Edge-to-Edge Network Monitoring to Detect Service Violations and DoS Attacks

Edge-to-Edge Network Monitoring to Detect Service Violations and DoS Attacks

Ahsan Habib
Copyright: © 2009 |Pages: 14
DOI: 10.4018/978-1-59904-855-0.ch015
OnDemand:
(Individual Chapters)
Available
$37.50
No Current Special Offers
TOTAL SAVINGS: $37.50

Abstract

This chapter develops a distributed monitoring scheme that uses edge-to-edge measurements to identify congested links and capture the misbehaving flows that violate service-level-agreements and inject excessive traffic that leads into denial of service (DoS) attacks. The challenge of this problem is to develop low overhead schemes that do not involve core routers in any measurement to achieve scalability. The main contribution of this work is overlay-based network monitoring schemes for efficient and scalable network monitoring. This monitoring scheme uses edge-to-edge measurements of delay, loss, and throughput to infer the internal characteristics of a network domain. The analytical and experimental results show that a network domain can be monitored with O(n) probes, where n is the number of edge routers. Upon detection of an attack, the routers regulate misbehaving flows to stop it. We introduce a new way to measure communication and computation overhead among monitoring schemes. This comparative study shows that core-assisted network monitoring has higher communication and computation overhead comparing to edge-to-edge network monitoring scheme.
Chapter Preview
Top

Introduction

The aim of a Denial of Service (DoS) attack is to consume the resources of a victim or the resources on the way to communicate with a victim. By wasting the victim’s resources, an attacker disallows it from serving legitimate customers. A victim can be a host, server, router, or any computing entity connected to the network. In addition to DoS attacks, the quality of service (QoS) enabled networks are vulnerable to service level agreement (SLA) violations—namely, the QoS attacks. An attacker in this environment is a user who tries to get more resources (i.e., a better service class) than what s/he has signed (paid) for. Legitimate customers’ traffic may experience degraded QoS as a result of the illegally injected traffic. Taken to an extreme, that excess traffic may result in a denial of service attack. This creates a need for developing an effective defense mechanism that automates the detection and reaction to SLA violations.

Monitoring of a network domain can ensure the proper operation of a network by detecting possible service violations and attacks. Monitoring network activity is required to maintain confidence in the security and QoS of networks, from both the user (ensuring the service level paid for is indeed obtained) and provider (ensuring no unusual activity or attacks take place) perspectives. Continuous monitoring of a network domain poses several challenges. First, routers of a network domain need to be polled periodically to collect statistics about monitoring parameters such as delay, loss, and throughput.

Second, this huge amount of data has to be mined to obtain useful monitoring information. Polling increases the overhead for high speed core routers, and restricts the monitoring process from scaling to a large number of flows. To achieve scalability, polling and measurements that involve core routers should be avoided.

To detect attacks and service violations, we propose a low overhead monitoring scheme that does not involve core routers for any kind of measurements. Our assumption is that if a network domain is properly provisioned and no user is misbehaving, the flows traversing through the domain should not experience high delay or high loss. An excessive traffic due to attacks changes the internal characteristics of a network domain. This change of internal characteristics is a key point to monitor a network domain. We employ agents on the edge routers of a network domain to efficiently measure SLA parameters such as packet delays, loss, and throughput. The delay is an edge-to-edge latency measurement; packet loss is the ratio of total number of packets dropped from a flow to the total packets of the same flow entered into the domain; and throughput is the total bandwidth consumed by a flow inside a domain. A flow can be a micro flow with five tuples (two addresses, two ports, and protocol) or an aggregate one that is combined with several micro flows. Delay and loss are important parameters to monitor a network domain because these parameters mostly reflect the QoS of user applications. High delay and loss can be used as an indication of service violations. Although, jitter (delay variation) is another important SLA parameter, it is flow-specific, and therefore is not suitable to use in network monitoring.

We develop an overlay-based monitoring scheme that forms an overlay network using all edge routers on top of the physical network. The probing identifies the congested links due to high losses are identified using edge-to-edge loss measurements. To identify the congested links, all edge routers probe their neighbors in clockwise and counter-clockwise direction. This method requires only O(n) probing, where n is the number of edge routers. Through extensive analysis, both analytical and experimental, we show that this identifies the congested links to a close approximation. If necessary, we refine the solution by searching the topology tree intelligently for probes that can be used to identify the status of the undecided links from earlier probing results. When the network is less than 20% congested the refinement process also requires O(n) probes. If the congestion is high, it requires more probes, however, it does not exceed O(n2). The congested links are used as a basis to identify edge routers through which traffic are entering into and exiting from the domain. From exiting edge routers, we identify the flows that are violating any SLA agreement. If the SLA is violated for delay and loss, the network is probed to detect whether any user is stealing bandwidth. The service violations can indicate a possible attack on the same domain, or on a downstream domain.

Key Terms in this Chapter

Service Violations: Service violations occur a user or a flow consumes extra resources beyond its service level agreements.

Edge-to-Edge Measurements: An edge-to-edge measurement is a methodology where measuring tools reside only at the edge routers and there is no direct access to the core routers.

Network Monitoring: Network monitoring describes the process of constantly monitoring a computer network to detect failures or attacks and notifies the network administrator when a certain condition is met.

Denial of Service: A denial-of-service (DoS) attack is an attempt to make resources unavailable to the legitimate users.

SLA Monitor: SLA Monitor is an entity that collects statistics about network parameters such as latency, loss, throughput from the routers and take necessary decision.

Service Level Agreements: A service level agreement (SLA) is a service contract where the services, priorities, guarantee, etc. collectively, the level of service, is defined. It is a contract that exists between customers and their service provider, or between service providers.

Complete Chapter List

Search this Book:
Reset