Presentation is loading. Please wait.

Presentation is loading. Please wait.

DDoS Defense: Utilizing P2P architecture By Joshua Aslan Smith.

Similar presentations


Presentation on theme: "DDoS Defense: Utilizing P2P architecture By Joshua Aslan Smith."— Presentation transcript:

1 DDoS Defense: Utilizing P2P architecture By Joshua Aslan Smith

2 Overview ● Anatomy of a DDoS attack ● Example DDoS attack ● Cost of DDoS attacks ● Current State of DDoS defense ● Proposed System ● Financial Analysis

3 Anatomy of a DDoS Attack ● DDoS = Distributed Denial of Service ● Goal of attack: Deny legitimate users access

4 Anatomy of a DDoS Attack ● Attacker can be anyone: hacktivist, business competitor, military or script kiddie. ● Botnets can be rented for 9 dollars an hour or 70 dollars a day ● Freeware applications allow anyone ● to participate or launch an attack.

5 Anatomy of a DDoS attack

6 Example of a DDoS Attack ● SYN floods rely on the trusting nature of the SYN → SYN-ACK → ACK handshake. ● A malicious attacker sends SYN requests, but does not send ACK after getting SYN-ACK ● System resources are tied up by malicious requests, leaving none for legitimate users.

7 Cost of DDoS Attacks 2012 Survey on costs of DDoS Attacks.

8 Current State of DDoS Defense ● Based on victim network. ● Largely Autonomus. ● Passive Defenses: Firewalls and Protocol filtering. ● Reactive Defenses: Rate-Limiting, Filtering

9 Proposed System ● P2P architecture based. ● Wide deployment (edge networks and intermediate networks. ● Incorporate pattern and anomaly detection into system and share information between peers and regional databases ● Utilize Pushback actively stop DDoS attack streams.

10 Proposed System ● Pushback: A node sends out a message identifying the malicious packets and sends it to any nodes 1 hop away that are delivering the packets. ● Those nodes start dropping the packets and also send out a message advising the nodes in the next hop to do the same.

11 Limitations ● Would require a very wide adoption for both the pushback mechanism and the sharing of anomaly and pattern detection data to be successful. ● Adoption by intermediate networks may not happen as there is little incentive for them to do so. ● Source networks even less likely to adopt, limiting pushback capability.

12 Financial Analysis ● Cyber Security 63 billion dollars in 2011 a projected CAGR of 11.3% between 2012 and 2017 ● Increase in ease of attacks means attacks more likely to occur and security against DDoS attacks needs to be invested in. ● Attacks can cost up to 4.5 billion on average and result in a loss of 3.7% of customers

13 Questions?


Download ppt "DDoS Defense: Utilizing P2P architecture By Joshua Aslan Smith."

Similar presentations


Ads by Google