Visible to the public Defense Against SYN Flood DoS Attacks Using Network-based Mitigation Techniques

TitleDefense Against SYN Flood DoS Attacks Using Network-based Mitigation Techniques
Publication TypeConference Paper
Year of Publication2021
AuthorsGoldschmidt, Patrik, Kučera, Jan
Conference Name2021 IFIP/IEEE International Symposium on Integrated Network Management (IM)
Date PublishedMay 2021
PublisherIEEE
ISBN Number978-3-903176-32-4
Keywordscomposability, DDoS attack mitigation, ddos mitigation, Human Behavior, Internet, Memory management, Metrics, Operating systems, performance evaluation, Probabilistic logic, pubcrawl, resilience, Resiliency, RST Cookies, security, SYN Drop, TCP Handshaker, TCP SYN Authentication, TCP SYN flood, Throughput
Abstract

TCP SYN Flood is one of the most widespread DoS attack types performed on computer networks nowadays. As a possible countermeasure, we implemented and deployed modified versions of three network-based mitigation techniques for TCP SYN authentication. All of them utilize the TCP three-way handshake mechanism to establish a security association with a client before forwarding its SYN data. These algorithms are especially effective against regular attacks with spoofed IP addresses. However, our modifications allow deflecting even more sophisticated SYN floods able to bypass most of the conventional approaches. This comes at the cost of the delayed first connection attempt, but all subsequent SYN segments experience no significant additional latency (\textbackslashtextless; 0.2ms). This paper provides a detailed description and analysis of the approaches, as well as implementation details with enhanced security tweaks. The discussed implementations are built on top of the hardware-accelerated FPGA-based DDoS protection solution developed by CESNET and are about to be deployed in its backbone network and Internet exchange point at NIX.CZ.

URLhttps://ieeexplore.ieee.org/abstract/document/9463949
Citation Keygoldschmidt_defense_2021