You are on page 1of 3

International Journal of Emerging Trends & Technology in Computer Science (IJETTCS)

Web Site: www.ijettcs.org Email: editor@ijettcs.org


Volume 3, Issue 6, November-December 2014 ISSN 2278-6856

Study of Low Rate Denial of Service (LDoS)


attacks on Random Early Detection (RED)
Prashant Viradiya1, Divyarajsinh Vaghela2 and Dharmesh Dhangar3
1
Lecturer, Computer Science & Engineering, Parul Institute of Engineering & Technology,Vadodara,India.
2
Assistant Professor, Computer Science & Engineering, Parul Institute of Engineering & Technology,Vadodara,India.
3
Assistant Professor, Computer Science & Engineering, Parul Institute of Engineering & Technology,Vadodara,India.

Abstract attackers. Thus it is very difficult to identify an LDoS


RED Active Queue Management is designed to avoid attack. LDoS attack is also called Shrew attack [1] or
congestion by controlling the average queue size. However a sledgehammer attack [2]. (Shrew is a small mouse like
malicious flow cannot be identified. And it enables potential mammal but has a long-snout and venom which is able to
network-layer attacks, e.g. the flooding Denial-of-Service kill larger animals). (Sledge hammer can exert more force
(DoS) attack and the low-rate DoS attack. LDoS attack is very compared to other hammers and the force is distributed
difficult to identify because the average rate of packet sending over large area).
will be very low. This is achieved by sending large amount of
packets for a very short duration and repeating this process in
regular intervals. This paper analyzes the effect of LDoS
attack on RED and compares the existing prevention
methods.
Keywords:- Random Early Detection Queue, Low Rate
Denial of Service Attack, TCP, Retransmission timeout
1.Introduction
In wired networks, if the packet transmission rate crosses
the capacity of links, congestion will arise. To tackle the
congestion packet loss, researchers have implemented Fig.1:Ldos attack stream
several Active Queue Management Schemes like RED, As shown in Fig.1, represents the attack period,
Blue and SFQ. RED is very much sensitive to its represents the attack burst width, and represents the
parameters like min_threshold and max_threshold. If the attack burst rate. The LDoS attack exploits TCP’s slow-
average queue size is less than min_threshold, no drop time-scale dynamics of retransmission time-out (RTO)
will occur. If it is greater than max_threshold, it will drop mechanisms to reduce TCP throughput [r6]. Basically, an
all packets and if it is in between max and min thresholds, attacker can cause a TCP flow to repeatedly enter a RTO
packets will be probabilistically dropped. Another state by sending high-rate ( ), but short-duration bursts
advantage of RED is that it prevents TCP Global ( ), and repeating periodically at slower RTO time-
Synchronization. TCP Global synchronization occurs scales ( ). The TCP throughput at the attacked node will
when all senders need to reduce their packet sending rate be significantly reduced while the attacker will have low
concurrently during congestion. Since average rate making it difficult to be detected.
2. SURVEY ON LOW RATE DENIAL OF 3. IDEA BEHIND LDOS ATTACK
SERVICE ATTACK (LDOS) LDoS attacks are initiated at proper time gaps. This
LDoS attack is a variation of DoS attack in which high interval is chosen such that it coincides with the
rate of data is pushed to network for very short period of retransmission time out (RTO) period of TCP. According
time and this process repeats over intervals which to Karn’s Algorithm, initially as a part of its window
corresponds to the retransmission time out period of TCP. adjustment mechanism TCP send 1MSS packet by setting
Thus by properly exploiting TCP’s RTO, this attack its RTO as 1ms.If the packet is delivered within this RTO
reduces the TCP throughput to near zero. The behavior of period TCP doubles its packet size and halves its RTO
LDoS attack can be compared to a square wave which time and the process continues. But if the packet is not
contains on off pulses. ON corresponds to the attacking delivered within that RTO, it doubles its RTO value and
period and OFF corresponds to the period where attacker try again to deliver the packet. In case of LDoS attack
remains silent. Thus if we track, average rate of packet what happens is that attacker will initiate an attack at 1ms
sending for detecting the attack, we cannot distinguish thus producing congestion; so TCP cannot deliver the
between a legitimate user and LDoS attacker. If we packets, it doubles its RTO value and sends the packet
compare the rate of packet sending at a particular time again. Knowing this attacker will initiate the attack at
slot to identify an attacker, some normal senders which 2ms. Again the TCP packets get dropped. Similarly
send occasional burst packets are also being categorized as proceeding TCP goes on increasing its RTO value without

