Skip to main content

Using attack bandwidth in signal channel
draft-chen-dots-attack-bandwidth-expansion-00

The information below is for an old version of the document.
Document Type
This is an older version of an Internet-Draft whose latest revision state is "Expired".
Authors Meiling Chen , Li Su
Last updated 2019-03-09
RFC stream (None)
Formats
Additional resources
Stream Stream state (No stream defined)
Consensus boilerplate Unknown
RFC Editor Note (None)
IESG IESG state I-D Exists
Telechat date (None)
Responsible AD (None)
Send notices to (None)
draft-chen-dots-attack-bandwidth-expansion-00
DOTS                                                             M. Chen
Internet-Draft                                                    Li. Su
Intended status: Informational                                      CMCC
Expires: September 10, 2019                                March 9, 2019

                Using attack bandwidth in signal channel
             draft-chen-dots-attack-bandwidth-expansion-00

Abstract

   This document describes a DDoS Mitigation Request parameter used in
   the Signal Channel request, as an expansion of the signal channel for
   mitigating DDoS attack accurately with target-bandwidth.  The
   proposed parameter will help to choose the mitigation method, to be
   blackhole directly or to be drainaged for clean.

Status of This Memo

   This Internet-Draft is submitted in full conformance with the
   provisions of BCP 78 and BCP 79.

   Internet-Drafts are working documents of the Internet Engineering
   Task Force (IETF).  Note that other groups may also distribute
   working documents as Internet-Drafts.  The list of current Internet-
   Drafts is at https://datatracker.ietf.org/drafts/current/.

   Internet-Drafts are draft documents valid for a maximum of six months
   and may be updated, replaced, or obsoleted by other documents at any
   time.  It is inappropriate to use Internet-Drafts as reference
   material or to cite them other than as "work in progress."

   This Internet-Draft will expire on September 10, 2019.

Copyright Notice

   Copyright (c) 2019 IETF Trust and the persons identified as the
   document authors.  All rights reserved.

   This document is subject to BCP 78 and the IETF Trust's Legal
   Provisions Relating to IETF Documents
   (https://trustee.ietf.org/license-info) in effect on the date of
   publication of this document.  Please review these documents
   carefully, as they describe your rights and restrictions with respect
   to this document.  Code Components extracted from this document must
   include Simplified BSD License text as described in Section 4.e of
   the Trust Legal Provisions and are provided without warranty as
   described in the Simplified BSD License.

Chen & Su              Expires September 10, 2019               [Page 1]
Internet-Draft            dots attack bandwidth               March 2019

Table of Contents

   1.  Introduction  . . . . . . . . . . . . . . . . . . . . . . . .   2
   2.  Terminology . . . . . . . . . . . . . . . . . . . . . . . . .   3
   3.  Mitigation Use Case . . . . . . . . . . . . . . . . . . . . .   3
   4.  Request Mitigation expansion  . . . . . . . . . . . . . . . .   5
   5.  Security Considerations . . . . . . . . . . . . . . . . . . .   7
   6.  IANA Considerations . . . . . . . . . . . . . . . . . . . . .   7
   7.  Acknowledgement . . . . . . . . . . . . . . . . . . . . . . .   7
   8.  References  . . . . . . . . . . . . . . . . . . . . . . . . .   7
     8.1.  Normative References  . . . . . . . . . . . . . . . . . .   7
     8.2.  Informative References  . . . . . . . . . . . . . . . . .   7
   Authors' Addresses  . . . . . . . . . . . . . . . . . . . . . . .   8

1.  Introduction

   Distributed Denial of Service (DDoS) is a type of resource-consuming
   attack, which exploits a large number of attack resources and uses
   standard protocols to attack target objects.  DDoS attacks consume a
   large amount of target object network resources or server resources
   (including computing power, storage capacity, etc.) of the target
   object, so that the target object cannot provide network services
   normally.  At present, DDoS attack is one of the most powerful and
   indefensible attacks on the Internet, and due to the extensive use of
   mobile devices and IoT devices in recent years, it is easier for DDoS
   attackers to attack with real attack sources (broilers).

   Volume based distributed denial-of-service attack bring huge amount
   of attack traffic on the link, and the peaks keep hitting new highs,
   the economic loss that causes is bigger also.  For the service
   providers to immediately protect their network services from DDoS
   attacks, DDoS mitigation needs to be automated.

