Amplification and DRDoS Attack Defense - arXiv · Amplification and DRDoS Attack Defense – A...

26
Amplification and DRDoS Attack Defense – A Survey and New Perspectives Fabrice J. Ryba * , Matthew Orlinski * , Matthias W¨ ahlisch * , Christian Rossow , Thomas C. Schmidt * Freie Universit¨ at Berlin, Berlin, Germany, Email: {fabrice.ryba, m.orlinski, m.waehlisch}@fu-berlin.de Saarland University, Saarbruecken, Germany, Email: [email protected] HAW Hamburg, Hamburg, Germany, Email: [email protected] Abstract—The severity of amplification attacks has grown in recent years with recent attacks involving several hundreds of Gbps attack volume. In this paper, we survey the threat of amplification attacks and compare a wide selection of different proposals for preventing, detecting, and filtering amplification attack traffic. Since source IP spoofing plays an important part in almost all of the amplification attacks surveyed, we also survey state-of- the-art of spoofing defenses as well as approaches to trace spoofing sources. This work acts as an introduction into many different types of amplification attacks and source IP address spoofing. By combining previous works into a single comprehensive discussion we hope to prevent redun- dant work and encourage others to find practical solutions for defending against future amplification attacks. I. I NTRODUCTION Denial of Service (DoS) attacks against networks at- tempt to make a system or an entire network unavailable for its intended purpose [1]. In some cases DoS attacks cause a complete loss of Internet connectivity for the victim [2]. The motivation for DoS attacks can be finan- cial [3], [4], political [2], ideological [5], reputation [6], [7], to test new techniques and prepare for larger attacks, or purely for disruptive purposes [8]. A general overview of DoS attacks and defense strate- gies can already be found in the surveys by Mirkovic and Reiher [9], Douligeris and Mitrokotsa [10], and more recently Zargar et al. [11]. Instead, this paper focuses on a particular type of DoS attack called an amplification attack (also called Distributed Reflective Denial of Service (DRDoS) attacks [12], [13]) where the attacker seeks to maximise the volume of attack traffic sent to the victim whilst minimising the volume of traffic they send to trigger the attack [14]–[20]. We will not discuss other low traffic volume and high impact DoS attacks, e.g., Slowloris [21] or TCP SYN floods [22], unless their defenses are also applicable to amplification attacks. Generally, the adversary in amplification attacks targets vulnerabilities in Internet protocols and services to amplify the amount of attack traffic. The ease of per- forming amplification attacks and greater understanding of their effect has led to an increase of attacks in recent years. This is supported, e.g., by the OpenDNS Security Lab that saw over 5,000 different amplification attacks every hour in 2014 [23], and by Rossow’s survey of amplification vulnerabilities [13]. The most prominent form of amplification attack seen in recent years abuses the lack of endpoint verification in the Internet Protocol (IP) in order to trick third-party servers into sending large amounts of data to victims. That is, attackers spoof source IP addresses [24] to hide their identity and cause third-parties to send data to the victim as identified by the source address field of the IP packet. This is also sometimes called reflection because attackers “reflect” attack traffic off of benign services. As well as reflection, attackers sometimes strive to maximize the attack bandwidth sent to the victim by using amplification. For example, many UDP-based pro- tocols (such as DNS or NTP) that have a higher response payload size than the requests can be abused to amplify the reflected attack traffic. Consider DNS, while DNS lookup requests are typically rather small, the responses may be significantly larger, e.g., due to verbose informa- tion such as DNSSEC records. By combining reflection and amplification attackers can generate attack traffic volumes which are signifi- cantly higher than their uplink bandwidth [2], [4], [8], [25]. Furthermore, not only single hosts may be affected by such attacks. Entire networks may struggle to cope with the extra bandwidth and processing demands [25]. arXiv:1505.07892v3 [cs.NI] 17 May 2016

Transcript of Amplification and DRDoS Attack Defense - arXiv · Amplification and DRDoS Attack Defense – A...

Page 1: Amplification and DRDoS Attack Defense - arXiv · Amplification and DRDoS Attack Defense – A Survey and New Perspectives Fabrice J. Ryba, Matthew Orlinski, Matthias W¨ahlisch

Amplification and DRDoS Attack Defense –A Survey and New Perspectives

Fabrice J. Ryba∗, Matthew Orlinski∗, Matthias Wahlisch∗, Christian Rossow†, Thomas C. Schmidt‡∗ Freie Universitat Berlin, Berlin, Germany,

Email: {fabrice.ryba, m.orlinski, m.waehlisch}@fu-berlin.de† Saarland University, Saarbruecken, Germany,

Email: [email protected]‡ HAW Hamburg, Hamburg, Germany,

Email: [email protected]

Abstract—The severity of amplification attacks hasgrown in recent years with recent attacks involving severalhundreds of Gbps attack volume. In this paper, we surveythe threat of amplification attacks and compare a wideselection of different proposals for preventing, detecting,and filtering amplification attack traffic. Since source IPspoofing plays an important part in almost all of theamplification attacks surveyed, we also survey state-of-the-art of spoofing defenses as well as approaches to tracespoofing sources. This work acts as an introduction intomany different types of amplification attacks and sourceIP address spoofing. By combining previous works into asingle comprehensive discussion we hope to prevent redun-dant work and encourage others to find practical solutionsfor defending against future amplification attacks.

I. INTRODUCTION

Denial of Service (DoS) attacks against networks at-tempt to make a system or an entire network unavailablefor its intended purpose [1]. In some cases DoS attackscause a complete loss of Internet connectivity for thevictim [2]. The motivation for DoS attacks can be finan-cial [3], [4], political [2], ideological [5], reputation [6],[7], to test new techniques and prepare for larger attacks,or purely for disruptive purposes [8].

A general overview of DoS attacks and defense strate-gies can already be found in the surveys by Mirkovicand Reiher [9], Douligeris and Mitrokotsa [10], andmore recently Zargar et al. [11]. Instead, this paperfocuses on a particular type of DoS attack called anamplification attack (also called Distributed ReflectiveDenial of Service (DRDoS) attacks [12], [13]) where theattacker seeks to maximise the volume of attack trafficsent to the victim whilst minimising the volume of trafficthey send to trigger the attack [14]–[20]. We will notdiscuss other low traffic volume and high impact DoS

attacks, e.g., Slowloris [21] or TCP SYN floods [22],unless their defenses are also applicable to amplificationattacks. Generally, the adversary in amplification attackstargets vulnerabilities in Internet protocols and servicesto amplify the amount of attack traffic. The ease of per-forming amplification attacks and greater understandingof their effect has led to an increase of attacks in recentyears. This is supported, e.g., by the OpenDNS SecurityLab that saw over 5,000 different amplification attacksevery hour in 2014 [23], and by Rossow’s survey ofamplification vulnerabilities [13].

The most prominent form of amplification attack seenin recent years abuses the lack of endpoint verificationin the Internet Protocol (IP) in order to trick third-partyservers into sending large amounts of data to victims.That is, attackers spoof source IP addresses [24] to hidetheir identity and cause third-parties to send data to thevictim as identified by the source address field of the IPpacket. This is also sometimes called reflection becauseattackers “reflect” attack traffic off of benign services.

As well as reflection, attackers sometimes strive tomaximize the attack bandwidth sent to the victim byusing amplification. For example, many UDP-based pro-tocols (such as DNS or NTP) that have a higher responsepayload size than the requests can be abused to amplifythe reflected attack traffic. Consider DNS, while DNSlookup requests are typically rather small, the responsesmay be significantly larger, e.g., due to verbose informa-tion such as DNSSEC records.

By combining reflection and amplification attackerscan generate attack traffic volumes which are signifi-cantly higher than their uplink bandwidth [2], [4], [8],[25]. Furthermore, not only single hosts may be affectedby such attacks. Entire networks may struggle to copewith the extra bandwidth and processing demands [25].

arX

iv:1

505.

0789

2v3

[cs

.NI]

17

May

201

6

Page 2: Amplification and DRDoS Attack Defense - arXiv · Amplification and DRDoS Attack Defense – A Survey and New Perspectives Fabrice J. Ryba, Matthew Orlinski, Matthias W¨ahlisch

Section 1: Introduction

Section 2: Reflection and Amplification Attacks

Previous Attacks Attack Models

Section 3: Preventing Amplification Attacks

Alternative Architectures Lowering Amplification Factors Reducing Number of Amplifiers

Response Rate Limiting UDP Sessions Filtering Spoofed Packets

Section 4: Source IP Address Spoofing

Monitoring Spoofing In The Wild

Active Monitoring Passive Monitoring

Detecting and Filtering Spoofed Packets

Flow Correlation

Validating Source Address

End-to-end

Encryption

Third-party Authentication

Using Network Knowledge

IP Headers, e.g., TTL

Ingress and Egress Filtering

Learning Flow Directions

Routing Tables

Tracing Spoofing Attacks

Traffic Logs Packet Marking ICMP Traceback Link Testing

Section 5: Detecting Amplification Attacks and Filtering Attack Traffic

Locations for Detecting and Filtering Attack Traffic

Victim-end Source-end Reflectors/Amplifiers Distributed

Predicting Future Attacks

Game Therory Scan Detection

Section 6: Conclusions, ongoing projects, and future work

Fig. 1. Categorisation of the amplification DDoS literature.

Defending against this form of amplification attackis challenging for network operators. Firstly, the attacktraffic blends in benign communication and may behard to distinguish from legitimate traffic. Secondly,the attack packets received by victims are reflected bymany distributed benign third-parties such as open DNSresolvers, effectively hiding the attacker’s identity [26].

In this survey paper, we systematically structure ex-isting research on amplification attacks to assist futureresearch in this direction. To the best of our knowledge,we are the first to categorize an research area that spansalmost 200 publications and has become an importantproblem both in academia and practice. To this end, wefirst compare various definitions and types of amplifica-tion attacks. With this foundation, we then systematizepreventive countermeasures, and particularly look at theproblem of (identifying and mitigating) IP spoofing. Wecomplete our survey with works that proposed reactivecountermeasures to defend against ongoing amplificationattacks. Our main contribution is thus a comprehensivesurvey of existing literature that until now was scattered.

The rest of this paper is organised as shown inFigure 1. In Section II, we present prominent incidents

from the past and discuss amplification attacks in greatdetail. We then describe methods to prevent amplificationattacks in Section III. Then special attention is paid topreventing reflection and IP spoofing in Section IV. Wefinish the discussion about the solution space in Sec-tion V by presenting approaches to detect and filter am-plification attacks. Finally, we conclude in Section VI.

II. AMPLIFICATION ATTACKS

This section provides a detailed introduction into thedifferent techniques for amplifying attack traffic. We startby giving a brief taxonomy and timeline of differenttypes of amplificaiton attacks, and then we end thesection by describing the techniques used in more detail.

A. Taxonomy and Historical Background

There are many ways of amplifying the volume ofattack traffic in DoS attacks. In this paper we givespecial focus to amplification attacks which use UDPbased amplifying protocols and reflection. However, it isimportant to be able to distinguist between the differenttypes of amplificaiton attacks.

1) DNS Servers as Amplifiers: In 1999,AusCERT [27] warned about amplification attackswhere attackers trick DNS servers into sending largeamounts of data to spoofed IP addresses [24]. In 2000,the CIAC warned of Distributed Denial of Service(DDoS) attacks where attackers can send spoofed IPpackets from many different locations [28].

Today, DNS is widely used in amplification attacksbecause a 60 byte request from an attacker can easilygenerate a 512 byte response [2], [8], [14]. Furthermore,DNS servers which support Extension mechanisms forDNS (EDNS) [29] can generate responses which arenearly 100 times larger than requests [13]. Some at-tackers even ensure large responses by creating domainsspecifically to use in amplification attacks [23].

Any public DNS server which is configured to respondto requests for hosts outside of their domain can be usedin amplification attacks. DNS servers that are configuredto respond to all such requests are known as open DNSresolvers. According to the Open DNS Resolver Projectapproximately 25 million open DNS resolvers currently“pose a significant threat” to the Internet [26]. It is alsonot difficult to find enough open DNS resolvers to usein amplification attacks. Rossow showed that it currentlyonly takes 90 seconds to acquire a list of 100,000 openDNS resolvers [13].

2

Page 3: Amplification and DRDoS Attack Defense - arXiv · Amplification and DRDoS Attack Defense – A Survey and New Perspectives Fabrice J. Ryba, Matthew Orlinski, Matthias W¨ahlisch

Est

imat

edatt

ack

traffi

c(G

bp

s)

167

300

100

400

54

1998 2001 2004 2007 2013 Feb Mar Apr May Jun Jul Aug Sep Oct Nov Dec 2014 Feb Mar Oct

Aus

CE

RT

war

nsab

out

DN

S

base

dam

plifi

cation

atta

cks

DN

Sis

regu

larly

used

in

ampl

ifica

tion

atta

cks

Vau

ghn

and

Evr

onpr

esen

tD

NS

Am

plifi

cation

Att

acks

atD

EFC

ON

14

SNM

Pat

tack

atM

ITan

d

Pro

lexi

cre

port

sa

167G

bps

DN

Sat

tack

100G

bps

DN

Sat

tack

agai

nst

Gre

enN

et

300G

bps

DN

Sat

tack

agai

nst

Spam

Hau

s

DE

RP

clai

ms

resp

onsibi

lity

for

man

y

atta

cks

agai

nst

the

gam

ing

indu

stry

Clo

udFla

rere

port

sa

400G

bps

NT

Pat

tack

Aka

mai

repo

rts

a54

Gbp

s

SSD

Pat

tack

Fig. 2. Timeline of amplification attacks and related events.

2) Other UDP Based Services: The DNS basedamplification attacks just described use source IP ad-dress spoofing to trick third-parties into attacking avictim [24].

Source IP address spoofing also makes it very difficultfor the victim to track attacker because all attack trafficthey receive will come from third-parties. UDP is alsoused by attackers as the transport layer protocol becauseit is stateless and has no built in mechanism to verifyingthe source IP address of packets.

Recently, another UDP based protocol (SSDP) hasbeen used with source IP address spoofing in amplifi-cation attacks. The United States Computer EmergencyReadiness Team (US-CERT) first issued a warning aboutSSDP in January 2014 [30], and in October 2014 it wasused to generate 54Gbps of traffic in a single attack [31].

Other well documented DoS attacks that used UDPand source IP address spoofing are the MIT SNMPbased attack [32], and the CloudFlare attack whichreached a peak of nearly 400Gbps using 4,529 NTPservers [25]. The huge volume of traffic generated inthe CloudFlare attack was caused by a command in NTPcalled “monlist”, which returns a list of the previous 600IP addresses to access the server. Monlist does not affectthe core functionality of NTP and should be disabled byupgrading to version 4.2.7 and above [33].

3) Smurf and Fraggle Attacks: As well as misusingUDP based services, there are many other ways ofamplifying attack traffic volume. For example, priorto 1998 attackers were sending ICMP requests to thebroadcast address of networks whilst spoofing the sourceIP address of victims. The routers receiving the ICMPrequests broadcast the requests to all of the hosts on theirnetwork. These attacks are known as Smurf attacks [35],[36], and in Smurf attacks the routers which broadcastthe requests act as amplifiers because they increase thevolume of attack traffic.

End hosts which respond to requests after they are

broadcast may be amplifiers as well. For example, inFraggle attacks an attacker may send CharGen requeststo the broadcast address of many networks at the sametime [37]. End hosts which receive CharGen requestsmay respond with much more data than they receive,thus the end hosts in Fraggle attacks are amplifiers aswell as the routers which broadcast the request.

4) Fork Loops: There is also another category ofamplification attacks which we have not yet covered.In 2009 Shankesi et al. [38] described an amplificationattack as being where ”the number of messages on thenetwork can amplify to essentially an arbitrary largenumber” [16]. It is important to note however that thisdefinition doesn’t take into account the size differencebetween request and response packets, which is animportant factor in the UDP based amplification attackswe have already mentioned.

