An SDN-based Approach For Defending Against Reflective DDoS Attacks

Distributed Reflective Denial of Service (DRDoS) attacks are an immanent threat to Internet services. The potential scale of such attacks became apparent in March 2018 when a memcached-based attack peaked at 1.7 Tbps. Novel services built upon UDP increase the need for automated mitigation mechanism...

Full description

Saved in:
Bibliographic Details
Published in2018 IEEE 43rd Conference on Local Computer Networks (LCN) pp. 299 - 302
Main Authors Lukaseder, Thomas, StOlzle, Kevin, Kleber, Stephan, Erb, Benjamin, Kargl, Frank
Format Conference Proceeding
LanguageEnglish
Published IEEE 01.10.2018
Subjects
Online AccessGet full text
DOI10.1109/LCN.2018.8638036

Cover

Abstract Distributed Reflective Denial of Service (DRDoS) attacks are an immanent threat to Internet services. The potential scale of such attacks became apparent in March 2018 when a memcached-based attack peaked at 1.7 Tbps. Novel services built upon UDP increase the need for automated mitigation mechanisms that react to attacks without prior knowledge of the actual application protocols used. With the flexibility that software-defined networks offer, we developed a new approach for defending against DRDoS attacks; it not only protects against arbitrary DRDoS attacks but is also transparent for the attack target and can be used without assistance of the target host operator. The approach provides a robust mitigation system which is protocol-agnostic and effective in the defense against DRDoS attacks.
AbstractList Distributed Reflective Denial of Service (DRDoS) attacks are an immanent threat to Internet services. The potential scale of such attacks became apparent in March 2018 when a memcached-based attack peaked at 1.7 Tbps. Novel services built upon UDP increase the need for automated mitigation mechanisms that react to attacks without prior knowledge of the actual application protocols used. With the flexibility that software-defined networks offer, we developed a new approach for defending against DRDoS attacks; it not only protects against arbitrary DRDoS attacks but is also transparent for the attack target and can be used without assistance of the target host operator. The approach provides a robust mitigation system which is protocol-agnostic and effective in the defense against DRDoS attacks.
Author StOlzle, Kevin
Erb, Benjamin
Kargl, Frank
Lukaseder, Thomas
Kleber, Stephan
Author_xml – sequence: 1
  givenname: Thomas
  surname: Lukaseder
  fullname: Lukaseder, Thomas
  email: Thomas.Lukaseder@uni-ulm.de
  organization: Institute of Distributed Systems, Ulm University, Germany
– sequence: 2
  givenname: Kevin
  surname: StOlzle
  fullname: StOlzle, Kevin
  email: Kevin Stolzle@uni-ulm.de
  organization: Institute of Distributed Systems, Ulm University, Germany
– sequence: 3
  givenname: Stephan
  surname: Kleber
  fullname: Kleber, Stephan
  email: Stephan.Kleber@uni-ulm.de
  organization: Institute of Distributed Systems, Ulm University, Germany
– sequence: 4
  givenname: Benjamin
  surname: Erb
  fullname: Erb, Benjamin
  email: Benjamin.Erb@uni-ulm.de
  organization: Institute of Distributed Systems, Ulm University, Germany
– sequence: 5
  givenname: Frank
  surname: Kargl
  fullname: Kargl, Frank
  email: Frank.Kargl@uni-ulm.de
  organization: Institute of Distributed Systems, Ulm University, Germany
BookMark eNotj8tKw0AUQEdQ0D72gpv5gcS588rtMiS2CqFCq-sySW7qaJ2ETBD8ewt2dXaHc2bsOvSBGLsHkQKI1WNVbFMpAFO0CoWyV2wGRqHVGpS-ZcsYP4UQ0qKyGu5YkQe-L7dJ7SK1PB-GsXfNB1_3Iy-po9D6cOT50fkQJ76j7kTN5H-Il2W_5_k0ueYrLthN506RlhfO2fv66a14TqrXzUuRV4mHzExJK5HQaahRn9NqLVaoTOZ0JkyjQCmHmZZ1p6lprXGAQiJ0FpzJSMn6_DJnD_9eT0SHYfTfbvw9XD7VH_HPR2M