   DDoS Open Threat Signaling (DOTS) is a protocol to standardize real-
   time signaling, threat-handling
   requests[I-D.ietf-dots-signal-channel], when attack target is under
   attack, dots client send mitigation request to dots server for help,
   If the mitigation request contains enough messages of the attack,
   then the mitigator can respond very effectively.

   Currently, there are two selections to deal with ddos attacks on the
   link, one is blackhole, the other is flow clean.  Blackhole means
   that all packets send to the attack target will be discarded by
   routers on the path, this way can instantly reduce the link load,
   Other managed services on this link will not be affected, but for the
   attack target all the normal business messages will be severely
   damaged, for example, if the attack target provide News and

Chen & Su              Expires September 10, 2019               [Page 2]
Internet-Draft            dots attack bandwidth               March 2019

   information services and under ddos attack, all users will be
   inaccessible if the attack target choose blackhole for mitigation.

   Flow clean means that all the flow will be drainaged by routers to
   clean center, the clean center will recognize the attack flow from
   normal business traffic, then reinjects normal business traffic to
   network link by routers after the operation of attack flow discard,
   in this way the attack target will not be effected.

   This document describes attack-bandwidth, as a parameter expansion
   used in the mitigation request. attack-bandwidth means the amount of
   traffic under attack, this parameter can effectively reflect the
   degree of an attack, it will be more convenient for mitigator to
   choose the method for disposition when carry target-bandwidth in the
   mitigation request.

2.  Terminology

   The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
   "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED", "MAY", and
   "OPTIONAL" in this document are to be interpreted as described in
   [RFC2119]

   The readers should be familiar with the terms defined in
   [I-D.ietf-dots-requirements] [I-D.ietf-dots-use-cases]

   The terminology related to YANG data modules is defined in [RFC7950]

   In addition, this document uses the terms defined below:

   Attack-bandwidth:  the amount of traffic under attack, it is usually
      expressed numerically.

   Flow clean:  one selection of Attack traffic deposition, the
      operation contains recognize, discard and reinage.

3.  Mitigation Use Case

   when attack target is under attack, it has to make corresponding
   disposal, there are two options for disposal, one is blackhole
   directly, in this way all the attack flow will be discarded by router
   upper path of attack target, this means that the attack target will
   not receive any traffic during the attack, all the traffic forwards
   attack target will be discarded, this has a huge impact on the work
   environment, especially the host that provide external service.

   The other way of the disposition is to drainage all the traffic flow
   to clean center from router, then the clean center will use pattern

Chen & Su              Expires September 10, 2019               [Page 3]
Internet-Draft            dots attack bandwidth               March 2019

   matching or any other method to find out the attack traffic flow to
   discard, finally, clean center reinage the normal business traffic
   back to attack target by upper router, the whole process above is
   defined as flow clean(Figure 1).

               attack flow +--------+                   +--------+
               ----------->| router |------------------>| clean  |
                 1         +--------+         2         | center |
                            |                           +--------+
                          3 |                               |
                            |       +--------+              |
                            +------>| attack |<-------------+
                                    | target |
                                    +--------+

               Figure 1: diagram of DDoS Mitigation usecase

   Generally, the bandwidth of the link 1 must be larger than link 2 and
   link 3, and the clean ability of clean center limited to hardware
   resources.  An example of link situation is as below(Figure 2):

            +------------+------------+
            |   figure   | bandwidth/ |
            |   tag      | capability |
            +------------+------------+
            |  link 1    | 100Gb      |
            |  link 2    | 50Gb       |
            |  link 3    | 10Gb       |
            |clean center| 80Gb       |
            +------------+------------+

                  Figure 2: an example of link bandwidth

   The Figure2 is a scenario of the link bandwidth, when a ddos attack
   is ongoing, if the link 1 bandwidth is completely jammed, the best
   way to mitigate the attack is to discard all the attack flow; if the
   amount of the traffic flow is lower than the remainder cleaning
   ability, the most suitable deposition is to drainage all the attack
   flow to clean center.

   Therefore, it is an obvious requirement in the current network
   environment.  In the architecture of DOTS, Dots client send
   mitigation request to dots server, the parameters in the mitigation
   request contains some message of attack target, but there have not

Chen & Su              Expires September 10, 2019               [Page 4]
Internet-Draft            dots attack bandwidth               March 2019

   any messages of attack, if add attack-bandwidth to mitigation request
   as an expansion, it will be more effective and convenient for the
   disposition of mitigator.