The amplification attacks described by Shankesi etal. are caused by “fork loops” which are used to at-tack VoIP networks running SIP [38]. Fork loops aresituations where requests are sent between SIP proxiesindefinitely and at least one extra request is generatedevery iteration [16]. Using this type of amplificationattack it is possible to cause 2 SIP proxies to exchangeup to 270 duplicate requests consuming their resourcesand preventing them from responding to legitimate re-quests [38].

B. Responding to a Growing Threat

Today, Smurf, Fraggle, and Fork Loop attacks havelargely been countered by better network configurationand patches to SIP respectively. However, attacks involv-ing reflection and UDP based amplification are growingin number.

Akamai detected 9 DoS attacks involving NTP, Char-Gen, and SSDP which peaked over 100 Gbps in the last3 months of 2014. This is three times more than in thesame period in 2013 [34].

3

Page 4: Amplification and DRDoS Attack Defense - arXiv · Amplification and DRDoS Attack Defense – A Survey and New Perspectives Fabrice J. Ryba, Matthew Orlinski, Matthias W¨ahlisch

TABLE IRECENT LARGE SCALE AMPLIFICATION ATTACKS AND THEIR PROPERTIES

Reference Year Amplification Protocol Peak Traffic Attacker Description

MIT [32] 2013 SNMP Unknown Unknown

Spoofed requests were directed toSNMP enabled devices on the MIT net-work which attacked devices outsidethe network.

GreenNet [2] 2013 DNS 100 Gbps Unknown

Attackers brought down GreenNet, ahosting company who’s customers in-cluding Privacy International and Zim-babwe Human Rights Forum.

Prolexic [4] 2013 DNS 167Gbps Unknown The attack targeted a real-time financialexchange platform.

Spamhaus [8] 2013 DNS 300Gbps Cyberbunk

Over 30,000 DNS servers were in-volved in the amplification attack. At-tackers also used SYN floods and pre-fix hijacking to disrupt the Internetconnectivity of Spamhaus and ProjectHoneypot.

PhantomL0rd [7] 2013 NTP 100GbpsA hacker group namedDERP claimed respon-sibility on Twitter.

Attackers targeted game servers andstreaming sites. Attacks against thegames industry are becoming increas-ingly popular [34].

CloudFlare [25] 2014 NTP 400Gbps Unknown

Latency increased all over Europe fol-lowing attack using 4,529 NTP servers.French hosting firm OVH also claimedto have seen an attack over 350Gbps atthe same time.

Akamai [31] 2014 SSDP 54Gbps Unknown Many of the devices used in this attackwere home-based UPnP devices.

Figure 2 and Table I illustrate that the bandwidth usedin amplification attacks is also growing. In March 2013an amplification attack was launched against Spamhaus[8]. The DNS based attack reached an estimated peakof about 300Gbps and was the biggest DoS attack everrecorded [39]. Nearly a year later and an even biggerattack reportedly reached a peak of 400Gbps by usingNTP [25].

The attack traffic generated during the Spamhausattack came from over 30,000 different DNS servers.In order to guard against this and future attacks, theydeployed anycast routing and a distributed ContentDelivery Network (CDN) [8]. Anycast involves BGProuters simultaneously advertising the same destinationIP address so that attack traffic can be absorbed bymany different data centers. However, relying on anycastand CDNs may be a short term solution, and it canonly prevent amplification attacks when amplifiers andanycast routes are evenly distributed around the Internet.

The CloudFlare attack came 1 month after a “monlist”

warning issued by US-CERT [33], and during a 13-week period in which Kuhrer et al. reported a 92% dropin the number of vulnerable NTP servers [19]. As aconsequence we may need to reevaluate how we respondto threats as they are discovered. For example, alertingsystem administrators about protocol vulnerabilities mayprompt attackers to abuse the identified amplificationvectors.

C. Problem Description

In this section we will provide high level descriptionsof the attacks and concepts seen so far. We will start bydiscussing the amplification factor of different attacksand go on to describe the building blocks of the mostcommon amplification attacks.

1) Amplification Factor: The amplification factor ofan attack (X(P )) for a protocol (P ) is the ratio of thetotal number of bytes in the amplified traffic (explicitlyincluding headers, padding and payloads of all protocolsinvolved, such as Ethernet, IP, UDP or the application-

4

Page 5: Amplification and DRDoS Attack Defense - arXiv · Amplification and DRDoS Attack Defense – A Survey and New Perspectives Fabrice J. Ryba, Matthew Orlinski, Matthias W¨ahlisch

level protocol) and the number of bytes sent by theattacker (same calculation), as shown in Equation 1.

X(P ) =number of response bytes(P )

number of request bytes(P )(1)

Our definition is slightly different from the one usedin [13], as we explicitly include all lower-level proto-cols, whereas Rossow focused on the number of UDPpayload bytes. Still, the amplification factors providedby Rossow [13] offer a convenient way of comparingprotocols and can help with prioritization. For example,Rossow found that NTP had the highest amplificationfactor all of the protocols he tested. He found that ifattacks carefully select the NTP servers to maximizetheir attack they can achieve an amplification factorof 4670, which when compared to 64 for open DNSresolvers shows us how urgent it is to update existingNTP infrastructure.

2) Reflection: Many of the amplification attacks inthe past were possible because the attacker can spoofthe address of the victim causing traffic to be “reflected”by third-party servers, e.g., by open DNS resolvers [40](see Section II-A). Figure 3 shows a reflection attackwhere an attacker (M ) changes the source address inthe request it sends to the reflector (R). Not knowingthat the source address was spoofed, the reflector sendsits response to the final destination (D, i.e., the victim).

The key advantages of reflection attacks for the at-tacker are: (a) attackers hide their identity from D be-cause all traffic received by D comes from third-parties;(b) attackers can trigger attacks coming from differentgeographic or topological regions of the Internet; and(c) attackers do not receive responses and therefore donot risk using up their available download bandwidth.

R

M D

Request Response

Fig. 3. Reflection attack. An attacker (M ) sends a spoofed requestto a reflector (R) which responds to the final destination (D).

One example of a DoS attack which uses reflection is aTCP SYN/ACK attack, where an attacker sends spoofed

SYN requests to a reflector so that the reflector sendsSYN/ACK packets to the victim [41].

As well as the final destination as indicated by thespoofed source IP address, it is also possible for reflec-tors and those that use them legitimately to be victimsof reflection attacks. For example, in SYN floodingattacks [42]–[47], the attacker floods a reflector withspoofed SYN requests and changes the source IP addressof packets so they do not receive replies. The aim ofSYN flooding attacks is not to attack the final destinationindicated by the spoofed IP address, but to consumeenough resources at the reflector to make it unresponsiveto legitimate traffic. The adversary can also attack multi-homed networks using reflectors. For example, if thereflector is connected to the Internet by at least twouplinks, and the link between the reflector and thefinal destination offers significantly lower bandwidthcompared to the link between the attacker and reflector.Then by carefully selecting a spoofed source addresswhich is reachable via the low bandwidth connection,the attacker can implement a DoS attack on this link.

It is worth mentioning again, however, that not allof the amplification attacks described in this paper usereflection, e.g., fork loop based attacks do not [16].

3) Amplification: A key factor in amplification at-tacks is the ability of attackers to trigger responses whichare significantly larger than the requests, either in termsof bytes or number of packets. Figure 4 describes thebasic scenario without reflection where an attacker sendsa request to an amplifier (A) which responds with ahigher volume of data than it receives. In this scenariothe amplifier, or the network between the attacker andthe amplifier, are the victim because they cannot copewith the amplified traffic. The main advantage of suchan attack is twofold. First, the adversary saves resourceswith respect to its network uplink. This is important incase of mobile scenarios. Second, discovering the triggerof the attack is more challenging. In contrast to highvolume flooding attacks, amplification triggers are hardlyvisible on frequently used uplinks, which complicatesearly detection.

It is worth noting that the attacker model implies thatthe attacker is either capable to handle potential responsetraffic or that the attacker will not receive the responsedata. The latter follows directly in case of a successfulattack but can also be achieved by address renewals atthe attacker side.

Pure amplification attacks will be of increased impor-tance with the upcoming deployment of the Internet ofThings (IoT). IoT networks are characterized by con-

5

Page 6: Amplification and DRDoS Attack Defense - arXiv · Amplification and DRDoS Attack Defense – A Survey and New Perspectives Fabrice J. Ryba, Matthew Orlinski, Matthias W¨ahlisch

strained devices with limited network capacity, typicallyconnected via border routers to the Internet. Congestingthe path from some of the IoT devices to the gatewaymay lead to disconnecting the complete IoT domain.

M A

Request

Response

Fig. 4. Simple amplification attack. An attacker (M ) sends a requestto an amplifier (A) which responds with more data than it received.The response line is dashed in this instance to indicate that theattacker may not receive the response.

4) Reflection and Amplification Together: All of theamplification attacks seen in Table I combine reflectionand amplification, a high level overview of these attacksis given in Figure 5. In this model an attacker (M )sends requests using the amplification protocol (P ) tothe amplifiers (A) but also uses reflection so that theamplifiers respond to the victim (V ).

A1M

A2

A3

V

Request

Request

Request

Response

Response

Response

1) Attacker sendssmall requests toamplifiers usingthe source IPaddress of V.

2) Amplifiers sendlarge and/or manyresponses to Vsaturating itsbandwidth.

Fig. 5. An attacker (M ) sends spoofed requests to many amplifiers(A) causing amplified responses to be sent to the victim (V ).

The volume of attack traffic which can be sent to V de-pends on the accumulated available bandwidth betweenM and A1...An, the accumulated available bandwidthbetween A1...An and V , and the amplification factor ofP . Depending on the success of the attack, the volumeof traffic sent to the victim can result in a complete lossof connectivity for the victim and their network.

5) Amplification Attacks Using a Botnet: Most am-plification attacks are launched from single origins [48]and just appear to be distributed due to the large setof amplifiers. However, a single attacker may not have

sufficient uplink bandwidth to send requests to manyamplifiers at the same time. Attackers can target moreamplifiers, and further obscure the origin of attacks, bymeans of a botnet [17], [49].

The owners of bot-infected systems are unaware thattheir machines are being used in DDoS attacks. Alter-natively, in crowd-sourced DDoS botnets, participantswillingly install attacking software on their machines,e.g., the Low Orbit Ion Cannon (LOIC) software [50].Such volunteer botnets were used in Operation Paybackto attack global companies, such as MasterCard, Visa,and PayPal [5].

Figure 6 shows one model of an amplification attackusing a botnet. In this example the attacker uses acontroller (C) to send instructions to the botnet (B). Thebots then send spoofed requests to amplifiers at similartimes, such that the bandwidth of B1...Bn accumulates.

Botnet B

Requests Responses

CommandA1

A2

A3

B2

B1

B3

C V

Fig. 6. An attacker uses a controller (C) to instruct a botnet (B) tosimultaneously send spoofed requests to many amplifiers (A), causingamplified responses to be sent to the victim (V ).

6) Fraggle and Smurf Attacks: Fraggle and Smurfalso use reflection and amplification, but their attackslook slightly different from the model in Figures 5 and 6.Figure 7 shows a Smurf attack where M sends a requestto the broadcast address of network (N ), A acts as theamplifier by duplicating the request, and the reflectors(R) send responses to the victim V . Fraggle attacks aresimilar to Smurf attacks but the requests are amplifiedeven further by the end hosts that receive them.

7) Fork Loops: Fork loops are different to the reflec-tion and amplification attacks because they rely on mes-sages recursively being sent between SIP proxies [16].Yet fork loops have also been referred to as amplificationattacks because they provide a way for an attacker toamplify the number of requests they send to SIP proxies.

6

Page 7: Amplification and DRDoS Attack Defense - arXiv · Amplification and DRDoS Attack Defense – A Survey and New Perspectives Fabrice J. Ryba, Matthew Orlinski, Matthias W¨ahlisch

Network N

M A R2

R1

R3

VRequest Request

Request

Request

Response

Response

Response

1) M sends a singlerequest to the broadcastaddress of network N.

2) A acts an emplifierby broadcasting therequest to R1, R2, and R3.

3) The reflectorssend responses tothe victim.

Fig. 7. Smurf attack. An attacker (M ) sends a spoofed request tothe broadcast address of network (N ). The amplifier (A) broadcaststhe request to many reflectors (R) which respond to the victim (V ).

Figure 8 shows one example of what can happen whentwo SIP proxies (L1 and L2) are not configured correctlyand do not detect loops. It depicts the scenario describedin [38] where a request for the user a@L1 is sent tothe proxy L1. In this example, L1 has two options forreaching a@L1 which are both located at L2. This causesL1 to fork the request and send two copies to a@L2 andb@L2 which also both fork the request to a@L1 andb@L1. The scenario is caused by misconfiguration andcan potentially result in 2n duplicate requests createdwhere n is the number of iterations.

a@L1

a@L2

a@L1

a@L2

......

b@L2

......

b@L1

a@L2

......

b@L2

......

b@L2

a@L1

a@L2

......

b@L2

......

b@L1

a@L2

......

b@L2

......

Fig. 8. Fork Loops. In this example taken from [38] a single requestspawns 2n duplicates where n is the number of iterations.

D. Discussion

In this section we have described many different typesof amplification attacks. It is clear from our descriptionsthat the attacks seen in Table I are very different fromFraggle and Fork Loop attacks.

Therefore, this survey will focus on the types ofamplification attacks seen in Table I and as described inFigures 5 and 6. The major advantages of amplificationattacks from an adversarial point of view are:

• Attack traffic can be amplified beyond the attacker’supload bandwidth.

• The attacker remains anonymous by using reflection(IP address spoofing).

• The attack traffic at reflectors and amplifiers can bevery difficult to distinguish from legitimate traffic.

• The attack complexity is rather low and it is thusrelatively straightforward to get started with ampli-fication attacks even for the wide audience.

III. PREVENTING AMPLIFICATION ATTACK

In this section, we will describe preventative measuresfor the amplification attacks. For example, we discusspreventative measures which amplifiers can use beforeresponding to requests (e.g. response rate limiting), andmore radical approaches such as alternative contentdelivery systems [51]. We will discuss non-preventive(i.e., reactive) countermeasures, such as detection andfiltering, in Section V.

A. Alternative Internet Architectures

Alternative Internet architectures such as CapabilityBased Architectures (CBA) [52], [53] or Content-CentricNetworking (CCN) [51] may remove existing DoS vec-tors. For example, in CBA, senders must first obtain“permission to send” from the destination before sendingpackets. Anderson et al. [52] proposed that verificationpoints around the network ensure that the source haspermission to send data to the destination. To obtainpermission, Anderson et al. suggested that the sourceuses Request-To-Send (RTS) packets, which are routedbetween RTS servers to ensure the victim is not flooded.

However, the problem with the CBA system fromAnderson et al. [52], and the more recent TVA [53],is that every packet must include some kind of extra“capability” information. Maintaining, exchanging, andchecking capabilities creates a lot of extra overheadfor networks, and the increased packet size may alsoincrease fragmentation.

7

Page 8: Amplification and DRDoS Attack Defense - arXiv · Amplification and DRDoS Attack Defense – A Survey and New Perspectives Fabrice J. Ryba, Matthew Orlinski, Matthias W¨ahlisch

CCN will remove the possibility of DNS based am-plification attacks simply because DNS is no longer re-quired. In CCN, ISPs can deploy content routers to cachedata which many users request. However, CCN uses therequest/response paradigm in the form of “Interest” and“Data” packets, and it is currently unknown how resilientCCN would be to amplification attacks or new forms ofDoS attacks.

B. Lowering Amplification Factors

Alternative, to remain compatible with the currentInternet design, is fixing the protocols that are vulnerableto amplification. One such approach is to lower theamplification factors, e.g., by increasing the size of therequests in vulnerable protocols. This would reduce theamplification factor, but also increase the traffic acrossthe Internet, which is not desirable. Moreover, it isnot reasonable to suggest that all protocols should beamplification free. For example, it is quite reasonable toexpect that request packets for large files are smaller orfewer than the response.

