
determine the traffic source and path by using the
ICMP messages.
This paper addresses the third and last problem. The
problem can be thought of as the typical queuing
discipline problem in network router. The core of the
queuing discipline problem is to determine which
packets get transmitted and which packets get
discarded. There have been proposed many queuing
algorithms (S. Keshav, 1997) such as FIFO: First-In-
First-Out, FQ (Fair Queuing), RED (Random Early
Detection), and so on. Those queuing algorithms
cannot be used as a solution for the problem. For
example, RED has a merit that the more packets sent
by a flow, the higher the chance that its packets will
be selected for dropping. But, RED also has a
disadvantage that the more increase the volume of
malicious user's traffic, the higher the probability
that legitimate user's packet will be dropped because
DDoS attacker can generate a huge volume of traffic.
(F. Lau et al, 2000) recommended CBQ as the
queuing algorithm that can protect legitimate user
from DDoS attack. Using CBQ requires
classification of traffic into each class. But, they
didn't handle the problem.
There has been proposed static rate limit that blocks
(or marks) packets exceeding a threshold (Cisco,
2000). This strategy is available only in DoS attack
and also has a disadvantage that amount of packets
during normal state should be first measured to fix
the correct threshold value for limiting malicious
traffic.
Yau has proposed max-min fair server-centric router
throttle scheme (D.K.Y. Yau et al, 2002). The key
idea is for a server under stress to install a router
throttle (e.g. leaky-bucket) at selected upstream
routers. The scheme can defeat DDoS traffic by
controlling the router throttle. Mahajan has proposed
a mechanism for detecting and controlling high
bandwidth aggregates (R. Mahajan et al, 2002).
They've researched recursive pushback of max-min
fair rate limits starting from the target server to
upstream routers. Both throttle and pushback
mechanisms are likely to have a weak point in
determining the threshold value for rate-limiting
DDoS traffic and in requiring a new protocol for
communication between victim and routers.
6 CONCLUSIONS
In this paper, we proposed a strong congestion-
making traffic control scheme for preventing
malicious or selfish user from congesting networks.
Its key idea is to drop only packets corresponding to
congestion-making traffic when network congestion
occurs by providing congestion-making traffic with
worse service (i.e., worse priority queue) than the
normal traffic. We simulated the proposed scheme
and the existing schemes to evaluate the
performance of each scheme. The simulation results
demonstrate that the proposed scheme is better than
or almost same as the existing schemes in
performance.
Even if our scheme is able to control congestion-
making traffic effectively, we still need more
research in analysing the attack traffic of malicious
user in order to detect real congestion-making traffic
generated by malicious user. We introduced IDA
(Intrusion Detection Agent) in this paper. We think
IDA will play an important role in defeating various
kinds of attacks such as virus and worm, needlessly
to say DoS attacks
Our future work is to implement and evaluate our
scheme on real networks.
REFERENCES
S. Floyd, “TCP and explicit congestion notification,”
ACM Computer Communication Review, vol. 24, no.
5, pp. 8.23, October 1994
K. J. Houle and G. M. Weaver. "Trends in Denial of
Service Attack Technology," The fall 2001 NANOG
meeting, Oct. 2001
X. Geng and A. B. Whinston, "Defeating Distributed
Denial of Service Attacks", IT Pro, July-August 2000,
pp 36-41
Cisco, "Strategies to Protect Against Distributed Denial of
Service (DDoS) Attacks," white paper,
http://www.cisco.com/…/newsflash.html, Feb. 2000.
R. Mahajan, S. M. Bellovin, S. Floyd, and et al.,
"Controlling High Bandwidth Aggregates in the
Network," ACM SIGCOMM Computer
Communications Review, Vol. 32, No. 3, pp. 62-73,
July 2002.
P. Ferguson and D. Senie, "Network Ingress Filtering:
Defeating Denial of Service Attacks which employ IP
Source Address Spoofing," RFC 2827, May 2000.
Cisco, "Unicast Reverse Path Forwarding (uRPF)
Enhancements for the ISP-ISP Edge", http://www.
cisco.com/…/uRPF_Enhancement.pdf, Feb. 2001.
T. Li and Y. Rekhter "A Provider Architecture for
Differentialted Services and Traffic Engineering
(PASTE)". RFC 2430. October 1998.
K. Nichols,S. Blake, F. Baker and D. Black, "Definition of
the Differentiated Services Field (DS Field) in the
IPv4 and IPv6 Headers," RFC 2474
ICETE 2004 - SECURITY AND RELIABILITY IN INFORMATION SYSTEMS AND NETWORKS
28