ContentType Conference Proceeding
DBID 6IE
6IL
CBEJK
RIE
RIL
DOI 10.1109/LCN.2018.8638036
DatabaseName IEEE Electronic Library (IEL) Conference Proceedings
IEEE Proceedings Order Plan All Online (POP All Online) 1998-present by volume
IEEE Xplore All Conference Proceedings
IEEE Electronic Library (IEL)
IEEE Proceedings Order Plans (POP All) 1998-Present
DatabaseTitleList
Database_xml – sequence: 1
  dbid: RIE
  name: IEEE Electronic Library (IEL)
  url: https://proxy.k.utb.cz/login?url=https://ieeexplore.ieee.org/
  sourceTypes: Publisher
DeliveryMethod fulltext_linktorsrc
Discipline Engineering
EISBN 1538644134
9781538644133
EndPage 302
ExternalDocumentID 8638036
Genre orig-research
GroupedDBID 6IE
6IF
6IL
6IN
AAJGR
AAWTH
ABLEC
ALMA_UNASSIGNED_HOLDINGS
BEFXN
BFFAM
BGNUA
BKEBE
BPEOZ
CBEJK
IEGSK
OCL
RIB
RIC
RIE
RIL
ID FETCH-LOGICAL-i175t-d28e8a41b84638b4098357a4705c3133a8742bf4ecd65a180281f61a57e32b803
IEDL.DBID RIE
IngestDate Wed Aug 27 02:50:12 EDT 2025
IsPeerReviewed false
IsScholarly false
Language English
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-i175t-d28e8a41b84638b4098357a4705c3133a8742bf4ecd65a180281f61a57e32b803
PageCount 4
ParticipantIDs ieee_primary_8638036
PublicationCentury 2000
PublicationDate 2018-Oct.
PublicationDateYYYYMMDD 2018-10-01
PublicationDate_xml – month: 10
  year: 2018
  text: 2018-Oct.
PublicationDecade 2010
PublicationTitle 2018 IEEE 43rd Conference on Local Computer Networks (LCN)
PublicationTitleAbbrev LCN
PublicationYear 2018
Publisher IEEE
Publisher_xml – name: IEEE
SSID ssj0002683641
Score 1.7370415
Snippet Distributed Reflective Denial of Service (DRDoS) attacks are an immanent threat to Internet services. The potential scale of such attacks became apparent in...
SourceID ieee
SourceType Publisher
StartPage 299
SubjectTerms Computer crime
Data collection
DDoS mitigation
IP networks
Monitoring
network-based mitigation
Protocols
reflective DDoS attacks
Servers
software-defined networking
Task analysis
Title An SDN-based Approach For Defending Against Reflective DDoS Attacks
URI https://ieeexplore.ieee.org/document/8638036
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV07a8MwED6STO3SR1L6RkPH2vFLsjyauCGUJpSmgWxBss4ltNgl2Et_fSXbSR906CYEQo-TdHe6-z4B3AgZKMb1QXIoZ9pBibglhQwtwR2W0chzGBo08nTGJovgfkmXHbjdYWEQsU4-Q9sU61i-KtLKPJUNud4s-sbtQldvswartXtP8XSPLHC3kUgnGj6MZiZ1i9ttsx__p9TqY3wA023HTdbIq12V0k4_fnEy_ndkhzD4AuqRx50KOoIO5sew_41jsA-jOCfzZGYZdaVI3FKIk3GxIQlmWINaSPwi1tpOJE-YvTU3IEmSYk7isjQY_AEsxnfPo4nV_pxgrbU5UFrK48hF4EptXfhcGhH4NBRB6NDU116p4NojllmAqWJUGBI47mbMFTRE35N6JifQy4scT4FEShscStKIZV4gkPNMoPJCjm6KQrc7g75ZjtV7Q46xalfi_O_qC9gzImmy4S6hV24qvNJavZTXtTg_AQiNn6s
linkProvider IEEE
linkToHtml http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV07T8MwELZKGYCFR4t444GRtHnYjjNGDVWBNkK0lbpVdnxBFShBVbrw67GTtDzEwBZFspz4bH93vvs-I3QjJFGM64VkU850gBJwSwrpW4LbLKWBazMwbORRzAZT8jCjswa63XBhAKAsPoOOeSxz-SpPVuaorMv1ZNE77hba1rhPaMXW2pyouLpPRpx1LtIOusNebIq3eKdu-OMGlRJA-vtotO66qht57awK2Uk-fqky_vfbDlD7i6qHnzYgdIgakB2hvW8qgy3UCzM8jmLLAJbCYS0ijvv5EkeQQklrweGLWGhPET9D-lbtgTiK8jEOi8Kw8Nto2r-b9AZWfXeCtdAOQWEplwMXxJHav_C4NEbwqC-Ib9PE03Gp4DomlimBRDEqjAwcd1LmCOqD50r9J8eomeUZnCAcKO1yKEkDlrpEAOepAOX6HJwEhG53ilpmOObvlTzGvB6Js79fX6OdwWQ0nA_v48dztGvMU9XGXaBmsVzBpcb4Ql6Vpv0EmR2i-A
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=proceeding&rft.title=2018+IEEE+43rd+Conference+on+Local+Computer+Networks+%28LCN%29&rft.atitle=An+SDN-based+Approach+For+Defending+Against+Reflective+DDoS+Attacks&rft.au=Lukaseder%2C+Thomas&rft.au=StOlzle%2C+Kevin&rft.au=Kleber%2C+Stephan&rft.au=Erb%2C+Benjamin&rft.date=2018-10-01&rft.pub=IEEE&rft.spage=299&rft.epage=302&rft_id=info:doi/10.1109%2FLCN.2018.8638036&rft.externalDocID=8638036