A more practical approach for lowering the amplifica-tion factors may be to disable the redundant services thatamplifiers offer. For example, Rossow showed that theNetwork Time Protocol (NTP) has the highest amplifi-cation factor out of the 14 UDP protocols he tested [13].Kuhrer et al. achieved a reduction of the amplificationfactor of NTP by disabling the NTP services with thehighest request/response factors [19]. Since the serviceswith the highest request/response factors do not affectthe core capabilities of NTP, these extra services can bedisabled while still enabling time synchronization.

Next to NTP, many other protocols (e.g. DNS, Char-Gen, SNMP) can be used for amplification attacks.Some DNS providers have recently started deprecatingthe DNS ANY request in response to the growingthreat of amplification attacks. One provider, CloudFlare,now responds with the RCODE 4 “Not Implemented”1.However, identifying and disabling services with highrequest/response factors takes time, and may result inthe loss of functionality for benign applications.

One technique to reveal protocols which suffer fromamplification attacks due to misconfiguration or baddesign can be model checking [16]. By modeling theprotocol using rewriting logic [54], a set of systemstates can be generated and checked for amplificationby comparing the cost of servicing requests against a

1https://blog.cloudflare.com/deprecating-dns-any-meta-query-type/

predefined threshold2. This approach can be used todetect flaws in protocols where the amplification factorat a single point might not seem significantly high, andit has been used to describe forking loops in SIP [16].

C. Reducing the Number of Amplifiers

Many amplifiers were used in the larger amplificationattacks. For example, over 30,000 separate open DNSresolvers were used in the Spamhaus attack (See Table I).A number of projects listed in Section VI are attemptingto bring misconfigured amplifiers to the attention ofsystem administrators so that they can be patched orconfigured correctly. However, this relies on widespreadcooperation between administrators who may not havethe knowledge or the resources to update their servers.

Another interesting point to make here is does theInternet need so many public services such as DNSservers? Perhaps more cooperation between networkproviders can lower the impact of amplification attacksby lowering the number of amplifiers required to operatethe Internet.

D. Response Rate Limiting

Moreover, amplifiers could also be configured to re-spond to a limited number of request from each IP ornetwork address within a given time frame. For example,support for response rate limiting is easily applied toDNS when using newer versions of BIND. However,rate response rate limiting protects against abuse of asingle amplifier and an attacker may simply choose touse multiple amplifiers at a low request rate. It onlytakes an attacker a short amount of time to look fora sufficient number of different amplifiers (less than aminute in some case [13]).

E. Sessions for UDP

Many amplification attacks rely on stateless commu-nication via the UDP protocol in order to send largeamounts of data to spoofed IP addresses. Those amplifi-cation attacks are made more difficult if UDP-based pro-tocols required sessions to be opened (similar to the TCPthree-way handshake) before large amounts of responsedata can be transmitted. To counter this, one can includesession information in UDP packets. For example, clientsusing the Steam query protocol have to request a 4-byte challenge before they can request large amountsof information about a game server [55]. The clienthas to append the challenge response to future requests.

2The cost in [16] is the number of duplicate packets generated bySIP proxies

8

Page 9: Amplification and DRDoS Attack Defense - arXiv · Amplification and DRDoS Attack Defense – A Survey and New Perspectives Fabrice J. Ryba, Matthew Orlinski, Matthias W¨ahlisch

However, attackers may be able to use responses fromsession initialisation exchanges for amplification attacksso long as they can open new sessions for the samevictim with many amplifiers, and can also eavesdrop onthe victims Internet traffic to see responses.

A downside to session hardening UDP protocols isthat it increases the packet sizes (and, depending onthe implementation, requires additional packets for ahandshake), which conflicts in particular in resource-constraint and real-time contexts. It may also add latencyto the initial request to open a sessions. The mostchallenging aspect of session hardening existing UDP-based services is compatibility with existing clients. Inorder to prevent amplification attacks session supportwould have to be universal, and upgrading may causeproblems with legacy systems.

F. Differentiating Bots From Humans

Also Completely Automated Public Turing tests to tellComputers and Humans Apart (CAPTCHAs) [56] wouldprevent attackers from using certain services in DoSattacks. While successful to defend against application-level DoS attacks, CAPTCHAs are not successfullyused in practice against amplification attacks, and wename them for completeness only. Consider, for example,DNS, where lookups are often caused by a user visiting awebsite. If such DNS requests required that a user com-pletes a CAPTCHA, then it would be harder for attackersto use open DNS resolvers for attacks. However, thismay delay a users access to information and complicatelegitimate automated services which use DNS. With thisin mind, Oikonomou [57] attempted to model humanbehavior so that servers can automatically distinguishbetween requests from bots and requests from humans.

There is another problem with only replying to re-quests from humans, and that is that many legitimateautomated processes need to make requests for infor-mation over the Internet. These processes are preventedfrom accessing services secured by a CAPTCHA or otherbot detection mechanisms.

G. Filtering Spoofed Packets

In most amplification attacks the attacker sends re-quests with the spoofed IP address of the victim. Fil-tering spoofed packets is considered one of the mosteffective countermeasures against amplification and otherDoS attacks [19], [58]–[60]. However, in 2005 the MITANA Spoofer Project showed that around 25% of ASesallowed spoofed IP packets to be sent out of their net-work, and the ability of attackers to launch amplification

attacks shows that it is still a problem today. Recentestimates state that it is still possible to send spoofed IPpackets from about 20% of the Internet [58]. The nextsection will discuss spoofing in more detail and discusssome of the methods proposed to defend against it.

IV. SOURCE IP ADDRESS SPOOFING

An inherent requirement for amplification attacks inpractice is IP address spoofing. UDP and IP have nobuilt-in mechanism to determine if the source address isspoofed, so amplifiers reply to the spoofed address in-stead of the original sender. Using spoofing for maliciouspurposes was first discussed in 1989 [24], and a detailedanalyses of the problem was carried out by Heberlein andBishop in 1996 [61], and again by Dunigan in 2001 [62].Since then there have been many other surveys related tospoofing which we have summarized in Table II. Thesesurveys can be broadly categorized as either focusing onspoofed packet detection/filtering [63], [64], or tracingthe attacker [65]–[68].

Chen and Yeung [43] also define three common IPspoofing techniques which all have different purposes,random spoofing, subnet spoofing, and fixed spoofing. Inrandom spoofing, the attacker randomly generates sourceaddresses for the attacking packets. This technique isoften used in TCP SYN flood attacks [22] where thedestination of replies are not relevant to the success ofthe attack but the attacker still wants to obscure theiridentity. In subnet spoofing the attacker will choose asource address in its own subnet, which can help toavoid some countermeasures such as ingress filtering, butlimits the number of possible victims. Fixed spoofing isthe form of spoofing which is most commonly used inamplification attacks. This is where the attacker choosesthe IP address of a single victim to be the source addresson the spoofed packets, meaning that replies will be sentto the victim and not the attacker(s).

We will start this section by discussing the techniquesused to monitor spoofing and to map networks which donot guard against it. Later we will (a) survey the contri-butions listed in Table II in a single concise discussion,and (b) significantly extending the discussion to includenew approaches. This will involve categorizing spoofingdefenses as being for either packet filtering or traceback,as shown in Figure 9.

A. Monitoring Spoofing In The Wild

There are two techniques which are being used to lookat spoofing on the Internet. Active monitoring attemptsto send spoofed packets and monitor the replies, while

9

Page 10: Amplification and DRDoS Attack Defense - arXiv · Amplification and DRDoS Attack Defense – A Survey and New Perspectives Fabrice J. Ryba, Matthew Orlinski, Matthias W¨ahlisch

TABLE IISURVEY PAPERS FOR FILTERING SPOOFED IP PACKETS AND

DETECTING ATTACKERS.

Survey Name Papers Covered

Detecting Spoofed Packets [69] [70]–[72]

IP Spoofing Defense: An Intro-duction [63]

[73]–[88]

On the State of IP Spoofing De-fense [64]

[69], [73], [75], [76], [81],[82], [85], [86], [89]–[106]

DDoS: Survey of TracebackMethods [66]

[71], [76], [90], [107]–[117]

A Survey of IP TracebackMechanisms to OvercomeDenial-of-service Attacks [67]

[110], [113], [118]–[121]

A Survey on Packet Markingand Logging [68]

[90], [110], [111], [113],[115], [118], [120]–[128]

On IP Traceback [65] [42], [70], [104], [107]–[111], [113], [129], [130]

SpoofingDefenses

Traceback

Link Testing

Tunnelingusing IPSec

ControlledFlooding

InputDebugging

ICMPTraceback

Packet Marking

UsingTraffic Logs

Detectingand Filtering

Spoofed Packets

Using NetworkTopology

LearningDirections

Ingress Filteringand RPF

IP Headers

Routing Tables

FlowCorrelation

ValidatingSource

Addresses

Third-Parties

EncryptingIP Packets

Peer-to-Peer

Fig. 9. A categorization of source IP address spoofing defenses.

passive monitoring requires analyses of Internet traffic,e.g, NetFlow data. In the following two subsections weexamples of both approaches.

1) Active Monitoring: The MIT Spoofer Project [58]measures how susceptible the Internet is to IP spoof-ing. To achieve a high coverage they have created anddistributed an application which volunteers can install.The application sends several spoofed UDP packets toa server controlled by the project. The application thenconnects to the server using legitimate means to deter-mine which packets were received or lost. The resultsof the MIT Spoofer Project have shown that about 25%of ASs are currently vulnerable to IP spoofing. Dailystatistics are also available on their website [131].

Kuhrer et al. [19] leverage the fact that some DNSproxies do not correctly change the IP addresses whenforwarding DNS packets to test if their AS allows IPspoofing. They found 2,063 ASes that allow spoofedtraffic by detecting if DNS replies have a different sourceIP addresses than the destination of the initial request.

The disadvantage of their approach is that it relies onnetworks which have open DNS resolvers that do notchange the source IP address on responses. However,their approach does not depend on the distribution ofvolunteers like the Spoofer Project, and the researcherswere largely free to choose which networks to investigatedue to the many available open DNS resolvers.

2) Passive Monitoring: An orthogonal question tosee who is spoofing, is to measure how much Internettraffic is actually being spoofed. The UCSD NetworkTelescope from CAIDA [59] is attempting to answerthis question by monitoring traffic which is sent todarknets. A darknet is an address-space which is routablebut where no traffic is expected to be sent, i.e., theaddresses are not allocated. Monitoring traffic to darknetscan be used to spot attacks, scans of the Internet, andmisconfiguration of machines.

To explain how a darknet can be used to detect spoofedpackets we will briefly describe the steps of a TCP-SYN flooding attack [22]. When an attacker is usingspoofing for a TCP-SYN flooding attack and randomlychooses a source address for the spoofed packets, thereis a chance that the address is in the address spaceof the darknet. As a consequence, the victim of theattack will response to the spoofed addresses, and theSYN/ACK packets from the victim will appear as trafficto the darknet. These SYN/ACK packets are known asbackscatter, and since the darknets are supposed to causeno traffic, backscatter is assumed to be the result ofspoofing once misconfiguration has been ruled out.

10

Page 11: Amplification and DRDoS Attack Defense - arXiv · Amplification and DRDoS Attack Defense – A Survey and New Perspectives Fabrice J. Ryba, Matthew Orlinski, Matthias W¨ahlisch

B. Validating the Source IP Address

There is no built in mechanism in the Internet Protocolwhich can prevent spoofing. Its function is simply toprovide best effort delivery of datagrams [132]. Never-theless, over the next two subsections we will discussvarious techniques which can be used to filter spoofedpackets. In this section we will concentrate on methodswhich use some form of authentication to validate pack-ets as they arrive and filter those which are not validated.In the next section we will look at more probabilisticmethods.

1) End-to-End Address Verification: There are manyend-to-end methods with which peers can attempt tovalidate the source IP address of packets. For example,probes can be used to provoke responses from the sourceaddress to see if it sent the packet [46]. However,packet loss means that some probes may be lost, andother unpredictable behaviour in the Internet means thatprobing cannot guarantee that the packet was spoofed.

Additional information embedded in packets andwhich can be validated using a peer-to-peer network hasbeen used to authenticate the source IP address [75],[84], [97], [103], [133], [134]. This information can beunique between two peers, and may also have a timelimit associated with it. The literature also uses differentterminology to refer this data. Common notations are“cookie” [97], [98], [135] or “key” if the data is used incryptographic functions [75], [103], [136].

Whilst the basic principle of using end-to-end methodsto validate the source IP address is the same, all of theproposals have their own strengths and weaknesses. Forexample, large “puzzles” sent by servers may themselvesbe used in amplification attacks [98], and there are ad-ditional processing and space overheads associated withgenerating and stamping “passports” that are appended topackets [103]. Some of these overheads can be lowered,for example, if only routers at the edge of networksadd data to, and validate, packets. However, this impliescooperation between network operators to install newfunctionality at the edges of their networks when thebenefits to them may not outweigh the extra costs.

Lu et al. [133] proposed Multi-purpose Anti-SpoofingKey (MASK) where packets are tagged with MASK la-bels which are unique between the source and destinationrouters. At first, MASK labels are exchanged using aTCP connection. Then, MASK labels can be includedin subsequent packets by overwriting the ID field in theIP header. However, MASK needs to be evaluated inmore realistic scenarios. Overwriting the ID field means

that datagrams can not be fragmented. It is also notclear how big MASK labels are, and if they will fit inthe 16-bit ID field. Furthermore, MASK appears to besusceptible to eavesdropping attacks as MASK labels arenot exchanged securely and are also sent in plain text insubsequent packets.

Another example is the Source Address ValidationArchitecture with Host Identity Protocol (SAVAH) [136],which can filter spoofed packets at the edge of local net-works. It requires that all end-hosts and gateway routerssupport the Host Identity Protocol (HIP) [137], [138].SAVAH filters spoofed packets by requiring sendersreplace the source IP address of packets with a hash.The hash is created using the contents of each packetand a key agreed previously when the sender joined thenetwork. This is cryptographically stronger than [133]so long as the key was exchange securely. However, thisapproach degrades performance of the network rapidlydue to the processing overheads of hashing every packet.

2) Encryption: An overall more secure approach thanappending validation data to packets is to encrypt all IPpackets. Using encryption between peers would not onlyprevent most spoofing attacks, but it also has the addedbenefit of all Internet traffic being secure by default [94].One suitable mechanism by Gilad and Herzberg providesrelatively lightweight encrypted communication [47].

However, the computational overheads and extra traf-fic caused by encrypting all IP traffic is currently im-practical, and would also conflict with IoT scenariosusing constrained devices. Nevertheless, encryption canbe used in select cases such as communication withamplifiers.

3) Third-party Authentication: Sometimes it is notdesirable for routers and end-points to use end-to-endaddress verification, or negotiate keys and encrypt pack-ets because of the additional processing and latencyoverheads. Using extra third-parties which are usuallynot involved in packet forwarding offers a way ofauthenticating packets which can potentially lower theextra processing demands placed on routers and end-points [45], [139]–[141].

For example, Gonzalez et al. [140] proposed thatrouters should send copies of packets to a “judge”(the trusted third-party). The judge should know the IPaddresses serviced by the routers in order to make adecision whether or not the packet is spoofed, and thejudge can also query routers in the absence of data.

Noureldien et al. [45], [141] suggested that authenti-cation servers in local networks can be used to determineif TCP-SYN packets are spoofed. They propose that

11

Page 12: Amplification and DRDoS Attack Defense - arXiv · Amplification and DRDoS Attack Defense – A Survey and New Perspectives Fabrice J. Ryba, Matthew Orlinski, Matthias W¨ahlisch

all packets that exit a network are inspected by anauthentication server. An authentication server can alsocheck incoming packets with the authentication server atthe source network. This approach can lower processingoverheads for some hosts in the network but it doesnot address concerns about additional latency and trafficvolume.

