Context - DDoS
- Distributed Denial-of-Service (DDoS) attack is a malicious attempt to disrupt the normal traffic of a targeted server, service or network of Cloud infrastructure by overwhelming the target or its surrounding infrastructure with a flood of internet traffic.
- DDoS attacks achieve effectiveness by utilizing multiple compromised computer systems resources of attack traffic.
- Exploited machines can include computers and other networked resources
Symptoms
- Suspicious amounts of traffic originating from a single IP address or IP range
- A flood of traffic from users who share a single behavioural profile, such as device type, geo-location, or web browser version
- An unexplained surge in requests to a single page or endpoint
- Odd traffic patterns such as spikes at odd hours of the day or patterns that appear to be unnatural (e.g. a spike every 10 minutes)
Features For the above problem statements, following assumptions can be made:
- Cloud is hosting a website and providing some services to its users.
- The website should be always up and providing services to its users (high availability).
- The attackers can flood the website directly or via other nodes (DDoS).
- The attacker can also sabotage the link between a client and web-server.
- The attack can come from outside or from within the cloud infrastructure.
- Automatically detect and recover from the DDoS attack.
Expected Solution:
-
A set of developed tool(s) along with a suitable Cloud
-
The demonstrated website should be protected well against different types of DDoS attack.
-
In case of an attack, the developed security tools should be able to automatically detect and protect a website hosted on cloud infrastructure against DDoS attacks.
-
The solution should also demonstrate the automatic recovery from the attack.
-
As high availability is an essential feature, the down time (recovery time) should be minimised to the extent possible.
Competitors
DDOS Service
- Cloud flare:
- Features:
- Provides DDoS protection with real-time traffic monitoring, prevention, mitigation, and protection.
- Acts as a DNS Name Server Proxy, Caching & WAF for prevention
- Integration: Easy integration with API gateways and offers comprehensive security solutions. -> DDoS Protection Architecture - by Cloudflare -> More @CloudFlare
- Features:
-
Arbor by Netscout
-
Red Blaze
-
AWS Shield
- ref:
Network Traffic Analysis (SIEM)
-
Splunk
-
Datadog
Firewall & Security
-
AWS WAF
-
Mod Security
-
Re-Captcha
Honeypot IDS
DDos Attacks Prevention & Mitigation
- DDos Attack Mitigation (Github Guide) - Link
- Comprehensive survey on DDoS attacks detection & mitigation in SDN-IoT network - Link
Models
Anomaly IDS (Real-time assessment):
- DDoS lightweight detection (CNN) - Link
Log Analysis Model (Future Predictions):
-
Model: Time Series Forecasting with Prophet
-
Notebook: https://github.com/facebook/prophet/blob/main/notebooks/quick_start.ipynb
-
Model: ML Toolkit for log detection Analysis
Topics
- DDoS
- Attack Types