|
CMU-CS-02-208
Computer Science Department
School of Computer Science, Carnegie Mellon University
CMU-CS-02-208
StackPi: A New Defense Mechanism Against
IP Spoofing and DDoS Attacks
Adrian Perrif, Dawn Song, Abraham Yaar
December 2002 (Update: February 2003)
CMU-CS-02-208.ps
CMU-CS-02-208.pdf
Keywords: DDoS, Denial-of-service, DoS, DoS defense, Internet, IP
address spoofing, packet marking, path identifier
Today's Internet hosts are threatened by IP spoofing attacks and
large scale Distributed Denial-of-Service (DDoS) attacks. We propose
a new defense mechanism, StackPi, which unlike previous approaches,
allows the host being attacked, or its upstream ISP, to filter out
attack packets and to detect spoofed source IP addresses, on a
per-packet basis. In StackPi, a packet is marked deterministically
by routers along its path towards the destination. Packets traveling
along the same path will have the same marking so that an attack
victim need only identify the StackPi marks of attack packets to
filter out all further attack packets with the same marking. In
addition, the victim can associate StackPi marks with source IP
addresses to detect source IP address spoofing by changes in the
corresponding StackPi mark. StackPi filtering can thus defend against
not only DDoS attacks, but also many IP spoofing attacks - such as
TCP hijacking, and multicast source spoofing attacks. Because each
complete mark fits within a single packet, the StackPi defense
responds quickly to attacks and can be effective after the first
attack packet in a IP spoofing attack, or after a small number of
attack packets in the case of a DDoS attack. StackPi also supports
incremental deployment, such that significant benefits are
realized even if only one third of Internet routers implement
StackPi marking. We show these results through analysis and
simulations based on several real Internet topologies.
26 pages
|