C. Flow Correlation

Flow telemetry can help to identify anomalies innetwork traffic by inspecting statistical information oftraffic that is aggregated by source and destination ad-dresses/ports. Kreibich et al. proposed to inspect asym-metries in packet counts per flow direction to find reflec-tion attacks from the victim’s perspective [142]. Rossowproposed to leverage volume asymmetries to identifyamplification attacks, both from the amplifier’s and vic-tim’s perspective [13]. Related methods that target non-amplification attacks aim to detect TCP-SYN floodingattacks by observing unbalanced SYN and SYN-ACKpacket flows [43], [44], [113], [121], [143], [144].

D. Filtering Spoofed Packets Using Network Topology

Almost all of the filtering methods seen so far comewith a high cost in terms of additional latency, trafficvolume, and/or processing at routers. In this section wewill discuss methods which can lower the overheadsby using what information is already known about thestructure of the Internet. For example, some IP addressesare not meant to be used outside of local networks.Packets with private IP addresses (e.g., 192.168.1.1)should not be routed, as Network Address Translation(NAT) [145] at the source network should have changedthe source address of the packet.

More generic methods of detecting spoofed packets,as discussed next, are probabilistic because the Internetis both dynamic and complex. However, some of theseapproaches also include a mechanism to determine if apacket was actually spoofed following detection.

1) Using IP Headers: One way with which spoofedpackets can be filtered without using additional band-width is to analyze information present in the IP headers.If the legitimate values for a source IP address is known,then spoofed packets which do not have the correctinformation can be identified and filtered.

For example, spoofed packets can be filtered if theirhop count does not match what is known about thetopology of upstream routers. This information can beestimated using the Time To Live (TTL) field in the IPheader [85], [99], [146]. However, there may be many

paths between the source and destination of spoofedpackets. One interesting idea is to use Ant ColonyOptimisation (ACO) algorithms to find these paths [147],and to collect TTL values which can be used to filterspoofed packets.

It is even possible to filter spoofed packets by de-tecting what operating system a remote host is using,i.e., by estimating the initial TTL of packets [91], [93].However, filtering spoofed packets based on the TTLand other fields does not guard against spoofing attackswhere the attacker can manipulate the values in the IPheader.

2) Ingress Filtering and RPF: Filtering IP packetswith spoofed addresses can be achieved using knowl-edge of the IP addresses allocated by the upstream ordownstream networks [73], [100], [148]. Ingress filteringfilters incoming packets. In contrast, egress filteringfilters packets which are exiting the network.

Ingress filtering (BCP 38) is sometimes implementedat the periphery of the Internet to stop packets withspoofed addresses being routed by edge routers [73].However, not all network operators implement BCP38. Ingress Access Lists are also typically maintainedmanually, and having outdated or misconfigured lists canprevent legitimate or allow spoofed traffic [102].

Unicast Reverse Path Forwarding (uRPF) is an imple-mentation of BCP 38 and uses forward routing informa-tion to filter spoofed packets [83]. Incoming packets arechecked against a routers Forwarding Information Base(FIB) to ensure that packets are only forwarded if theycome from the interface which is on the router’s bestpath to the source address. uRPF also has a “loose mode”where it can check the source addresses packets withouttaking the interface into account. This allowed uRPFto be used on routers with multiple links to multipleISPs [83].

3) Learning Directions: Routers can record informa-tion from incoming packets in order to filter traffic whichcomes from unexpected directions [74], [78]–[80], [89],[106]. The Source Address Validity Enforcement (SAVE)protocol [104] is one example where routers can learnthe expected incoming interface for a source address inorder to authenticate subsequent packets.

The approach proposed by Wu et al. [89] is calledSource Address Validation Architecture (SAVA). To pre-vent IP spoofing in a local network, SAVA routers bindthe source IP address and MAC address to a specificswitch port. The next step is to filter packets at the Intra-AS level. This is done by associating source addresseswith the incoming interface. The last step, filtering

12

Page 13: Amplification and DRDoS Attack Defense - arXiv · Amplification and DRDoS Attack Defense – A Survey and New Perspectives Fabrice J. Ryba, Matthew Orlinski, Matthias W¨ahlisch

spoofed packets at inter-AS level, involves adjacent ASesexchanging address blocks so that packets from otherASes can be filtered.

However, these methods do not perform well duringlegitimate changes to the Internet’s structure or whenthere are multiple paths between two routers [74]. Tocounter this problem these methods can consider multi-ple valid interfaces per source address at the cost of lowerfiltering accuracy. Mirkovic et al. [74] proposed droppingsome TCP packets which originate from new interfaces.Under normal circumstances these packets should beretransmitted and the operation of the Internet is notseverely compromised. However, this approach does nothelp with combating amplification attacks which areperpetrated using UDP or where the attacker retransmitsattack packets.

4) BGP and Routing Tables: BGP is responsibleexchanging routing information between ASes. As aresult, many papers have proposed that BGP can alsobe used to help filter spoofed packets [76], [77], [105],e.g., by adding anti-spoofing information to BGP updatemessages [81] using packet marking techniques such asPi which we talk about in Section IV-E2.

One way to use BGP routing tables to filterspoofed packets is to use Distributed Packet Filtering(DPF) [76], and its extensions Inter-Domain PacketFilters (IDPF) [77], [105] and Extended IDPF [134].Using IDPF a router examines BGP routing tables tocheck if it is on the optimal path between the packet’ssource and destination. However, this approach suffersfrom the same security flaws as BGP because there is nobuilt-in mechanism to check the integrity and source ofBGP messages [149]. To improve the security of BGPand thus IDPF, Dawakhar et al. have suggested usingCredible BGP [150].

E. Tracing the Attacker

Next to detecting and filtering spoofed IP packets,an orthogonal challenge is to trace the actual sourceof spoofed traffic [65]. Such tracing is useful, not onlyto stop attacks as they are happening by filtering theattack traffic at the source (thus saving the resources atupstream networks), but also so that the perpetrators canbe prosecuted and further attacks prevented.

Tracing spoofed packets is difficult because of limitedaccess to external routers and the the high overheadsinvolved. The existing traceback vary in their objectiveand where they are applied. For example, an adminis-trator of a local network might want to know whichMAC address or interface is being used to send spoofed

packets [151], whereas an attack victim might want toknow which network the attack originated from.

In amplification attacks, the victim receives attacktraffic from amplifiers. Thus, the traffic facing the victimis not spoofed. Instead, spoofing detection and tracebacksneeds to be performed at the amplifiers, possibly with thehelp of amplification honeypots [48].

It is also important to realize that the traceback canonly be used to identify the source of spoofed packets.Detecting the individuals involved requires many out-band techniques such as monitoring the chat networksused by cyber criminals. Furthermore, tracing becomesinherently difficult in case of distributed attack sources,such as DDoS botnets.

1) Using Traffic Logs: Tracing spoofed packets backto the attacker can be done by analyzing traffic flowdata collected by routers [113], [121], [144]. With log-based traceback there is always the potential to tracea single packet [143], and to trace attackers who usereflection. However, these methods often require thattraffic data is either collected or stored by routers [107].This comes with many practical difficulties such as ad-ditional hardware costs, as was the case with the originalproposal by Snoeren et al. [113], which requires SourcePath Isolation Engine (SPIE) routers in place of existingrouters. One solution to replacing existing routers is touse tap devices which eavesdrop on traffic [152]. Finally,one can lower the amount of storage required to traceattackers by using hashes [121].

2) Packet Marking: The idea of packet marking isto record the path which packets follow into the pack-ets [71]. Early packet marking schemes appended the IPaddresses of routers into packets [71], [119]. However,the four addition bytes needed to represent an IPv4address and the large number of hops quickly adds to thesize of packets. Song and Perrig suggested reducing theamount of space required by encoding addresses usinghashing and a map of upstream routers [111]. Yaar etal. discussed ways to lower the space needed by usingshorter identifiers than IP addresses [82]. However, ap-pending data unnecessarily to packets is still undesirablebecause it can increase fragmentation. To address thisproblem some packet marking schemes also suggestedoverloading IP header fields [71], [86], [88], [90], [111]and only encoding the addresses of edge routers [87].

Savage et al. introduced Probabilistic Packet Marking(PPM) to reduce size and processing overheads of packet

13

Page 14: Amplification and DRDoS Attack Defense - arXiv · Amplification and DRDoS Attack Defense – A Survey and New Perspectives Fabrice J. Ryba, Matthew Orlinski, Matthias W¨ahlisch

marking even further [71], [110]3. PPM can be usedto identify network path(s) traversed during an attackso long as the victim receives sufficient marked pack-ets. Dong et al. [154] designed a single-bit-per-packetscheme. However, Adler [92] noted that there is a trade-off between the number of bits allocated to PPM and thenumber of packets that must be received by the victim.

Duwairi et al [155] proposed a hybrid PPM and datastorage method called Distributed Linked-List Traceback(DLLT). The “store, mark, and forward” operation usedby DLLT requires a “marking field” in each packetbig enough to store a single IP address, and a datastructure on each router in which to store informationabout forwarded packets. Any router which marks apacket must first store the address in the marking field(if there is one) along with a packet identifier, then therouter is free to write its address in the marking fieldbefore forwarding the packet. A linked list is inherentlycreated using this operation because the address in themarking field points to the previous router, which hasa record of where it received the packet from, and soon. However, its difficult to trace attacks with multipleattack sources [127]. To counter this, Song and Perriglooked at the security of markings and proposed usingtime-released key chains to authenticate them [111].

Li et al. [12] proposed an efficient packet markingscheme specifically for reflection attacks called Authen-ticated Deterministic Packet Marking (ADPM), which isan extension of the approach proposed by Belenky etal. [156]. ADPM assumes that all routers are capable ofmatching request and response packets and that routersadjacent to reflectors cooperate to copy packet markingsfrom the request packets to the replies.

Dean et al. phrase packet marking as a polynomialreconstruction problem and encodes path information aspoints on polynomials [90]. Chen and Lee also extendedtheir work to target reflection attacks [157]. They did thisby requiring reflectors copy packet markings from therequest packets to the replies. This enables the victim totrace paths to the attacker using less than 4,100 packets,but it may be possible to combine logging at routersand PPM to achieve traceback with a smaller number ofmarked packets [120]

A drawback of most packet marking schemes is thatthey rely on routers to maintain and update the markers.In case routers drop or do not extend the marks, packetmarking becomes significantly less effective.

3Shokri et al. [153] had a similar idea 6 years later and called itDynamic Marking.

3) ICMP Traceback: Bellovin et al. proposed iTracewhere routers send ICMP messages to the destinationaddress of packets they forward so that the destinationcan see the path which the packet followed [109]. ICMPtraceback can also be probabilistic in that the chanceof a router generating an ICMP message is small, thuslowering overheads in a similar way to PPM [129], [158],[159]. Mankin et al. improved iTrace with “intention-driven” traceback after they noticed that the chance ofa router picking an attack packet close to the attackeris much smaller than closer to the victim for certainDoS attacks [129]. Wang and Schulzrinne also proposeda new ICMP message which can be used in ICMPtraceback for reflection attacks [160].

4) Link Testing: Link testing is the systematic testingof intermediary links between routers, such as imple-mented via input debugging [107], DECIDUOUS [70],or controlled flooding [108], as described next.

Input debugging attempts to determine from whichupstream router an attack is coming from by recursivelygenerating attack signatures to distinguish maliciouspackets from normal traffic. However, attack signaturesthat only match malicious traffic are difficult to create.Good attack signatures match only attack traffic and aonly little to no legitimate traffic [107].

The Intruder Detection and Isolation Protocol(IDIP) [72] describes an architecture which also usesattack signatures and can be used for link testing andattack mitigation. In IDIP a single Discovery Coordinatorsends trace messages to other IDIP enabled devices. Thetrace messages contain a description of the event, i.e.,an attack signature, using the Common Intrusion Spec-ification Language (CISL) [161]. IDIP devices whichreceive trace messages reply with report packets. TheDiscovery Coordinator can then decide what action totake, including instructing other IDIP devices to blockattack traffic for a short amount of time [72].

Another link testing method uses IPSec [162]–[164]to trace the network from where a spoofed packetoriginated. For example, the DECIDUOUS implemen-tation [70] creates secure tunnels between itself and up-stream routers until it finds the network from where theattack is coming from. However, DECIDUOUS needsto have a complete overview of the network topologyto choose routers with which to tunnel. Furthermore,DECIDUOUS has high processing and traffic overheadscaused by setting up and tearing down secure tunnels.

Controlled Flooding is a link testing method whichfloods each upstream router with packets. This techniqueneeds the knowledge of the topology of the Internet.

14

Page 15: Amplification and DRDoS Attack Defense - arXiv · Amplification and DRDoS Attack Defense – A Survey and New Perspectives Fabrice J. Ryba, Matthew Orlinski, Matthias W¨ahlisch

Thus, a map of the Internet is obtained before link test-ing [108]. The purpose of flooding upstreaming routersis to determine if the attack traffic affected. If the attacktraffic is disturbed significantly when sending traffic toa router then it is assumed that this particular router isone forwarding attack traffic.

F. Discussion

We have surveyed approaches to defend against spoof-ing. However, there are also more theoretical works inthis area. For example, given a graph of the networktopology and a set of firewall rules for each node, San-tiraveewan and Permpoontanalarp proposed a methodol-ogy which can check to see if spoofing is possible [165].

With all of these defenses, it may be confusing asto why spoofing is still a problem. There are manypractical and economic reasons. Many of the proposalsincur extra latency, traffic volume, computation, and/orstorage overheads. Others are expensive to implement,as they require new hardware or staff to maintain them.Finally, it is not clear how well the methods will performwith only limited deployment [76], and what rewardsthey offer to early adopters [81].

We have seen that it is to difficult to prevent spoofingor trace the attackers in reflection/amplification attackswithout considerable investment and cooperation by thedifferent network operators. Therefore, we have to lookfor other ways of detecting and mitigating amplificationattacks as soon as possible. The next section will addressthis topic in more detail.

V. DETECTING AND MITIGATING AMPLIFICATION

ATTACKS

The preventative measures described in Sections IIIand IV are effective defences against amplification at-tacks. Nevertheless, we have seen that they cannot al-ways be relied upon. So the defences described in thissection are to be used when preventative measures fail.

Defending against amplification attacks involves at-tack detection and attack mitigation, e.g. packet filteringor black holing. Attack detection is easier to performnear to the victim because traffic flows resemble a funnelwith many attackers sending packets to a single loca-tion [11]. In contrast, attack mitigation is best performedcloser to the source to save the resources of the victimand upstream networks.

Chang [42] explained that DoS defenses can belocated at four areas: (i) the victim’s network, (ii)the victim’s ISP network, (iii) further upstream net-works, and (iv) attack source networks. Zargar et

al. [11] classifies DoS defenses into two categories: (i)network/transport-level, and (ii) application-level. Theyalso sub-categorized DoS defenses based on their de-ployment location: (i) source, (ii) destination, (iii) net-work, and (iv) distributed/hybrid.

However, in this survey we are concerned specificallywith amplification attacks, and we observed that it is alsopossible to defend against amplification attacks at theamplifiers. Therefore, we have have split amplificationattack defenses into the following location categoriesdescribed in Figure 10: (i) at the victim’s network, (ii) atthe source network(s), (iii) a single unspecified locationin cases where the authors have not been clear aboutthe deployment location, (iv) distributed, and (v) at theamplifier(s). In cases where the amplifier itself is thetarget of an amplification attack, defenses will be limitedto source-based and amplifier-based defenses.

Distributed Defences

Source Defences Victim Defences

Amplifier Defences

Source AS Victim AS

Amplifier AS

M

x

x

x

xA

x

x

x

x

V

x

Fig. 10. Locations for defending against amplification attacks.Routers are marked x.

It is also important to note that not all of the DoS de-fenses surveyed by Chang and Zargar et al. are applicableto amplification attacks. The most devastating attacks wedescribed in Section II originated from multiple sources,and combined both traffic amplification and reflection.Therefore, in this section, we will discuss the defensesin Table III which include new proposals that specificallytarget amplification attacks, but we will also includesome older proposals which can part-defend againstamplification attacks, e.g., defenses against reflection.