Volume 3, Issue 6, November-December 2014 Page 33


International Journal of Emerging Trends & Technology in Computer Science (IJETTCS)
Web Site: www.ijettcs.org Email: editor@ijettcs.org
Volume 3, Issue 6, November-December 2014 ISSN 2278-6856

being able to deliver a single packet. Thus the throughput incoming flow is considered. It has been proved that,
of TCP is reduced to near zero due to LDoS attack[3]. variation in buffer size has an impact on LDoS attacks [8].
Problems Associated with LDoS Attack: Larger the buffer size gives out higher probability in
According to Aleksandar Kuzmanovic and Edward W. detecting the LDoS attacks. The proposed testing scheme
Knightly[4] the main threats put forward by LDoS are as is that within a time out of the flow, the buffer size must
follows: come back to size L, which is an optimum size considered
• Low-rate DoS attacks degrade the performance of else it is suspected that the attacking packets are not
both short and long lived TCP traffic. filtered out and again the detection process is carried out.
• IF RTT of packets are low then effect of attack is 5. PREFERENTIAL DROPPING RED (RED-
more. PD)
• Low-rate periodic packets can be very harmful to RED-PD proposes partial flow-based mechanism that
short-RTT TCP traffic. combines simplicity and protection by keeping state for
• Both network-routers an end-point-based mechanism just the high-bandwidth flows. RED-PD [10] uses the
can only reduce, but not eliminate the attack. packet drop history at the router to detect high-bandwidth
LDoS attack disrupts internet routing: Ying Zhang et flows in times of congestion and preferentially drop
al. showed that LDoS attack can disrupt Internet routing packets from these flows. Flows are identified when their
[5]. According to them low-rate TCP targeted DoS attacks arrival rate is more than the target bandwidth T.
have a significant effect on the Border Gateway Protocol Probabilistically implementing dropping on these
(BGP). BGP is the critical infrastructure for monitored flows their bandwidth is kept below T at times
communication reachability information across the global of congestion. RED-PD is successful in detecting Denial
Internet. But if LDoS attack occurs, then BGP routing of Service attacks, but cannot prevent LDoS attack.
sessions can be reset leading to delay in routing. This will CHOKe: CHOose and Keep for responsive flows and
in turn effect routing stability and network reachability. CHOose and Kill for Unresponsive Flows aims to
• LDoS Attacking Application Servers: GabrielMaci´a- approximate max-min fairness for the flows that pass
Fern´andez et al, studied how LDoS attack effects through the congested router. When a packet arrives at a
Application Servers [6]. The LDoS attack tries to congested router, CHOKe draws a packet random from the
consume the resources of the target server with only FIFO queue, and compares it within coming packet. If
low-rate traffic so that most of the server protection they both belong to the same flow they both are dropped,
mechanisms are bypassed. else the randomly chosen packet is kept intact and the
• LDoS Attack on Monoprocess Servers: Vulnerability arriving packet is allowed in to the RED queue with a
in monoprocess or mono threaded servers due to probability depending on the level of congestion[11].
LDoS attack is studied in [7].Low rate feature makes RED-FT: RED with Flow Trust (RED-FT) using
the attack less vulnerable to detection by current networks flow characteristics to ensure the legitimate
Intrusion Detection Systems, which usually expect users’ communications and the fairness of the queue as
high rate traffic. If intruder can get knowledge about much as possible. In other words, It introduce the
cycle time of server he can accurately build the attack. networks flow trust as an important decision-making
This attack threatens the application level by making factor of AQM and improve the robustness of previous
the server engaged with serving intruder requests. algorithms. A router monitors network flows and
4. EXISTING METHODS TO PROTECT calculates flows trust values, which are used for the
RED FROM LDOS ATTACK relevant queue management. Malicious flows would be
Researchers have proposed some methods to protect RED with lower trust values while legitimate flows would be
from LDoS attack, among which some of them use partial with higher ones[12].
state flow analysis where as others use per flow analysis. RRED-PD: ROBUST PREFERENTIAL DROPPING
Per-flow scheduling mechanisms provide max-min RED removes LDoS attack from initially identified high
fairness but are more complex, keeping track of all flows bandwidth consuming flows. By using partial flow
going through the router. Robust Red (RRED): RRED analysis we are able to prevent the attack[s].It is
introduced in [13] is considered as a variant of RED that combination of Robust Red (RRED) and Preferential
can effectively throttle LDoS attack. It adds a LDoS Dropping RED (RED-PD).In this method to detect LDoS
packet detection and filtering mechanism before RED attack only partial flow analysis is needed because by
block to filter out all attacking packets before they feed to using RED-PD, a max-min fairness of bandwidth is
RED. An incoming packet from flow is suspected to be an obtained among different flows, and only the high
attacking packet if it arrives within a short-range after a bandwidth consuming flows need to be monitored[14].
packet from f that is dropped by the detection and filter
block or after a packet from any flow that is dropped by
the RED block. Hence it uses per-flow analysis to detect
attack. Robust RED with Testing: Additional to the
detection and filtering mechanism of RRED a testing
phase [9] is added. In the testing phase, buffer space of the

