Cargando…

RAPT: A Robust Attack Path Tracing Algorithm to Mitigate SYN-Flood DDoS Cyberattacks

In the recent past, Distributed Denial of Service (DDoS) attacks have become more abundant and present one of the most serious security threats. In a DDoS attack, the attacker controls a botnet of daemons residing in vulnerable hosts that send a significant amount of traffic to flood the victim or t...

Descripción completa

Detalles Bibliográficos
Autores principales: AlArnaout, Zakwan, Mostafa, Nour, Alabed, Samer, Aly, Wael Hosny Fouad, Shdefat, Ahmed
Formato: Online Artículo Texto
Lenguaje:English
Publicado: MDPI 2022
Materias:
Acceso en línea:https://www.ncbi.nlm.nih.gov/pmc/articles/PMC9824135/
https://www.ncbi.nlm.nih.gov/pubmed/36616700
http://dx.doi.org/10.3390/s23010102
_version_ 1784866334689984512
author AlArnaout, Zakwan
Mostafa, Nour
Alabed, Samer
Aly, Wael Hosny Fouad
Shdefat, Ahmed
author_facet AlArnaout, Zakwan
Mostafa, Nour
Alabed, Samer
Aly, Wael Hosny Fouad
Shdefat, Ahmed
author_sort AlArnaout, Zakwan
collection PubMed
description In the recent past, Distributed Denial of Service (DDoS) attacks have become more abundant and present one of the most serious security threats. In a DDoS attack, the attacker controls a botnet of daemons residing in vulnerable hosts that send a significant amount of traffic to flood the victim or the network infrastructure. In this paper, a common type of DDoS attacks known as “TCP SYN-Flood” is studied. This type of attack uses spoofed Internet Protocol (IP) addresses for SYN packets by exploiting the weakness in Transmission Control Protocol (TCP) 3-Way handshake used by the TCP/IP suite of protocols, which make the web servers unreachable for legitimate users or even worse, it might lead to server crash. In this paper, a resilient, efficient, lightweight, and robust IP traceback algorithm is proposed using an IP tracing packet for each attack path. The proposed algorithm suggests that edge routers—where the attack starts from—observe the traffic pattern passing through, and if the observed traffic carries the signature of TCP SYN-Flood DDoS attack and a high percentage of it is destined to a particular web server(s), it starts the tracing process by generating an IP trace packet, which accompanies the attack path recording the routers’ IP addresses on the path between the attacker/daemon and the victim, which can extract the path and react properly upon receiving it by discarding any SYN packets originating from that attacker/daemon. To our knowledge, this is the first research that efficiently traces these kinds of attacks while they are running. The proposed solution has low computation and message overhead, efficient detection and tracing time, and converges in near optimal time. The results are validated using extensive simulation runs.
format Online
Article
Text
id pubmed-9824135
institution National Center for Biotechnology Information
language English
publishDate 2022
publisher MDPI
record_format MEDLINE/PubMed
spelling pubmed-98241352023-01-08 RAPT: A Robust Attack Path Tracing Algorithm to Mitigate SYN-Flood DDoS Cyberattacks AlArnaout, Zakwan Mostafa, Nour Alabed, Samer Aly, Wael Hosny Fouad Shdefat, Ahmed Sensors (Basel) Article In the recent past, Distributed Denial of Service (DDoS) attacks have become more abundant and present one of the most serious security threats. In a DDoS attack, the attacker controls a botnet of daemons residing in vulnerable hosts that send a significant amount of traffic to flood the victim or the network infrastructure. In this paper, a common type of DDoS attacks known as “TCP SYN-Flood” is studied. This type of attack uses spoofed Internet Protocol (IP) addresses for SYN packets by exploiting the weakness in Transmission Control Protocol (TCP) 3-Way handshake used by the TCP/IP suite of protocols, which make the web servers unreachable for legitimate users or even worse, it might lead to server crash. In this paper, a resilient, efficient, lightweight, and robust IP traceback algorithm is proposed using an IP tracing packet for each attack path. The proposed algorithm suggests that edge routers—where the attack starts from—observe the traffic pattern passing through, and if the observed traffic carries the signature of TCP SYN-Flood DDoS attack and a high percentage of it is destined to a particular web server(s), it starts the tracing process by generating an IP trace packet, which accompanies the attack path recording the routers’ IP addresses on the path between the attacker/daemon and the victim, which can extract the path and react properly upon receiving it by discarding any SYN packets originating from that attacker/daemon. To our knowledge, this is the first research that efficiently traces these kinds of attacks while they are running. The proposed solution has low computation and message overhead, efficient detection and tracing time, and converges in near optimal time. The results are validated using extensive simulation runs. MDPI 2022-12-22 /pmc/articles/PMC9824135/ /pubmed/36616700 http://dx.doi.org/10.3390/s23010102 Text en © 2022 by the authors. https://creativecommons.org/licenses/by/4.0/Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
spellingShingle Article
AlArnaout, Zakwan
Mostafa, Nour
Alabed, Samer
Aly, Wael Hosny Fouad
Shdefat, Ahmed
RAPT: A Robust Attack Path Tracing Algorithm to Mitigate SYN-Flood DDoS Cyberattacks
title RAPT: A Robust Attack Path Tracing Algorithm to Mitigate SYN-Flood DDoS Cyberattacks
title_full RAPT: A Robust Attack Path Tracing Algorithm to Mitigate SYN-Flood DDoS Cyberattacks
title_fullStr RAPT: A Robust Attack Path Tracing Algorithm to Mitigate SYN-Flood DDoS Cyberattacks
title_full_unstemmed RAPT: A Robust Attack Path Tracing Algorithm to Mitigate SYN-Flood DDoS Cyberattacks
title_short RAPT: A Robust Attack Path Tracing Algorithm to Mitigate SYN-Flood DDoS Cyberattacks
title_sort rapt: a robust attack path tracing algorithm to mitigate syn-flood ddos cyberattacks
topic Article
url https://www.ncbi.nlm.nih.gov/pmc/articles/PMC9824135/
https://www.ncbi.nlm.nih.gov/pubmed/36616700
http://dx.doi.org/10.3390/s23010102
work_keys_str_mv AT alarnaoutzakwan raptarobustattackpathtracingalgorithmtomitigatesynfloodddoscyberattacks
AT mostafanour raptarobustattackpathtracingalgorithmtomitigatesynfloodddoscyberattacks
AT alabedsamer raptarobustattackpathtracingalgorithmtomitigatesynfloodddoscyberattacks
AT alywaelhosnyfouad raptarobustattackpathtracingalgorithmtomitigatesynfloodddoscyberattacks
AT shdefatahmed raptarobustattackpathtracingalgorithmtomitigatesynfloodddoscyberattacks