15

Page 16: Amplification and DRDoS Attack Defense - arXiv · Amplification and DRDoS Attack Defense – A Survey and New Perspectives Fabrice J. Ryba, Matthew Orlinski, Matthias W¨ahlisch

TABLE IIIMETHODS FOR DETECTING AND PREDICTING AMPLIFICATION ATTACKS. SOME OF THESE PROPOSALS ALSO INCLUDE NOVEL

TECHNIQUES WHICH AIM TO IDENTIFY AND FILTER ATTACK PACKETS.

Method and References Description Location TimeBefore During

Attack pattern correlation [166] Tries to detect reflection attacks by correlating the arrivalrate of packets at the victim with known attacks.

Victim X

Missing request packets [15], [167]–[170]

Attempt to match incoming responses to previously sentrequests.

Victim X

History-based IP Filtering (HIP) [171] Attempts to filter packets during periods of high congestionwhich come from previously unseen addresses.

Victim X

Comparing incoming and outgoing pack-ets at source networks (D-WARD) [172],[173]

Uses protocol specific knowledge to predict the numberof expected responses, e.g., replies to ICMP requests. Canalso rate limit attacks at the source.

Source X

Comparing the volume of incoming andoutgoing traffic [174], [175]

MULTOPS [174] and TOPS [175] Unspecified X

Detection with Information Sharing(DIS) [176]

Aimed at TCP based reflection attacks, but reflectorscollaborate to improve the accuracy of attack detection.Similar collaboration could potentially improve attack de-tection at amplifiers.

Reflectors /Amplifiers

X

PacketScore [177] Routers score packets, and communicate with a centralserver for a global view and filter packets with a highscore.

Distributed X

Repetitive packet sizes [178] Monitoring DNS packet sizes as well as the number ofpackets across multiple routers. Suspicion is based onthresholds calculated using real data from the GEANTnetwork.

Distributed X

Comparing payload bytes of request andresponse packets [13]

Analysed NetFlow data to detect pair-flows where theresponse payloads are larger than the request payloads(a similar idea to that which is used in MULTOPS andTOPS). Limited to 14 UDP protocols.

Distributed X

Comparing payload bytes of request andresponse packets, plus compare packetsizes of requests [20]

Combines techniques from Rossow [13] (comparing re-quest and response sizes) and Huistra [178] (similar packetsizes between requests).

Distributed X

Aggregate-based Congestion Control(ACC) [179]

Looks for high bandwidth aggregates (collections of pack-ets sharing the same destination address). Uses pushback(also used in [180]) to instruct upstream routers to rate-limit flows.

Distributed X

Spoofing protection for amplifiers [135] Specific to amplification attacks. This method detectsspoofed packets which do not have the correct session keyprovided by the amplifier for the source address.

Distributed X

AD and PAD [181], and TRACK [182] A congested victim instructs upstream routers to use packetmarking in order to trace the attack and then requests theyfilter the traffic. These methods may need to be updatedfor amplification attacks to take reflection into account.

Distributed X

Game theory to predict attacks [183] It is possible to study the motivation of attackers and thesecurity of the Internet to predict attacks.

n/a X

Darknets to detect scans [13], [184]–[186]

Monitoring darknet traffic can detect random scans foramplifiers such as those seen before the Spamhaus at-tack [186].

Distributed X

Honeypots to detect scans and at-tacks [13]

Honeypots can take the place of amplifiers and are apowerful way of detecting scans and amplification attacks.They also require careful configuration so they do notcause harm to the victim.

Amplifiers X X

16

Page 17: Amplification and DRDoS Attack Defense - arXiv · Amplification and DRDoS Attack Defense – A Survey and New Perspectives Fabrice J. Ryba, Matthew Orlinski, Matthias W¨ahlisch

A. Victim-end Defenses

Despite attack detection and packet filtering beingseparate objectives, many proposals attempt to do bothnear the victim.

Kambourakis et al. [15], [167] proposed a DNS Am-plification Attacks Detector (DAAD) which logs outgo-ing DNS requests and incoming responses in lookuptables at the victim’s network. Responses are matchedto outgoing requests and responses that don’t matchrequests are flagged as suspicious. The authors alsopropose that the DAAD should be able to alter firewallrules to filter packets. However, amplification attacks donot only misuse DNS as we described in Section II. Soa more general detection method is desirable.

Tsunoda et al. [169] proposed a general method formatching request and response packets at a single pointbetween the amplifier and the victim, e.g., at the vic-tim’s gateway router. They later extended their workwith mathematical analysis and additional experimentalresults [170]. However, in order to correctly identifythe responses for each request, a router needs to recordthe source and destination addresses, protocol field,application headers, etc. for every request it forwards.This requires memory-intense management operations.A partial solution to this problem is to use Bloomfilters to efficiently store requests and check them againstincoming response packets [168].

History-based IP Filtering (HIP) [171] attempts tofilter packets during periods of high congestion whichcome from previously unseen addresses. It does this byadding addresses to a table during normal operation, anduses a sliding window to remove expired addresses.

Wei et al. [166] proposed using traffic pattern corre-lation to look for patterns which are out of the ordinary,or which match known attack patterns. The advantagesof using traffic pattern correlation and HIP for attackdetection, are that they are lightweight and protocolindependent. However, methods to detect attacks basedon previous behavior can struggle to distinguish betweenattacks and unexpected bursts in legitimate traffic (flashcrowds) [187]. Furthermore, an attacker that knows thesedefenses can “train” the victim before the attack [171].

After an attack has been identified, traffic can bedropped before it enters the victim network by in-strumenting the control plane. A common approach isblackholing of IP prefixes or host addresses at InternetExchange Points (IXP) [188]. In this case, a border routerof the victim network signals a specific next hop for theaddresses under attack, using BGP updates. Traffic from

neighboring routers to the victim will then be forwardedto this IP addresses (or more precisely to the MACaddress), and finally discarded at IXP layer-2 ingressswitches.

Detecting attacks at the victim’s network may beineffective because bandwidth may have already becomesaturated, or the volume of traffic is too much to process.This means that automated responses for filtering packetsor alerting upstream routers to throttle traffic may notfunction correctly. In order to avoid this problem, anotherpossible location for detecting and filtering amplificationattacks is at the source network.

B. Source-end Defenses

Source-end defenses are desirable because they canstop attack traffic before it gets to upstream routers.However, source-end detection and filtering techniquesmay not be an effective defense against amplificationattacks because: (i) the source of the attack can be dis-tributed, meaning that the solutions need to be deployedon all networks, (ii) it can be difficult to differentiatebetween legitimate and attack traffic if each attacker onlysends a few requests, and (iii) there is no immediateincentive for network providers to deploy source-enddetection and filtering techniques because it is unclearwhat benefit it offers their customers.

One example of a scheme proposed to work at theattack source is by Mirkovic et al. [172], [173]. Theyproposed D-WARD specifically to detect DoS attackswhich involve spoofed packets or high traffic volumes.They monitor both inbound and outbound traffic flows atthe source network, and compare them with flow modelsderived from normal traffic. The authors also note that anattacker will not reduce its outbound traffic even whennotified of congestion at the victim, so D-WARD can ratelimit suspected source addresses at upstream routers.

C. Distributed Defenses

Victim-end and source-end defenses tend to be de-signed to run in isolation on a single machine, e.g., ata border router between networks. However, detectingand filtering amplification attacks at a single point in theInternet is problematic because of asymmetric routing,and the fact that attacks are distributed. This meansthat in order for isolated defenses to be effective, allinbound and outbound paths in the Internet should besymmetrical, and all networks should support the newdefenses.

Amplification attacks are distributed threats againstmany potential victims, and as a result they require

17

Page 18: Amplification and DRDoS Attack Defense - arXiv · Amplification and DRDoS Attack Defense – A Survey and New Perspectives Fabrice J. Ryba, Matthew Orlinski, Matthias W¨ahlisch

distributed defenses. Some distributed defenses alsocan detect and filter attacks after a victim has beentaken offline by the attack and cannot use automatedmethods which use the affected connections to alertupstream routers [13], [20], [177], [178]. It is evenpossible to detect and filter DoS attacks with limiteddeployment of a distributed protocol alongside legacyequipment/protocols [189].

Kim et al. [177] proposed PacketScore which usesa DDoS Control Server (DCS) to collate reports fromrouters across the Internet. Routers with special reportingcapabilities, called Detecting-Differentiating-DiscardingRouters (3D-R), mark suspicious packets with a “score”which reflects how likely they are to be involved in anattack. The 3D-Rs then filter packets based on a variablescore threshold provided by the DCS, which varies thethreshold depending on the current load at the victim andthe score distribution of attacking packets.

Mahajan et al. proposed attack detection at victims interms of “aggregate” flows, and proposed using push-back mechanisms to filter flows at upstream networkswhenever a link experiences sustained severe conges-tion [179]. In pushback, the congested router asks up-stream routers which are involved in the flow aggregateto rate limit traffic flows [179], [180].

Chen and Park [181] proposed an Attack Diagnostic(AD) system in which DoS attacks are detected near tothe victim, and packet filtering is executed close to theattacker. AD also combines some familiar techniques;packet marking (Section IV-E2) is used for traceback,and an approach similar to pushback is used to alert thesource networks. Similarly, TRACK combines packingmarking with packet filtering [182]. However, AD andTrack are currently not suitable defenses for amplifica-tion attacks because their traceback methods will onlytrace back to the amplifier, but not to the actual attacker.

It is also possible to detect amplification attacks byanalyzing traffic flow data collected by multiple routers.Usually these methods require data from locations be-tween the source and the amplifier, as well as data frombetween the amplifier and the victim [13], [20], [178].However, it is not required to have data from betweenthe attacker and amplifier simply to detect DDoS attacks.Yu et al. [187] proposed using flow correlation to detectDDoS attacks, but unlike the correlating method pro-posed by Wei et al. [166], Yu’s method can distinguishattacks from flash crowds. This was possible becauseit has access to data collected by multiple routers in a“community network”.

Huistra showed that amplification attacks can be

detected specifically by monitoring DNS packet sizesas well as the number of packets across multiplerouters [178]. Huistra’s method is split into two parts.The first (which can also be used to detect attackers)focuses on detecting IP addresses generating a suspiciousnumber of similar sized DNS requests. Suspicion isbased on thresholds calculated using real data from theGEANT network [178]. The second part can be used todetect the victim, and looks at the number of large DNSpackets sent to a single IP address.

Rossow’s analysis and detection of amplification at-tacks is similar to Huistra’s but is not limited to a singleprotocol [13]. Instead, he focused on 14 UDP protocolswhich allow amplification. By analyzing traffic samplestaken from routers belonging to a single ISP, Rossow wasable to detect 15 real life amplification attacks againstmultiple victims by comparing sent and received bytes.

Based on the work by Rossow, Bottger et al. [20]developed a protocol-agnostic approach to detect ampli-fication attacks. They introduce the following detectioncriteria, which are independent of a specific networkservice, but base on the assumption that attackers reuseattack requests: (i) similar packet size among all requests(and responses), (ii) similar payload among all requests(and responses), (iii) an increased amount of ICMPunreachable messages, and (iv) incorrect TTL values.They found that the first two criteria are most suitablefor amplification detection.

D. Defenses At Reflectors/Amplifiers

Rossow and Huistra also showed that it is possibleto detect open DNS resolvers that have been abused inamplification attacks by analyzing traffic data collectedby routers in a similar way as mentioned in the previ-ous subsection, but from an amplifiers perspective [13],[178].

Another approach for filtering spoofed packets, whichwas specifically designed to defend against amplificationattacks, requires that session tokens are sent along withrequests to amplifiers [135]. This requires that the firsttime a request is received from a new address, theamplifier replies with a unique session token which thesender should include in all future requests.

Including the same session token in all requests haslow processing overheads but adds to the size of eachpacket. Furthermore, it is prone to eavesdropping ifsession tokens are not encrypted. If the attacker caneavesdrop on the victims Internet traffic then they canalso agree new session tokens with amplifiers the victimhas not yet contacted.

18

Page 19: Amplification and DRDoS Attack Defense - arXiv · Amplification and DRDoS Attack Defense – A Survey and New Perspectives Fabrice J. Ryba, Matthew Orlinski, Matthias W¨ahlisch

Peng et al. [176] focused on TCP based reflectionattacks and used mechanics which might also improvethe accuracy of detection at amplifiers. Their methodmonitored the cause of packets instead of just countingthem. In their proposal, reflectors monitor incoming TCPRST packets and monitor those which have a corre-sponding SYN/ACK state for the outgoing connection.RST packets indicate that the reflector received a spoofedSYN packet from an attacker and sent a SYN/ACK tothe victim, at which point the victim has replied witha RST packet. Peng et al. suggested that collaborationbetween reflectors can be used to improve the accuracyof attack detection. Once an attack has been detected,their system sends a warning to all other participatingreflectors instructing them to stop the attack.

E. Defenses at Single Unspecified Locations

Not all DoS attack defenses are designed with a partic-ular location in mind, or the location was not explicitlyspecified. This is problematic because the challengesvary among locations.

MUlti-Level Tree for On-line Packet Statistics (MUL-TOPS) [174] is one example where a router somewhereon the Internet is used to compare the volume of in-coming and outgoing traffic to look for DoS attacks.However, if MULTOPS is used on central routers whichroute packets for many different addresses, then the treedata structure it relies on will consume a significantamount of resources. In fact, MULTOPS itself can betargeted by memory exhaustion attack [174], [175].

Tabulated On-line Packet Statistics (TOPS) [175] im-proves on the accuracy of MULTOPS by taking intoaccount the protocol being used, and also improvesefficiency by using fixed length tables instead of trees.This makes TOPS suitable for use on busy links [11].

Both MULTOPS and TOPS assume that legitimate in-coming and outgoing traffic is proportional [175]. How-ever, this is not always the case, e.g., when streamingvideo. Attackers may also try to counteract MULTOPSand TOPS by trying to balance incoming and outgoingdata volumes during an attack [11].

F. Predicting Future Attacks

It is desirable to know about DoS attacks before theyhappen. To this end, Fultz et al. [183] proposed using agame theoretical approach to predict DDoS attacks. Theyfound that attackers only launch attacks if defenders havenot invested in adequate protection or if penalties, e.g,monetary costs and risks of being caught are low.

It is also possible to detect scans for amplifiers whichmay act as a warning for future attacks. For example,darknets (also known as blackholes) are unused IP ad-dress spaces on the Internet. Since the IP addresses indarknets are supposed to be unused, any traffic to or froma darknet is a sign of either scanning, misconfiguration,or malicious intent [190].

Fachkha et al. [184]–[186] looked at 1.44TB of trafficdata for a /13 address block of darknet IPs 4, and found134 separate incidents which they claimed may havebeen amplification attacks.

However, Fachkha et al. may have detected scans foropen DNS resolvers rather than actual attacks. To explorethis idea we can look at Tables 7 and 8 in [186] to seethe incidents they detected. Specifically, they detected2 large events (February 19th and March 18th) withvery high packets per minute. March 18th is interestingbecause it is the same day as the Spamhaus attack [8].However, this looks like a horizontal IP scan because ittargets 50,257 separate IPs with 1 packet each, which isindicative of a horizontal scan rather than an attack.

We can also take a closer look at the Spamhausincident by using Figure 6 of [186], which shows thepackets per hour going to the Darknet monitored byFarsight Security:

• The first spike we are interested in is at 337 hours,which is on the 14th of March. This is shortlybefore the Spamhaus attack which was reported byCloudFlare as taking place on March 18th [8].

• The second interesting data spike at 385-409 hoursis also before the attack.

• The graph for the 18th of March (the day of theattack) is one of the quietest periods shown.

• The next spike they detect is at 517 hours, whichis 3 days after the attack.

By referencing what we know about the Spamhausattack [8], we suggest that the information presented byFachkha et al. [186] shows horizontal scans for openDNS resolvers which may be related to the Spamhausattack. Furthermore, attackers are unlikely to waste band-width sending speculative requests to unknown IPs whenthey can try to maximise the impact of an attack by onlysending requests to known amplifiers. This supported bythe quiet period observed by Fachkha et al. on March18th.

