikanth Kandula,et al.  Botz-4-sale: surviving organized DDoS attacks that mimic flash crowds , 2005, NSDI.

[19]  Qi Zhang,et al.  Indra: A Distributed Approach to Network Intrusion Detection and Prevention , 2001 .

[20]  Stefan Savage,et al.  Inferring Internet denial-of-service activity , 2001, TOCS.

[21]  Roch Guérin,et al.  On the robustness of router-based denial-of-service (DoS) defense systems , 2005, CCRV.

[22]  Thomer M. Gil,et al.  MULTOPS: A Data-Structure for Bandwidth Attack Detection , 2001, USENIX Security Symposium.

[23]  Wanlei Zhou,et al.  Chaos theory based detection against network mimicking DDoS attacks , 2009, IEEE Communications Letters.

[24]  Dan Schnackenberg,et al.  Statistical approaches to DDoS attack detection and response , 2003, Proceedings DARPA Information Survivability Conference and Exposition.

[25]  Brett Wilson,et al.  Autonomic Response to Distributed Denial of Service Attacks , 2001, Recent Advances in Intrusion Detection.

[26]  Alexander L. Wijesinha,et al.  A split protocol technique for web server migration , 2012, 2012 IEEE 9th International Conference on Mobile Ad-Hoc and Sensor Systems (MASS 2012).

[27]  S. Malathi,et al.  AN EFFECTIVE PREVENTION OF ATTACKS USING GI TIME FREQUENCY ALGORITHM UNDER DD OS , 2011 .

[28]  Kai Hwang,et al.  Collaborative Detection of DDoS Attacks over Multiple Network Domains , 2007, IEEE Transactions on Parallel and Distributed Systems.

[29]  Ruby B. Lee,et al.  Taxonomies of Distributed Denial of Service Networks, Attacks, Tools, and Countermeasures , 2003 .

[30]  Vern Paxson,et al.  Bro: a system for detecting network intruders in real-time , 1998, Comput. Networks.

[31]  S. Malathi,et al.  Prevention of Attacks under DDoS Using Target Customer Behavior , 2012 .

[32]  John S. Heidemann,et al.  A framework for classifying denial of service attacks , 2003, SIGCOMM '03.

[33]  Robert Beverly,et al.  The Spoofer Project: Inferring the Extent of Internet Source Address Filtering on the Internet , 2005, SRUTI.

[34]  Randall R. Stewart,et al.  Improving TCP's Robustness to Blind In-Window Attacks , 2010, RFC.

[35]  Rocky K. C. Chang,et al.  Engineering of a global defense infrastructure for DDoS attacks , 2002, Proceedings 10th IEEE International Conference on Networks (ICON 2002). Towards Network Superiority (Cat. No.02EX588).

[36]  Abdullah Gani,et al.  Bayesian Learning Networks Approach to Cybercrime Detection , 2003 .

[37]  Alexander L. Wijesinha,et al.  Splitting HTTP requests on two servers , 2011, 2011 Third International Conference on Communication Systems and Networks (COMSNETS 2011).

[38]  DiotChristophe,et al.  Mining anomalies using traffic feature distributions , 2005 .

[39]  David Slee Common Denial of Service Attacks , 2007 .

[40]  Andreas Blass,et al.  Inadequacy of computable loop invariants , 2001, TOCL.

[41]  Robert Beverly,et al.  The spoofer project: inferring the extent of source address filtering on the internet , 2005 .