Download presentation
Presentation is loading. Please wait.
Published byErnest Parker Modified over 9 years ago
1
DDoS Defense: Utilizing P2P architecture By Joshua Aslan Smith
2
Overview ● Anatomy of a DDoS attack ● Example DDoS attack ● Cost of DDoS attacks ● Current State of DDoS defense ● Proposed System ● Financial Analysis
3
Anatomy of a DDoS Attack ● DDoS = Distributed Denial of Service ● Goal of attack: Deny legitimate users access
4
Anatomy of a DDoS Attack ● Attacker can be anyone: hacktivist, business competitor, military or script kiddie. ● Botnets can be rented for 9 dollars an hour or 70 dollars a day ● Freeware applications allow anyone ● to participate or launch an attack.
5
Anatomy of a DDoS attack
6
Example of a DDoS Attack ● SYN floods rely on the trusting nature of the SYN → SYN-ACK → ACK handshake. ● A malicious attacker sends SYN requests, but does not send ACK after getting SYN-ACK ● System resources are tied up by malicious requests, leaving none for legitimate users.
7
Cost of DDoS Attacks 2012 Survey on costs of DDoS Attacks.
8
Current State of DDoS Defense ● Based on victim network. ● Largely Autonomus. ● Passive Defenses: Firewalls and Protocol filtering. ● Reactive Defenses: Rate-Limiting, Filtering
9
Proposed System ● P2P architecture based. ● Wide deployment (edge networks and intermediate networks. ● Incorporate pattern and anomaly detection into system and share information between peers and regional databases ● Utilize Pushback actively stop DDoS attack streams.
10
Proposed System ● Pushback: A node sends out a message identifying the malicious packets and sends it to any nodes 1 hop away that are delivering the packets. ● Those nodes start dropping the packets and also send out a message advising the nodes in the next hop to do the same.
11
Limitations ● Would require a very wide adoption for both the pushback mechanism and the sharing of anomaly and pattern detection data to be successful. ● Adoption by intermediate networks may not happen as there is little incentive for them to do so. ● Source networks even less likely to adopt, limiting pushback capability.
12
Financial Analysis ● Cyber Security 63 billion dollars in 2011 a projected CAGR of 11.3% between 2012 and 2017 ● Increase in ease of attacks means attacks more likely to occur and security against DDoS attacks needs to be invested in. ● Attacks can cost up to 4.5 billion on average and result in a loss of 3.7% of customers
13
Questions?
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.