Finally, to support defenses and monitor attacks, onecan set up amplification honeypots that emulate protocols

4The data was provided to Fachkha et al. by Farsight Securityhttps://www.farsightsecurity.com/.

19

Page 20: Amplification and DRDoS Attack Defense - arXiv · Amplification and DRDoS Attack Defense – A Survey and New Perspectives Fabrice J. Ryba, Matthew Orlinski, Matthias W¨ahlisch

that are vulnerable to amplification abuse. Honeypotscan be used to log scanning activity and report attacksthat abuse them. In addition, Kramer et al. show thathoneypots can be used to derive signatures of attacktraffic, such as domains abused in DNS requests [48],which is useful for detecting future attacks.

G. Discussion

Most of the defenses described in this section focus onamplification attack detection and filtering at the victimor by using distributed algorithms. Amplification attackdefenses at the source networks are more desirable, butit is unlikely that defences specific to a single attack,e.g., amplification attacks, will be implemented in theshort-term and on a large scale.

One contribution of this paper is to survey the defensescurrently available for amplifiers and to make somesuggestions for future directions. We found that this areahas had relatively little attention compared to defenses atrouters, but by adopting one of the approaches detailedin Section III it may be possible for amplifiers to preventamplification attacks from happening in the first place.

VI. CONCLUSIONS

This paper discusses the current state of the art ofresearch proposals for detecting, preventing, and tracingamplification attacks. As part of this, we have alsosurveyed defenses against source IP address spoofing,which is essential for amplification attacks.

We have concluded that preventing source IP spoofingis the effective way of defending against amplificationattacks. However, spoofed packets can still be sent fromlarge parts of the Internet. So we need effective methodsto detect and filter DoS attack packets as close to thesource as possible.

Another subject for future work is to assess the de-fenses we have covered against one another using a widerlist of empirical criteria, e.g., monetary cost, accuracy,memory overheads, levels of inter-AS cooperation, etc.Zargar et al. [11] surveyed the metrics used to asses DoSdefenses and discussed their categorization in some ofthese terms. However, a more detailed study on individ-ual defenses is crucial because all of the proposals wesurveyed come with their own strengths and weaknesses.Some of which may not be obvious, and it is importantfor system administrators to be able to weigh up theiroptions in a concise and meaningful way.

Promising amplification attack defences appear to bedistributed DoS detection and filtering algorithms, which

TABLE IVINITIATIVES TO IDENTIFY AMPLIFIERS

Reference Description

Open ResolverScanningProject [191]

Scans for open DNS resolvers and provide anautomated system to notify affected networks.

Open DNSResolverProject [26]

Scans for open resolvers and allows to queryfor such resolvers in a certain IP address range.

MeasurementFactory [192]

Maintains a list of DNS servers that are knownto serve as globally accessible open resolvers.

Open NTPProject [193]

Scans for NTP servers in IPv4 which can beused in an amplification attack.

can mitigate attacks even when the victim has gone off-line and is unable to take counter-measures itself. How-ever, these methods require more collaboration betweennetwork providers than is currently the case [11].

More research is required to close the attack vectorswhich are being used in amplification attacks, e.g, clos-ing open DNS resolvers, patching NTP servers, and pro-moting ingress filtering. A number of ongoing initiativesaim at tackling these issues, as summarized in Table IV.

REFERENCES

[1] M. Handley, E. Rescorla, and IAB, “Internet Denial-of-Service Considerations,” RFC 4732 (Informational), InternetEngineering Task Force, December 2006. [Online]. Available:http://www.ietf.org/rfc/rfc4732.txt

[2] T. Brewster, “Cyber Attacks Strike ZimbabweansAround Controversial Election,” August 2013. [On-line]. Available: http://www.techweekeurope.co.uk/workspace/zimbabwe-election-cyber-attacks-123938

[3] J. Leyden, “US Credit Card Firm Fights DDoS Attack,”September 2004. [Online]. Available: http://www.theregister.co.uk/2004/09/23/authorize ddos attack/

[4] Prolexic, “Prolexic Stops Largest-Ever DNS ReflectionDDoS Attack ,” May 2013. [Online]. Available: http://www.tinyurl.com/prolexic-167gbit

[5] A. Pras, A. Sperotto, G. Moura, I. Drago, R. Barbosa, R. Sadre,R. Schmidt, and R. Hofstede, “Attacks by Anonymous Wik-iLeaks Proponents not Anonymous,” 2010.

[6] M. Calce and C. Silverman, Mafiaboy: How I Cracked theInternet and Why It’s Still Broken. Viking, 2008.

[7] D. Takahashi, “Hackers Attack Dota 2 and Leagueof Legends Servers in Quest For One GameLivestreamer,” December 2013. [Online]. Available:http://tinyurl.com/PhantomL0rd-drdos

[8] I. M. Prince; CloudFlare, “The DDoS That AlmostBroke the Internet,” March 2013. [Online]. Available: http://blog.cloudflare.com/the-ddos-that-almost-broke-the-internet

[9] J. Mirkovic and P. Reiher, “A Taxonomy of DDoS Attackand DDoS Defense Mechanisms,” ACM SIGCOMM Comput.Commun. Rev., vol. 34, no. 2, pp. 39–53, Apr. 2004.

20

Page 21: Amplification and DRDoS Attack Defense - arXiv · Amplification and DRDoS Attack Defense – A Survey and New Perspectives Fabrice J. Ryba, Matthew Orlinski, Matthias W¨ahlisch

[10] C. Douligeris and A. Mitrokotsa, “DDoS Attacks and DefenseMechanisms: Classification and State-of-the-art,” ComputerNetworks, vol. 44, no. 5, pp. 643 – 666, 2004.

[11] S. Zargar, J. Joshi, and D. Tipper, “A Survey of DefenseMechanisms Against Distributed Denial of Service (DDoS)Flooding Attacks,” Communications Surveys Tutorials, IEEE,vol. 15, no. 4, pp. 2046–2069, 2013.

[12] Y. Li, Q. Wang, F. Yang, and S. Su, “Traceback DRDoSAttacks,” Journal of Information & Computational Science,vol. 8, pp. 94–111, 2011.

[13] C. Rossow, “Amplification Hell: Revisiting Network Protocolsfor DDoS Abuse,” in Proc. of NDSS. Internet Society, 2014.

[14] R. Vaughn and G. Evron, “DNS AmplificationAttacks,” March 2006. [Online]. Available: http://crt.io/DNS-Amplification-Attacks.pdf

[15] G. Kambourakis, T. Moschos, D. Geneiatakis, and S. Gritzalis,“A Fair Solution to DNS Amplification Attacks,” 2nd Inter-national Workshop on Digital Forensics and Incident Analysis(WDFIA 2007), pp. 38–47, 2007.

[16] R. Shankesi, M. AlTurki, R. Sasse, C. A. Gunter,and J. Meseguer, “Model-checking DoS Amplification forVoIP Session Initiation,” in Computer Security–ESORICS.Springer, 2009, pp. 390–405.

[17] M. Anagnostopoulos, G. Kambourakis, P. Kopanos,G. Louloudakis, and S. Gritzalis, “DNS AmplificationAttack Revisited,” Comput. Secur., vol. 39, pp. 475–485, Nov.2013.

[18] X. Ye and Y. Ye, “A Practical Mechanism to CounteractDNS Amplification DDoS Attacks,” Journal of ComputationalInformation Systems, vol. 9, pp. 265–272, 2013.

[19] M. Kuhrer, T. Hupperich, C. Rossow, and T. Holz, “Exit fromHell? Reducing the Impact of Amplification DDoS Attacks,”in Proc. of the 23rd USENIX Security Symposium. USENIXAssoc., 2014.

[20] T. Bottger, L. Braun, O. Gasser, F. von Eye, H. Reiser, andG. Carle, “DoS Amplification Attacks – Protocol-AgnosticDetection of Service Abuse in Amplifier Networks,” in 7thInternational Workshop on Traffic Monitoring and Analysis(TMA), vol. 9053. Springer-Verlag, 2015, pp. 205–218.

[21] R. R. Hansen, “Slowloris,” 2009. [Online]. Available:http://en.wikipedia.org/wiki/Slowloris (software)

[22] W. Eddy, “TCP SYN Flooding Attacks and CommonMitigations,” RFC 4987 (Informational), Internet EngineeringTask Force, August 2007. [Online]. Available: http://www.ietf.org/rfc/rfc4987.txt

[23] D. Cornell, “DNS Amplification Attacks,” March 2014.[Online]. Available: https://labs.opendns.com/2014/03/17/dns-amplification-attacks/

[24] S. M. Bellovin, “Security Problems in the TCP/IP ProtocolSuite,” ACM SIGCOMM Comput. Commun. Rev., vol. 19,no. 2, pp. 32–48, Apr. 1989.

[25] M. Prince, “Technical Details Behind a 400GbpsNTP Amplification DDoS Attack,” Feb 2014.[Online]. Available: http://blog.cloudflare.com/technical-details-behind-a-400gbps-ntp-amplification-ddos-attack

[26] “Open Resolver Project,” April 2015. [Online]. Available:http://openresolverproject.org

[27] AusCERT, “Domain Name System (DNS) Denial of Service(DoS) Attacks,” August 1999. [Online]. Available: http://www.securityfocus.com/advisories/1727

[28] P. J. Criscuolo, “Distributed denial of service - trin00, tribeflood network, tribe flood network 2000,” Technical ReportCIAC-2319, Department of Energy-CIAC (Computer IncidentAdvisory Capability), Tech. Rep., 2000.

[29] J. Damas, M. Graff, and P. Vixie, “Extension Mechanisms forDNS (EDNS(0)),” IETF, RFC 6891, April 2013.

[30] US-CERT, “UDP-based Amplification Attacks,” 2014.[Online]. Available: https://www.us-cert.gov/ncas/alerts/TA14-017A

[31] Akamai, “SSDP Reflection DDOS Attacks,”2014. [Online]. Available: http://www.prolexic.com/kcresources/attack-report/attack report q214/Prolexic-Q22014-Global-Attack-Report-A4.pdf

[32] MIT, “2013-05-16 SNMP Amplification Attack,” May 2013.[Online]. Available: http://tinyurl.com/MIT-drdos

[33] US-CERT, “NTP Amplification Attacks Using CVE-2013-5211,” 2014. [Online]. Available: https://www.us-cert.gov/ncas/alerts/TA14-013A

[34] Akamai, “The State of the Internet [security],” September2014. [Online]. Available: http://www.stateoftheinternet.com/resources-web-security-2014-q4-internet-security-report.html

[35] CERT Advisory, “Smurf IP Denial of Service Attacks,”1998. [Online]. Available: http://www.cert.org/advisories/CA-1998-01.html

[36] S. Kumar, “Smurf-based Distributed Denial of Service (DDoS)Attack Amplification in Internet,” in Proceedings of the SecondInternational Conference on Internet Monitoring and Protec-tion. IEEE, 2007.

[37] A. Householder, A. Manion, L. Pesante, G. Weaver, andR. Thomas, “Managing the Threat of Denial-of-serviceAttacks,” 2001. [Online]. Available: http://resources.sei.cmu.edu/library/asset-view.cfm?assetid=52481

[38] R. Sparks, “Addressing an Amplification Vulnerabilityin Forking Proxies,” 2006. [Online]. Available: https://tools.ietf.org/html/draft-ietf-sip-fork-loop-fix-00

[39] T. Brewster, “Prolexic CEO: Biggest Cyber Attack EverWas Built on Lies,” April 2013. [Online]. Available:http://tinyurl.com/pr4j42d

[40] T. Rozekrans, M. Mekking, and J. de Koning, “DefendingAgainst DNS Reflection Amplification Attacks,” University ofAmsterdam, Tech. Rep., February 2013.

[41] V. Paxson, “An Analysis of Using Reflectors for DistributedDenial-of-service Attacks,” ACM SIGCOMM Comput. Com-mun. Rev., vol. 31, no. 3, pp. 38–47, Jul. 2001.

[42] R. Chang, “Defending against flooding-based distributeddenial-of-service attacks: A tutorial,” Communications Mag-azine, IEEE, vol. 40, no. 10, pp. 42–51, Oct 2002.

[43] W. Chen and D.-Y. Yeung, “Defending Against TCP SYNFlooding Attacks Under Different Types of IP Spoofing,” inInternational Conference on Networking, International Con-ference on Systems and International Conference on MobileCommunications and Learning Technologies. IEEE, April2006.

[44] S. H. D. Nashat, Xiaohong Jiang, “Detecting SYN FloodingAgents under Any Type of IP Spoofing,” in IEEE InternationalConference on e-Business Engineering. IEEE, October 2008,pp. 499–505.

[45] M. O. H. N. A. Noureldien, “Block Spoofed Packets at Source(BSPS): A Method for Detecting and Preventing all Typesof Spoofed Source IP Packets and SYN Flooding Packets atSource: A Theoretical Framework,” in Second InternationalConference on the Applications of Digital Information andWeb Technologies. IEEE, Aug 2009, pp. 579–583.

[46] L. Kavisankar and C. Chellappan, “A Mitigation Model forTCP SYN Flooding with IP spoofing,” in International Con-ference on Recent Trends in Information Technology (ICRTIT).IEEE, June 2011, pp. 251–256.

21

Page 22: Amplification and DRDoS Attack Defense - arXiv · Amplification and DRDoS Attack Defense – A Survey and New Perspectives Fabrice J. Ryba, Matthew Orlinski, Matthias W¨ahlisch

[47] Y. Gilad and A. Herzberg, “LOT: A Defense Against IPSpoofing and Flooding Attacks,” ACM Trans. Inf. Syst. Secur.,vol. 15, no. 2, pp. 6:1–6:30, Jul. 2012.

[48] L. Kramer, J. Krupp, D. Makita, T. Nishizoe, T. Koide,K. Yoshioka, and C. Rossow, “AmpPot: Monitoring andDefending Amplification DDoS Attacks,” in Proceedings ofthe 18th International Symposium on Research in Attacks,Intrusions and Defenses, November 2015.

[49] M. Feily, A. Shahrestani, and S. Ramadass, “A Survey of Bot-net and Botnet Detection,” in Proceedings of the 2009 ThirdInternational Conference on Emerging Security Information,Systems and Technologies. IEEE, 2009.

[50] Praetox, “LOIC - A Network Stress Testing Application.”[Online]. Available: http://sourceforge.net/projects/loic/

[51] V. Jacobson, D. K. Smetters, J. D. Thornton, M. F. Plass, N. H.Briggs, and R. L. Braynard, “Networking Named Content,” inProceedings of the 5th International Conference on EmergingNetworking Experiments and Technologies. ACM, 2009, pp.1–12.

[52] T. Anderson, T. Roscoe, and D. Wetherall, “Preventing InternetDenial-of-service with Capabilities,” Computer Communica-tion Review, vol. 34, no. 1, pp. 39–44, 2004.

[53] X. Yang, D. Wetherall, and T. Anderson, “TVA: A DoS-limiting Network Architecture,” Networking, IEEE/ACMTransactions on, vol. 16, no. 6, pp. 1267–1280, 2008.

[54] J. Meseguer, “Rewriting Logic and Maude: A Wide-SpectrumSemantic Framework for Object-Based Distributed Systems,”in Formal Methods for Open Object-Based Distributed SystemsIV. Springer US, 2000, vol. 49, pp. 89–117.

[55] Valve, “Steam Master Server Query Protocol,” 2015.[Online]. Available: https://developer.valvesoftware.com/wiki/Master Server Query Protocol

[56] S. Kandula, D. Katabi, M. Jacob, and A. Berger, “Botz-4-sale: Surviving organized ddos attacks that mimic flashcrowds,” in Proceedings of the 2nd conference on Symposiumon Networked Systems Design & Implementation – Volume 2.USENIX Association, 2005, pp. 287–300.