Volume 3, Issue 6, November-December 2014 Page 34


International Journal of Emerging Trends & Technology in Computer Science (IJETTCS)
Web Site: www.ijettcs.org Email: editor@ijettcs.org
Volume 3, Issue 6, November-December 2014 ISSN 2278-6856

Theory,Telematics and Communications - University


of Granada.
[7] Gabriel Maci´a-Fern´andez, Jes´us E. D´ıaz-Verdejo,
and Pedro Garc´ıa-Teodoro, “Low Rate DoS Attack to
Monoprocess Servers” Dpt. of Signal Theory,
Telematics and Communications -University of
Granada,2006.
[8] SandeepSarat and Andreas Terz, “On the Effect of
Router Buffer Sizes on Low-Rate Denial of Service
Attacks”, IEEE Computer Society (2005).
[9] KarthikVelayudhan.A and .A.Arunmozhi,”Disruption
of Low-rate DoS Attacks using Modified RED
algorithm”, International Conference on Computing
and Control Engineering (ICCCE 2012), 12 & 13
April, 2012.
[10] RatulMahajan and Sally Floyd AT&T Center for
Internet Research at ICSc I (ACIRI),” Controlling
High Bandwidth Flows at the Congested Router”, In
Proceedings of IEEE ICNP 2001, Riverside,CA, Nov.
2001.
[11] R. Pan, B. Prabhakar, and K. Psounis, “CHOKe — a
stateless active queue management scheme for
6. CONCLUSION approximating fair bandwidth allocation,” in Proc.
This paper surveys and compares various Existing INFOCOM’00, Mar. 2000, pp. 942–951.
Methods available to protect RED from LDoS attack. It [12] Xianliang Jiang, Jiangang Yang, Guang Jin, and
also highlights the issues present in currently available Wei Wei ”RED-FT: A Scalable Random Early
LDoS detection mechanisms. Preferential Dropping RED Detection Scheme with Flow Trust against DoS
(RED-PD) was introduced in which the high bandwidth Attacks” IEEE COMMUNICATIONS LETTERS,
consuming flows are identified and monitored. But it VOL. 17, NO. 5, MAY 2013.
failed to prevent LDoS attacks. Robust RED algorithm [13] Zhang C W, Yin J P, Cai Z P, et al. RRED: robust
and RED-FT to counter LDoS attacks but the drawback of RED algorithm to counter low-rate denial-of-service
this methods are that it is following a per flow scheduling attacks, IEEE Communications Letters. 2010,
mechanism which are more complex, maintaining state 14:489−491
for all flows going through the router. [14] Lija Mohan, Bijesh M. G, Jyothish K. John,Survey of
REFERENCES Low rate Denial of Service (LDoS) attack on RED
[1] Clark, David D.; Wroclawski, John (July 1997). “An And its Counter Strategies, 978-1-4673-1344-5/12
Approach to Service Allocation in the Internet”, ©2012 IEEE.
IETF, 2011.
[2] H. Sakoe and H. Chiba.“Dynamic programming
algorithmoptimization for spoken word recognition”,
IEEE Trans.AcousticsSpeech, and Signal Proc.,
26(1), Feb. 1978.
[3] C. Zhang, J. Yin, Z. Cai, et al., “RRED: robust RED
algorithm to counter low-rate denial-of-service
attacks,” IEEE Commun. Lett., vol. 14, no. 5, pp.
489–491, 2010.
[4] A. Kuzmanovic and E. W. Knightly, “Low-rate TCP-
targeted denial of service attacks and counter
strategies,” IEEE/ACM Trans. Netw., vol. 14,no. 4,
pp. 683–696, 2006.
[5] Ying Zhang, Z. Morley Mao, Jia Wang,” Low-Rate
TCP-Targeted DoS Attack Disrupts Internet
Routing”, National Science Foundation,2010.
[6] Gabriel Maci´a-Fern´andez, Jes´us E. D´ıaz-Verdejo,
Pedro Garc´ıa-Teodoro,and Francisco de Toro-Negro
,” LoRDAS: A Low-RateDoS Attack against
Application Servers”, Dpt. of Signal

Volume 3, Issue 6, November-December 2014 Page 35

You might also like