4.  Request Mitigation expansion

   When a DOTS client requires mitigation for some reason, the DOTS
   client uses the CoAP PUT method to send a mitigation request to its
   DOTS server(s).  If a DOTS client is entitled to solicit the DOTS
   service, the DOTS server enables mitigation on behalf of the DOTS
   client by communicating the DOTS client's request to a mitigator
   (which may be colocated with the DOTS server) and relaying the
   feedback of the thus-selected mitigator to the requesting DOTS
   client.

   DOTS clients use the PUT method to request mitigation from a DOTS
   server.  During active mitigation, DOTS clients may use PUT requests
   to carry mitigation efficacy updates to the DOTS server.

   The new parameter in the CBOR body (Figure 3) is described below:

Chen & Su              Expires September 10, 2019               [Page 5]
Internet-Draft            dots attack bandwidth               March 2019

    Content-Format: "application/dots+cbor"
                     {
                     "ietf-dots-signal-channel:mitigation-scope": {
                       "scope": [
                         {
                           "target-prefix": [
                              "string"
                            ],
                           "target-port-range": [
                              {
                                "lower-port": number,
                                "upper-port": number
                              }
                            ],
                            "target-protocol": [
                              number
                            ],
                            "target-fqdn": [
                              "string"
                            ],
                            "attack-bandwidth":[
                             "string"
                             ],
                            "target-uri": [
                              "string"
                            ],
                            "alias-name": [
                              "string"
                            ],
                           "lifetime": number,
                           "trigger-mitigation": true|false
                         }
                       ]
                     }
     }

             Figure 3: PUT to Convey DOTS Mitigation Requests

   attack-bandwidth:  bandwidth occupied by an attack, The recommended
      format is numerical form, such as xxGb.  Different attack has
      different attack bandwidth, numerical value directly reflects the
      urgency of the current attack.  Serious attacks are treated with
      blackhole, Other cases use flow cleaning, attack-bandwidth is
      conducive to the selection of disposal mode.

      This is an optional attribute.

Chen & Su              Expires September 10, 2019               [Page 6]
Internet-Draft            dots attack bandwidth               March 2019

   The definition of the rest parameters are the same as the
   [I-D.ietf-dots-signal-channel]

5.  Security Considerations

   TBD

6.  IANA Considerations

   TBD

7.  Acknowledgement

   TBD

8.  References

8.1.  Normative References

   [RFC2119]  Bradner, S., "Key words for use in RFCs to Indicate
              Requirement Levels", BCP 14, RFC 2119,
              DOI 10.17487/RFC2119, March 1997,
              <https://www.rfc-editor.org/info/rfc2119>.

   [RFC7950]  Bjorklund, M., Ed., "The YANG 1.1 Data Modeling Language",
              RFC 7950, DOI 10.17487/RFC7950, August 2016,
              <https://www.rfc-editor.org/info/rfc7950>.

8.2.  Informative References

   [I-D.ietf-dots-requirements]
              Mortensen, A., K, R., and R. Moskowitz, "Distributed
              Denial of Service (DDoS) Open Threat Signaling
              Requirements", draft-ietf-dots-requirements-20 (work in
              progress), February 2019.

   [I-D.ietf-dots-signal-channel]
              K, R., Boucadair, M., Patil, P., Mortensen, A., and N.
              Teague, "Distributed Denial-of-Service Open Threat
              Signaling (DOTS) Signal Channel Specification", draft-
              ietf-dots-signal-channel-30 (work in progress), March
              2019.

   [I-D.ietf-dots-use-cases]
              Dobbins, R., Migault, D., Fouant, S., Moskowitz, R.,
              Teague, N., Xia, L., and K. Nishizuka, "Use cases for DDoS
              Open Threat Signaling", draft-ietf-dots-use-cases-17 (work
              in progress), January 2019.

Chen & Su              Expires September 10, 2019               [Page 7]
Internet-Draft            dots attack bandwidth               March 2019

Authors' Addresses

   Meiling Chen
   CMCC
   32, Xuanwumen West
   BeiJing , BeiJing   100053
   China

   Email: chenmeiling@chinamobile.com

   Li Su
   CMCC
   32, Xuanwumen West
   BeiJing   100053
   China

   Email: suli@chinamobile.com

Chen & Su              Expires September 10, 2019               [Page 8]