[57] G. Oikonomou and J. Mirkovic, “Modeling human behaviorfor defense against flash-crowd attacks,” in IEEE InternationalConference on Communications. ICC’09. IEEE, 2009, pp. 1–6.

[58] R. Beverly and S. Bauer, “The Spoofer Project: Inferring theExtent of Source Address Filtering on the Internet,” USENIXSRUTI: Steps to Reducing Unwanted Traffic on the InternetWorkshop, pp. 53–59, Jul. 2005.

[59] D. Moore, C. Shannon, D. J. Brown, G. M. Voelker, andS. Savage, “Inferring Internet denial-of-service activity,” ACMTrans. Comput. Syst., vol. 24, no. 2, pp. 115–139, 2006.

[60] J. Mauch, “SNMP DDoS: The Vulnerability You Might NotKnow You Have,” http://seclists.org/nanog/2013/Aug/132, Au-gust 2013.

[61] L. T. Heberlein and M. Bishop, “Attack Class: AddressSpoofing,” in Proc. of the 19th National Information SystemsSecurity Conference, 1996, pp. 371–377.

[62] T. Dunigan, “Backtracking Spoofed Packets,” 2001. [Online].Available: http://www.epm.ornl.gov/∼dunigan/oci/back.ps

[63] L. Soon, M. Othman, and N. I. Udzir, “IP Spoofing Defense:An Introduction,” International Conference on Computing &Informatics (ICOCI09), 2009.

[64] T. Ehrenkranz and J. Li, “On the State of IP SpoofingDefense,” ACM Trans. Internet Technol., vol. 9, no. 2, pp.1–29, May 2009.

[65] A. Belenky and N. Ansari, “On ip traceback,” CommunicationsMagazine, IEEE, vol. 41, no. 7, pp. 142–153, 2003.

[66] A. John and T. Sivakumar, “DDoS: Survey of Traceback Meth-ods,” International Journal of Recent Trends in Engineering,vol. 1, no. 2, pp. 241–245, May 2009.

[67] S. Vincent and J. I. J. Raja, “A Survey of IP Traceback Mech-anisms to Overcome Denial-of-service Attacks,” Proceedingsof the 12th International Conference on Networking, VLSI andSignal Processing, pp. 93–98, 2010.

[68] R. Jain and P. A. Meshram, “A Survey on Packet Markingand Logging,” International Journal of Computer Science andInformation Technologies (IJCSIT), vol. 4, no. 3, pp. 426–429,2013.

[69] S. J. Templeton and K. E. Levitt, “Detecting Spoofed Packets,”in DARPA Information Survivability Conference and Exposi-tion, 2003, April 2003, pp. 164–175.

[70] H.-Y. Chang, R. Narayan, S. F. Wu, B. Vetter, X. Wang,M. Brown, J. Yuill, C. Sargor, Y. F. Jou, and F. Gong, “DecId-UouS: Decentralized Source Identification for Network-BasedIntrusions,” in Integrated Network Management. IEEE, 1999,pp. 701–714.

[71] S. Savage, D. Wetherall, A. R. Karlin, and T. E. Anderson,“Practical Network Support for IP Traceback,” in Proc. ofACM SIGCOMM. ACM, 2000, pp. 295–306.

[72] D. Schnackenberg, K. Djahandari, and D. Sterne, “Infras-tructure for Intrusion Detection and Response,” in DARPAInformation Survivability Conference and Exposition, vol. 2,2000, pp. 3–11.

[73] P. Ferguson and D. Senie, “Network Ingress Filtering: De-feating Denial of Service Attacks which employ IP SourceAddress Spoofing,” IETF, RFC 2827, May 2000.

[74] J. Mirkovic, N. Jevtic, and P. Reiher, “A Practical IP Spoof-ing Defense Through Route-Based Fltering,” University ofDelaware, CIS department, Technical Report, CIS-TR, 2006.

[75] A. Bremler-barr and H. Levy, “Spoofing Prevention Method,”in Proc. IEEE INFOCOM, 2005, pp. 536–547.

[76] K. Park and H. Lee, “On the Effectiveness of Route-basedPacket Filtering for Distributed DoS Attack Prevention inPower-law Internets,” ACM SIGCOMM Comput. Commun.Rev., vol. 31, no. 4, pp. 15–26, Aug. 2001.

[77] Z. D. X. Yuan and J. Chandrashekar, “Controlling IP Spoofingthrough Interdomain Packet Filters,” in Dependable and Se-cure Computing, IEEE Transactions on, vol. 5. IEEE, March2008, pp. 22–36.

[78] T. Ohtsuka, F. Nakamura, Y. Sekiya, and Y. Wakahara, “Pro-posal and Efficient Implementation of Detecting and FilteringMethod for IP Spoofed Packets,” in International Conferenceon Information and Communication Technology. IEEE,March 2007, pp. 327–330.

[79] J. Li, J. Mirkovic, T. Ehrenkranz, M. Wang, P. Reiher, andL. Zhang, “Learning the Valid Incoming Direction of IPPackets,” Computer Networks, vol. 52, no. 2, pp. 399–417,2008.

[80] C. A. Shue, M. Gupta, and M. P. Davy, “Packet Forwardingwith Source Verification,” Comput. Netw., vol. 52, no. 8, pp.1567–1582, Jun. 2008.

[81] H. Lee, M. Kwon, G. Hasker, and A. Perrig, “BASE: AnIncrementally Deployable Mechanism for Viable IP SpoofingPrevention,” in Proc. of the 2nd ACM ASIACCS. ACM, 2007,pp. 20–31.

[82] A. Yaar, A. Perrig, and D. X. Song, “Pi: A Path IdentificationMechanism to Defend against DDoS Attack,” in Proc. of IEEESymposium on Security and Privacy. IEEE, 2003.

22

Page 23: Amplification and DRDoS Attack Defense - arXiv · Amplification and DRDoS Attack Defense – A Survey and New Perspectives Fabrice J. Ryba, Matthew Orlinski, Matthias W¨ahlisch

[83] Cisco Systems, “Unicast Reverse Path Forwarding Enhance-ments For The Internet Service Provider — Internet ServiceProvider Network Edge,” Cisco, White Paper, 2005.

[84] G.-F. Lv and Z.-G. Sun, “Towards Spoofing Prevention Basedon Hierarchical Coordination Model,” in Proc. of Workshop onHigh Performance Switching and Routing (HPSR’07). IEEE,June 2007, pp. 1–6.

[85] H. Wang, C. Jin, and K. G. Shin, “Defense Against Spoofed IPTraffic Using Hop-count Filtering,” IEEE/ACM Trans. Netw.,vol. 15, no. 1, pp. 40–53, Feb. 2007.

[86] A. Yaar, A. Perrig, and D. Song, “StackPi: New PacketMarking and Filtering Mechanisms for DDoS and IP SpoofingDefense,” IEEE Journal on Selected Areas in Communications,vol. 24, no. 10, pp. 1853–1863, 2006.

[87] Z. Gao and N. Ansari, “A Practical and Robust Inter-domainMarking Scheme for IP Traceback,” Computer Networks,vol. 51, no. 3, pp. 732–750, 2007.

[88] R. Chen, J.-M. Park, and R. Marchany, “A Divide-and-Conquer Strategy for Thwarting Distributed Denial-of-ServiceAttacks,” Parallel and Distributed Systems, IEEE Transactionson, vol. 18, no. 5, pp. 577–588, May 2007.

[89] J. Wu, G. Ren, and X. Li, “Source Address Validation: Ar-chitecture and Protocol Design,” in Network Protocols, 2007.ICNP 2007. IEEE International Conference on. IEEE, 2007,pp. 276–283.

[90] D. Dean, M. K. Franklin, and A. Stubblefield, “An AlgebraicApproach to IP traceback,” ACM Trans. Inf. Syst. Secur., vol. 5,no. 2, pp. 119–137, 2002.

[91] G. Taleck, “Ambiguity Resolution via Passive OS Fingerprint-ing,” in Recent Advances in Intrusion Detection, ser. LectureNotes in Computer Science. Springer, 2003, vol. 2820, pp.192–206.

[92] M. Adler, “Trade-offs in Probabilistic Packet Marking for IPTraceback,” J. ACM, vol. 52, no. 2, pp. 217–244, Mar. 2005.

[93] Fyodor, “Remote OS Detection,” 2006. [Online]. Available:http://nmap.org/book/osdetect.html

[94] S. Kent and K. Seo, “Security Architecture for theInternet Protocol,” RFC 4301 (Proposed Standard), InternetEngineering Task Force, December 2005. [Online]. Available:http://www.ietf.org/rfc/rfc4301.txt

[95] R. Beverly, “A Robust Classifier for Passive TCP/IP Finger-printing,” in Proc. of 5th International Workshop on Passiveand Active Network Measurement (PAM). Heidelberg Berlin:Springer, 2004, pp. 158–167.

[96] G. Taleck, “Ambiguity Resolution via Passive OS Fingerprint-ing,” in Proc. of RAID. Springer, 2003, pp. 192–206.

[97] B. Berntein, “SYN Cookies,” 1996. [Online]. Available:http://cr.yp.to/syncookies.html

[98] W. Feng, E. Kaiser, W. Feng, and A. Luu, “Design andimplementation of network puzzles,” in INFOCOM 2005.24th Annual Joint Conference of the IEEE Computer andCommunications Societies. Proceedings IEEE, vol. 4, March2005, pp. 2372–2382 vol. 4.

[99] C. Jin, H. Wang, and K. G. Shin, “Hop-count Filtering: AnEffective Defense Against Spoofed DDoS Traffic,” in Proc. ofthe 10th ACM CCS. ACM, 2003, pp. 30–41.

[100] T. Killalea, “Recommended Internet Service Provider SecurityServices and Procedures,” RFC 3013 (Best Current Practice),Internet Engineering Task Force, Nov. 2000. [Online].Available: http://www.ietf.org/rfc/rfc3013.txt

[101] F. Baker, “Requirements for IP Version 4 Routers,” RFC1812 (Proposed Standard), Internet Engineering Task Force,

June 1995, updated by RFC 2644. [Online]. Available:http://www.ietf.org/rfc/rfc1812.txt

[102] F. Baker and P. Savola, “Ingress Filtering for MultihomedNetworks,” RFC 3704 (Best Current Practice), InternetEngineering Task Force, March 2004. [Online]. Available:http://www.ietf.org/rfc/rfc3704.txt

[103] X. Liu, A. Li, X. Yang, and D. Wetherall, “Passport: Secureand Adoptable Source Authentication,” in Proceedings of the5th USENIX Symposium on Networked Systems Design andImplementation. USENIX Association, 2008, pp. 365–378.

[104] J. Li, J. Mirkovic, M. Wang, P. Reiher, and L. Zhang, “SAVE:Source address validity enforcement protocol,” in IEEE IN-FOCOM, 2002, pp. 1557–1566.

[105] Z. Duan, X. Yuan, and J. Chandrashekar, “Constructing Inter-Domain Packet Filters to Control IP Spoofing Based on BGPUpdates,” in Proc. of IEEE INFOCOM, 2006, pp. 1–12.

[106] T. Ehrenkranz and J. Li, “An Incrementally Deployable Pro-tocol for Learning the Valid Icoming Direction of IP Packets,”University of Oregon, Tech. Rep., October 2007.

[107] R. Stone, “Centertrack: An IP Overlay Network for TrackingDoS Floods,” in Proc. of the 9th conference on USENIXSecurity Symposium. USENIX Association, 2000, pp. 15–15.

[108] H. Burch and B. Cheswick, “Tracing Anonymous Packets toTheir Approximate Source,” in Proc. of the 14th Conferenceon Systems Administration (LISA 2000). USENIX, December2000, pp. 319–327.

[109] S. Bellovin and M. Leech, “ICMP Traceback Messages,”February 2000. [Online]. Available: https://tools.ietf.org/html/draft-ietf-itrace-00

[110] S. Savage, D. Wetherall, A. Karlin, and T. Anderson, “NetworkSupport for IP Traceback,” IEEE/ACM Trans. Netw., vol. 9,no. 3, pp. 226–237, Jun. 2001.

[111] D. X. Song and A. Perrig, “Advanced and Authenticated Mark-ing Schemes for IP Traceback,” in Proc. of IEEE INFOCOM,vol. 2, 2001, pp. 878–886.

[112] A. Belenky and N. Ansari, “Accommodating Fragmentation inDeterministic Packet Marking for IP Traceback,” in Proceed-ings of IEEE Global Telecommunications Conference, 2003,pp. 1374–1378.

[113] A. C. Snoeren, C. Partridge, L. A. Sanchez, C. E. Jones,F. Tchakountio, B. Schwartz, S. T. Kent, and W. T.Strayer, “Single-packet IP traceback.” IEEE/ACM Trans.Netw., vol. 10, no. 6, pp. 721–734, 2002.

[114] Y. Xiang, W. Zhou, and M. Guo, “Flexible DeterministicPacket Marking: An IP Traceback System to Find the RealSource of Attacks,” IEEE Transactions on Parallel and Dis-tributed Systems, vol. 20, no. 4, pp. 567–580, April 2009.

[115] L. Zhang and Y. Guan, “TOPO: A Topology-aware SinglePacket Attack Traceback Scheme,” in Securecomm and Work-shops. IEEE Press, September 2006, pp. 1–10.

[116] S. Matsuda, T. Baba, A. Hayakawa, and T. Nakamura, “Designand Implementation of Unauthorized Access Tracing System,”in Proceedings of the 2002 Symposium on Applications andthe Internet. IEEE Computer Society, 2002, pp. 74–81.

[117] H. A. Alwis, R. C. Doss, P. S. Hewage, and M. U. Chowdhury,“Topology Based Packet Marking for IP Traceback,” in Proc.of the Australian Telecommunication Networks and Applica-tions Conference (ATNAC). University of Melbourne, 2006,pp. 224–228.

[118] C. Gong and K. Sarac, “A More Practical Approach for Single-Packet IP Traceback using Packet Logging and Marking ,” pp.1310–1324, 2008.

23

Page 24: Amplification and DRDoS Attack Defense - arXiv · Amplification and DRDoS Attack Defense – A Survey and New Perspectives Fabrice J. Ryba, Matthew Orlinski, Matthias W¨ahlisch

[119] T. W. Doeppner, P. N. Klein, and A. Koyfman, “Using RouterStamping to Identify the Source of IP Packets,” in Proc. of the7th ACM CCS. ACM, 2000, pp. 184–189.

[120] B. Al-Duwairi and M. Govindarasu, “Novel Hybrid SchemesEmploying Packet Marking and Logging for IP Traceback,”IEEE Trans. Parallel Distrib. Syst., vol. 17, no. 5, pp. 403–418, May 2006.

[121] A. C. Snoeren, C. Partridge, L. A. Sanchez, C. E. Jones,F. Tchakountio, S. T. Kent, and W. T. Strayer, “Hash-based IPTraceback,” ACM SIGCOMM Comput. Commun. Rev., vol. 31,no. 4, pp. 3–14, Aug. 2001.

[122] D. Yan, Y. Wang, S. Su, and F. Yang, “A Precise andPractical IP Traceback Technique Based on Packet Markingand Logging.” J. Inf. Sci. Eng., vol. 28, no. 3, pp. 453–470,2012.

[123] A. Belenky and N. Ansari, “IP Traceback With DeterministicPacket Marking,” IEEE Communications Letters, vol. 7, no. 4,pp. 162–164, April 2003.

[124] C. Gong and K. Sarac, “Toward a Practical Packet MarkingApproach for IP Traceback,” International Journal of NetworkSecurity, vol. 8, no. 3, pp. 271–281, 2009.

[125] M. T. Goodrich, “Probabilistic Packet Marking for Large-scaleIP Traceback,” IEEE/ACM Trans. Netw., vol. 16, no. 1, pp. 15–24, Feb. 2008.

[126] X.-J. Wang and X.-Y. Wang, “Topology-assisted DeterministicPacket Marking for IP Traceback,” The Journal of ChinaUniversities of Posts and Telecommunications, vol. 17, pp.116–121, April 2010.

