Verlagslink DOI: | 10.1145/3355369.3355593 | Titel: | Down the black hole : dismantling operational practices of BGP blackholing at IXPS | Sprache: | Englisch | Autorenschaft: | Nawrocki, Marcin Blendin, Jeremias Dietzel, Christoph Schmidt, Thomas Wählisch, Matthias |
Schlagwörter: | DDoS; BGP; RTBH; Collateral Damage | Erscheinungsdatum: | 21-Okt-2019 | Verlag: | Association for Computing Machinery | Teil der Schriftenreihe: | Proceedings of the 2019 ACM Internet Measurement Conference | Anfangsseite: | 435 | Endseite: | 448 | Konferenz: | ACM Internet Measurement Conference 2019 | Zusammenfassung: | Large Distributed Denial-of-Service (DDoS) attacks pose a major threat not only to end systems but also to the Internet infrastructure as a whole. Remote Triggered Black Hole filtering (RTBH) has been established as a tool to mitigate inter-domain DDoS attacks by discarding unwanted traffic early in the network, e.g., at Internet eXchange Points (IXPs). As of today, little is known about the kind and effectiveness of its use, and about the need for more fine-grained filtering. In this paper, we present the first in-depth statistical analysis of all RTBH events at a large European IXP by correlating measurements of the data and the control plane for a period of 104 days. We identify a surprising practise that significantly deviates from the expected mitigation use patterns. First, we show that only one third of all 34k visible RTBH events correlate with indicators of DDoS attacks. Second, we witness over 2000 blackhole events announced for prefixes not of servers but of clients situated in DSL networks. Third, we find that blackholing on average causes dropping of only 50% of the unwanted traffic and is hence a much less reliable tool for mitigating DDoS attacks than expected. Our analysis gives also rise to first estimates of the collateral damage caused by RTBH-based DDoS mitigation. |
URI: | http://hdl.handle.net/20.500.12738/4464 | ISBN: | 978-1-4503-6948-0 | Begutachtungsstatus: | Diese Version hat ein Peer-Review-Verfahren durchlaufen (Peer Review) | Einrichtung: | Department Informatik Fakultät Technik und Informatik |
Dokumenttyp: | Konferenzveröffentlichung |
Enthalten in den Sammlungen: | Publications without full text |
Zur Langanzeige
Volltext ergänzen
Feedback zu diesem Datensatz
Export
Alle Ressourcen in diesem Repository sind urheberrechtlich geschützt.