Visible to the public Stellar: Network Attack Mitigation Using Advanced Blackholing

TitleStellar: Network Attack Mitigation Using Advanced Blackholing
Publication TypeConference Paper
Year of Publication2018
AuthorsDietzel, Christoph, Wichtlhuber, Matthias, Smaragdakis, Georgios, Feldmann, Anja
Conference NameProceedings of the 14th International Conference on Emerging Networking EXperiments and Technologies
PublisherACM
Conference LocationNew York, NY, USA
ISBN Number978-1-4503-6080-7
KeywordsBGP, blackholing, composability, DDoS, DDoS attack mitigation, ddos mitigation, Human Behavior, IXP, MANET Attack Mitigation, Metrics, pubcrawl, Resiliency
Abstract

Network attacks, including Distributed Denial-of-Service (DDoS), continuously increase in terms of bandwidth along with damage (recent attacks exceed 1.7 Tbps) and have a devastating impact on the targeted companies/governments. Over the years, mitigation techniques, ranging from blackholing to policy-based filtering at routers, and on to traffic scrubbing, have been added to the network operator's toolbox. Even though these mitigation techniques provide some protection, they either yield severe collateral damage, e.g., dropping legitimate traffic (blackholing), are cost-intensive, or do not scale well for Tbps level attacks (ACL filtering, traffic scrubbing), or require cooperation and sharing of resources (Flowspec). In this paper, we propose Advanced Blackholing and its system realization Stellar. Advanced blackholing builds upon the scalability of blackholing while limiting collateral damage by increasing its granularity. Moreover, Stellar reduces the required level of cooperation to enhance mitigation effectiveness. We show that fine-grained blackholing can be realized, e.g., at a major IXP, by combining available hardware filters with novel signaling mechanisms. We evaluate the scalability and performance of Stellar at a large IXP that interconnects more than 800 networks, exchanges more than 6 Tbps traffic, and witnesses many network attacks every day. Our results show that network attacks, e.g., DDoS amplification attacks, can be successfully mitigated while the networks and services under attack continue to operate untroubled.

URLhttp://doi.acm.org/10.1145/3281411.3281413
DOI10.1145/3281411.3281413
Citation Keydietzel_stellar:_2018