A moving target defense approach to mitigate DDoS attacks against proxy-based architectures
Title | A moving target defense approach to mitigate DDoS attacks against proxy-based architectures |
Publication Type | Conference Paper |
Year of Publication | 2016 |
Authors | Venkatesan, S., Albanese, M., Amin, K., Jajodia, S., Wright, M. |
Conference Name | 2016 IEEE Conference on Communications and Network Security (CNS) |
Date Published | oct |
Publisher | IEEE |
ISBN Number | 978-1-5090-3065-1 |
Keywords | attacker reconnaissance effort, client remapping, client shuffling, client-to-proxy assignment strategy, Communication networks, Computer crime, computer network security, Conferences, DDoS attack mitigation, distributed denial of service attacks, end users, high-profile targets, IP networks, malicious client discovery, malicious client isolation, moving target defense approach, Network reconnaissance, proxy harvesting attack, proxy-based architectures, pubcrawl, Relays, Resiliency, Servers, target services |
Abstract | Distributed Denial of Service attacks against high-profile targets have become more frequent in recent years. In response to such massive attacks, several architectures have adopted proxies to introduce layers of indirection between end users and target services and reduce the impact of a DDoS attack by migrating users to new proxies and shuffling clients across proxies so as to isolate malicious clients. However, the reactive nature of these solutions presents weaknesses that we leveraged to develop a new attack - the proxy harvesting attack - which enables malicious clients to collect information about a large number of proxies before launching a DDoS attack. We show that current solutions are vulnerable to this attack, and propose a moving target defense technique consisting in periodically and proactively replacing one or more proxies and remapping clients to proxies. Our primary goal is to disrupt the attacker's reconnaissance effort. Additionally, to mitigate ongoing attacks, we propose a new client-to-proxy assignment strategy to isolate compromised clients, thereby reducing the impact of attacks. We validate our approach both theoretically and through simulation, and show that the proposed solution can effectively limit the number of proxies an attacker can discover and isolate malicious clients. |
URL | http://ieeexplore.ieee.org/document/7860486/ |
DOI | 10.1109/CNS.2016.7860486 |
Citation Key | venkatesan_moving_2016 |
- IP networks
- target services
- Servers
- Resiliency
- Relays
- pubcrawl
- proxy-based architectures
- proxy harvesting attack
- Network reconnaissance
- moving target defense approach
- malicious client isolation
- malicious client discovery
- attacker reconnaissance effort
- high-profile targets
- end users
- distributed denial of service attacks
- DDoS attack mitigation
- Conferences
- computer network security
- Computer crime
- Communication networks
- client-to-proxy assignment strategy
- client shuffling
- client remapping