Transcript dos_nanog

DoS/DoS Detection and
Mitigation
Mujahid Khan
[email protected]
Three Parts to Dealing With a
(D)DoS Attack:
• Detection
• Tracking
• Mitigation
Detection

Limited Tools available to proactively monitor and report
(D)DoS attacks

Proactive detection comes with a price tag attached

Different approaches to detection
Inline detection
passive tapping detectors
Flow based detection IDS integration

Most attacks are detected by sudden increase in
bandwidth and resource utilization

Need to identify DoS/DDoS attacks and eliminate false
alarms – also need to classify attacks based on
protocol and source address
Detection
Issues with detection
???
Tracking
• Methods used to track the attack depends on the available
features on the deployed infrastructure
• Some of the issues with tracking the attack are:
– Randomness of attacks
– Distributed nature of the attacks
– Address spoofing
• Fast and wide deployment of the tracking scheme needed
to track and mitigate attacks effectively – especially
needed in case of a large number of sources for the attack
• Some of the methods used to trace back the attack
blackhole the the targeted victim – this could be a
problem
• Most current approaches for traceback are manual,
therefore slow
Mitigation
• Most actions to mitigate involve putting filters –
Usually away from the source and close to the
ingress points to the network
• Rate-limiting the attack
• Sometime the targeted IP address is
blackholed
• uRPF has helped – please deploy where
possible