[127] K. Park and H. Lee, “On the Effectiveness of ProbabilisticPacket Marking for IP Traceback under Denial of ServiceAttack,” pp. 338–347, 2001.

[128] T. Baba and S. Matsuda, “Tracing Network Attacks to TheirSources,” IEEE Internet Computing, vol. 6, no. 2, pp. 20–26,Mar. 2002.

[129] A. Mankin, D. Massey, C.-L. Wu, S. F. Wu, and L. Zhang, “OnDesign and Evaluation of ”Intention-Driven” ICMP Trace-back,” in Computer Communications and Networks, 2001.Proceedings. Tenth International Conference on. IEEE, 2001,pp. 159–165.

[130] S. Lee and C. Shields, “Challenges to Automated AttackTraceback,” IT Professional, vol. 4, no. 3, pp. 12–18, May2002.

[131] R. Beverly, “Spoofer project: State of ip spoofing,” November2014. [Online]. Available: http://spoofer.cmand.org/summary.php

[132] J. Postel, “Internet Protocol,” RFC 791 (Internet Standard),Internet Engineering Task Force, Sep. 1981, updated byRFCs 1349, 2474. [Online]. Available: http://www.ietf.org/rfc/rfc791.txt

[133] X. Lu, G. L, P. Zhu, and Y. Chen, “MASK: An EfficientMechanism to Extend Inter-domain IP Spoofing Preventions,”pp. 1745–1760, November 2008.

[134] G. Velmayil and S. Pannirselvam, “Detection and Removalof IP Spoofing through Extended-Inter Domain Packet FilterArchitecture,” International Journal of Computer Applications,vol. 49, no. 17, pp. 37–43, July 2012.

[135] F. Guo, J. Chen, and T. cker Chiueh, “Spoof Detection forPreventing DoS Attacks against DNS Servers,” in Proc. ofICDCS. IEEE, 2006.

[136] D. Kuptsov and A. Gurtov, “SAVAH: Source Address Val-idation with Host Identity Protocol,” in Proc. of the FirstInternational ICST Conference on Security and Privacy in Mo-bile Information and Communication Systems (MobiSec’09.Springer, 2009, pp. 190–201.

[137] A. Gurtov, Host Identity Protocol (HIP): Towards the SecureMobile Internet. John Wiley & Sons, 2008, vol. 21.

[138] R. Moskowitz and P. Nikander, “Host Identity Protocol(HIP) Architecture,” RFC 4423 (Informational), InternetEngineering Task Force, may 2006. [Online]. Available:http://www.ietf.org/rfc/rfc4423.txt

[139] H. Ishibashi, N. Yamai, K. Abe, and T. Matsuura, “A Pro-tection Method Against Unauthorized Access and AddressSpoofing for Open Network Access Systems,” in IEEE PacificRim Conference on Communications, Computers and signalProcessing, vol. 1. IEEE, 2001, pp. 10–13.

[140] J. M. Gonzalez, M. Anwar, and J. B. Joshi, “A Trust-basedApproach Against IP-spoofing Attacks,” in Ninth Annual Con-ference on Privacy, Security and Trust (PST 2011). IEEE,July 2011, pp. 63–70.

[141] M. O. H. Noureldien A. Noureldien, “Block Spoofed Packetsat Source (BSPS): A Method for Detecting and PreventingAll Types of Spoofed Source IP Packets and SYN FloodingPackets at Source: A Theoretical Framework,” InternationalJournal of Networks and Communications, vol. 2, no. 3, pp.33–37, 2012.

[142] C. Kreibich, A. Warfield, J. Crowcroft, S. Hand, and I. Pratt,“Using Packet Symmetry to Curtail Malicious Traffic,” inProceedings of the 4th Workshop on Hot Topics in Networks(Hotnets-VI), College Park, MD, USA, 2005.

[143] T. Korkmaz, C. Gong, K. Sara, and S. G. Dykes, “SinglePacket IP Traceback in AS-level Partial Deployment Scenario,”IJSN, pp. 95–108, 2007.

[144] M. Sung, J. Xu, J. Li, and L. Li, “Large-scale IP Tracebackin High-speed Internet: Practical Techniques and Information-theoretic Foundation,” IEEE/ACM Trans. Netw., vol. 16, no. 6,pp. 1253–1266, Dec. 2008.

[145] K. Egevang and P. Francis, “The IP Network AddressTranslator (NAT),” RFC 1631 (Informational), InternetEngineering Task Force, May 1994, obsoleted by RFC 3022.[Online]. Available: http://www.ietf.org/rfc/rfc1631.txt

[146] K. Ali, M. Zulkernine, and H. S. Hassanein, “Packet FilteringBased on Source Router Marking and Hop-Count,” in LCN.IEEE Computer Society, 2007, pp. 1061–1068.

[147] N. Arumugam and C. Venkatesh, “A Dynamic Method toDetect IP Spoofing on Data Network Using Ant Algorithm,”IOSR Journal of Engineering (IOSRJEN), vol. 2, october 2012.

[148] P. Ferguson and D. Senie, “Network Ingress Filtering:Defeating Denial of Service Attacks which employ IP SourceAddress Spoofing,” RFC 2267 (Informational), InternetEngineering Task Force, January 1998, obsoleted by RFC2827. [Online]. Available: http://www.ietf.org/rfc/rfc2267.txt

[149] K. Butler, T. Farley, P. Mcdaniel, and J. Rexford, “A surveyof BGP security issues and solutions,” AT&T Labs Research,2008.

[150] J. Israr, M. Guennoun, and H. T. Mouftah, “Mitigating IPSpoofing by Validating BGP Routes Updates,” InternationalJournal of Computer Science and Network Security (IJCSNS),vol. 9, no. 5, pp. 71–76, May 2009.

[151] C. L. Abad and R. I. Bonilla, “An Analysis on the Schemesfor Detecting and Preventing ARP Cache Poisoning Attacks,”in 27th International Conference on Distributed ComputingSystems Workshops. IEEE, 2007, pp. 60–60.

[152] W. Strayer, C. Jones, F. Tchakountio, A. Snoeren, B. Schwartz,R. Clements, M. Condell, and C. Partridge, “Traceback ofsingle IP packets using SPIE,” in DARPA Information Surviv-ability Conference and Exposition, 2003. Proceedings, vol. 2,April 2003, pp. 266–270.

24

Page 25: Amplification and DRDoS Attack Defense - arXiv · Amplification and DRDoS Attack Defense – A Survey and New Perspectives Fabrice J. Ryba, Matthew Orlinski, Matthias W¨ahlisch

[153] R. Shokri, A. Varshovi, H. Mohammadi, and N. Yazdani,“DDPM: Dynamic Deterministic Packet Marking for IP Trace-back,” in 14th IEEE International Conference on Networks,vol. 2. IEEE, September 2006, pp. 1–6.

[154] Q. Dong, M. Adler, S. Banerjee, and K. Hirata, “EfficientProbabilistic Packet Marking,” in 13th IEEE ICNP. IEEE,November 2005.

[155] B. Duwairi, A. Chakrabarti, and G. Manimaran, “An EfficientProbabilistic Packet Marking Scheme for IP Traceback,” pp.1263–1269, November 2004.

[156] A. Belenky and N. Ansari, “On Deterministic Packet Mark-ing,” Comput. Netw., vol. 51, no. 10, pp. 2677–2700, Jul. 2007.

[157] Z. Chen and M.-C. Lee, “An IP Traceback Technique AgainstDenial-of-service Attacks,” in Computer Security ApplicationsConference, 2003. Proceedings. 19th Annual, Dec 2003, pp.96–104.

[158] H. C. J. Lee, V. L. L. Thing, Y. Xu, and M. Ma, “ICMPTraceback with Cumulative Path, an Efficient Solution forIP Traceback,” in Proc. of Information and CommunicationsSecurity, 5th International Conference, ICICS, vol. 2836.Springer, 2003, pp. 124–135.

[159] H.-W. Lee, M.-G. Kang, and C.-W. Choi, “PTrace: Push-back/SVM Based ICMP Traceback Mechanism against DDoSAttack,” in Computational Science and Its Applications -ICCSA 2004, vol. 3043. Springer, 2004, pp. 302–309.

[160] B.-T. Wang and H. Schulzrinne, “An IP Traceback Mechanismfor Reflective DoS Attacks,” in Canadian Conference onElectrical and Computer Engineering, vol. 2, May 2004, pp.901–904.

[161] R. Feiertag, C. Kahn, P. Porras, D. Schnackenberg,S. Staniford-Chen, and B. Tung, “A Common Intrusion Spec-ification Language (CISL),” 1999.

[162] R. Atkinson, “Security Architecture for the Internet Protocol,”IETF, RFC 1825, August 1995.

[163] S. Kent, “IP Authentication Header,” IETF, RFC 4302, De-cember 2005.

[164] ——, “IP Encapsulating Security Payload (ESP),” IETF, RFC4303, December 2005.

[165] V. Santiraveewan and Y. Permpoontanalarp, “A Graph-basedMethodology for Analyzing IP Spoofing Attack,” in Proc. ofthe 18th International Conference on Advanced InformationNetworking and Applications, ser. AINA ’04. IEEE ComputerSociety, 2004.

[166] W. Wei, F. Chen, Y. Xia, and G. Jin, “A Rank CorrelationBased Detection against Distributed Reflection DoS Attacks,”Communications Letters, IEEE, vol. 17, no. 1, pp. 173–175,January 2013.

[167] G. Kambourakis, T. Moschos, D. Geneiatakis, and S. Gritzalis,“Detecting DNS Amplification Attacks,” in Workshop on Crit-ical Information Infrastructures Security (CRITIS), vol. 5141.Springer, 2008, pp. 185–196.

[168] S. Di Paola and D. Lombardo, “Protecting Against DNSReflection Attacks with Bloom Filters,” in Proceedings ofthe 8th International Conference on Detection of Intrusionsand Malware, and Vulnerability Assessment, ser. DIMVA’11.Springer-Verlag, 2011, pp. 1–16.

[169] H. Tsunoda, Y. Nemoto, K. Ohta, and A. Yamamoto, “ASimple Response Packet Confirmation Method for DRDoSDetection,” in Proc. of the 8th International Conference onAdvanced Communication Technology (ICACT 2006), vol. 3.IEEE Press, February 2006.

[170] H. Tsunoda, K. Ohta, A. Yamamoto, N. Ansari, Y. Waizumi,and Y. Nemoto, “Detecting DRDoS Attacks by a Simple Re-

sponse Packet Confirmation Mechanism,” Comput. Commun.,vol. 31, no. 14, pp. 3299–3306, Sep. 2008.

[171] T. Peng, C. Leckie, and K. Ramamohanarao, “Protectionfrom Distributed Denial of Service Attacks Using History-based IP Filtering,” in Communications, 2003. ICC’03. IEEEInternational Conference on, vol. 1. IEEE, 2003, pp. 482–486.

[172] J. Mirkovic, G. Prier, and P. Reiher, “Attacking DDoS at theSource,” in Network Protocols, 2002. Proceedings. 10th IEEEInternational Conference on. IEEE, 2002, pp. 312–321.

[173] ——, “Source-end DDoS Defense,” in Second IEEE Interna-tional Symposium on Network Computing and Applications.NCA 2003. IEEE, 2003, pp. 171–178.

[174] T. M. Gil and M. Poletto, “MULTOPS: A Data-structure forBandwidth Attack Detection,” in USENIX Security Sympo-sium, 2001.

[175] S. Abdelsayed, D. Glimsholt, C. Leckie, S. Ryan, andS. Shami, “An Efficient Filter for Denial-of-Service BandwidthAttacks,” in Global Telecommunications Conference, 2003.GLOBECOM’03. IEEE, vol. 3. IEEE, 2003, pp. 1353–1357.

[176] T. Peng, C. Leckie, and K. Ramamohanarao, “DetectingReflector Attacks by Sharing Beliefs,” in Proc. of IEEEGLOBECOM, 2003, pp. 1358–1362.

[177] Y. Kim, W. C. Lau, M. C. Chuah, and H. J. Chao, “Pack-etScore: A Statistics-Based Packet Filtering Scheme AgainstDistributed Denial-of-Service Attacks,” Dependable and Se-cure Computing, IEEE Transactions on, vol. 3, no. 2, pp. 141–155, 2006.

[178] D. Huistra, “Detecting Reflection Attacks in DNS Flows,” in19th Twente Student Conference on IT, February 2013.

[179] R. Mahajan, S. M. Bellovin, S. Floyd, J. Ioannidis, V. Paxson,and S. Shenker, “Controlling High Bandwidth Aggregatesin the Network,” Computer Communication Review, vol. 32,no. 3, pp. 62–73, 2002.

[180] D. K. Yau, J. Lui, F. Liang, and Y. Yam, “Defending AgainstDistributed Denial-of-Service Attacks with Max-Min FairServer-Centric Router Throttles,” Transactions on Networking(TON), vol. 13, no. 1, pp. 29–42, 2005.

[181] R. Chen and J.-M. Park, “Attack Diagnosis: ThrottlingDistributed Denial-of-Service Attacks Close to the AttackSources,” in Proceedings. 14th International Conference onComputer Communications and Networks. IEEE, 2005, pp.275–280.

[182] R. Chen, J.-M. Park, and R. Marchany, “TRACK: A Novel Ap-proach for Defending Against Distributed Denial-of-ServiceAttacks,” Technical Report TR ECEO6-02. Dept. of Electricaland Computer Engineering, Virginia Tech, 2006.

[183] N. Fultz and J. Grossklags, “Blue Versus Red: Towards aModel of Distributed Security Attacks,” in Financial Cryp-tography and Data Security. Springer, 2009, pp. 167–183.

[184] C. Fachkha, E. Bou-Harb, and M. Debbabi, “Towards a Fore-casting Model for Distributed Denial of Service Activities,” in12th IEEE International Symposium on Network Computingand Applications (NCA), August 2013, pp. 110–117.

[185] ——, “Fingerprinting Internet DNS Amplification DDoS Ac-tivities,” in 6th International Conference on New Technologies,Mobility and Security (NTMS), March 2014, pp. 1–5.

[186] ——, “Inferring Distributed Reflection Denial of Service At-tacks from Darknet,” Computer Communications, vol. 62, pp.59 – 71, 2015.

[187] S. Yu, W. Zhou, W. Jia, S. Guo, Y. Xiang, and F. Tang, “Dis-criminating DDoS Attacks from Flash Crowds Using FlowCorrelation Coefficient,” Parallel and Distributed Systems,IEEE Transactions on, vol. 23, no. 6, pp. 1073–1080, 2012.

25

Page 26: Amplification and DRDoS Attack Defense - arXiv · Amplification and DRDoS Attack Defense – A Survey and New Perspectives Fabrice J. Ryba, Matthew Orlinski, Matthias W¨ahlisch

[188] C. Dietzel, A. Feldmann, and T. King, “Blackholing at IXPs:On the Effectiveness of DDoS Mitigation in the Wild,” inProceedings of PAM 2016, ser. LCNS, T. Karagiannis andX. Dimitropoulos, Eds., vol. 9631. Springer, 2016, pp. 319–332.

[189] J. Mirkovic, M. Robinson, and P. Reiher, “Alliance Formationfor DDoS Defense,” in Proceedings of the 2003 workshop onNew security paradigms. ACM, 2003, pp. 11–18.

[190] J. Czyz, M. Kallitsis, M. Gharaibeh, C. Papadopoulos, M. Bai-ley, and M. Karir, “Taming the 800 pound gorilla: The rise

and decline of ntp ddos attacks,” in Proceedings of the 2014Conference on Internet Measurement Conference. ACM,2014, pp. 435–448.

[191] The Shadowserver Foundation, April 2015. [Online].Available: https://dnsscan.shadowserver.org/

[192] The Measurement Factory, April 2015. [Online]. Available:http://dns.measurement-factory.com

[193] Network Time Foundation, April 2015. [Online]. Available:http://openntpproject.org/

26