RECOMMENDATION OF GRANULAR TRAFFIC THRESHOLDS FROM MULTIPLE SENSOR APPLIANCES
20230007040 · 2023-01-05
Inventors
Cpc classification
H04L63/20
ELECTRICITY
International classification
Abstract
Recommendations are made for granular traffic thresholds for a plurality of DDoS attack mitigation appliances that act as a set appliances. The set of appliances can be those commonly found in highly available networks, active-active or active-passive appliances, disaster recovery data centers, backup appliances, etc.
Claims
1. A computer-implemented method in a distributed denial of service (DDoS) attack mitigation server, the method comprising: receiving, by a DDoS threshold recommendation engine within a network, a plurality of traffic rate parameters from a plurality of DDoS attack mitigation appliances; determining, by the DDoS threshold recommendation engine, a type of a set of appliances for the plurality of traffic rate parameters received; combining rates of individual types of traffic parameters from the plurality of traffic rate parameters, multiplying by a rate multiplier to avoid false positives and determining a maximum combined expected packet rate; and feeding back to the plurality of DDoS attack mitigation appliances the traffic thresholds.
2. The method of claim 1, further comprising: determining if the set of appliances consists of a plurality of active-active appliances.
3. The method of claim 1, further comprising: determining if the set of appliances consists of a plurality of active-passive appliances.
4. The method of claim 1, further comprising: determining if the set of appliances consists of a plurality of appliances that are part of load balanced appliances facing the same network.
5. The method of claim 1, further comprising: determining if the set of appliances consists of a plurality of appliances that are part of the same highly available network facing the same cumulative traffic.
6. The method of claim 1, further comprising: determining if the set of appliances consists of a plurality of appliances that are part of a set, some of which may be used under disaster recovery and some that face the network traffic under normal circumstances.
7. The method of claim 1, further comprising: determining if the set of appliances consists of a plurality of appliances that are part of a set, some of which may be used as a backup if the primary appliances fail.
8. The method of claim 1, further comprising: combining the rates of individual granular traffic parameters from the whole set, multiplying by a rate multiplier to avoid false positives and determining a maximum combined expected packet rate.
9. The method of claim 1, further comprising: determining a final set of granular thresholds.
10. The method of claim 9, further comprising: deploying this set of thresholds on all the appliances that belong to the set of mitigation appliances.
11. A non-transitory computer-readable medium storing sourced code that, when executed by a processor, performs a method in a distributed denial of service (DDoS) attack mitigation server, the method comprising: receiving, by a DDoS threshold recommendation engine within a network, a plurality of traffic rate parameters from a plurality of DDoS attack mitigation appliances; determining, by the DDoS threshold recommendation engine, a type of a set of appliances for the plurality of traffic rate parameters received; combining rates of individual types of traffic parameters from the plurality of traffic rate parameters, multiplying by a rate multiplier to avoid false positives and determining a maximum combined expected packet rate; and feeding back to the plurality of DDoS attack mitigation appliances the traffic thresholds.
12. A distributed denial of service (DDoS) attack mitigation server, comprising: receiving, by a DDoS threshold recommendation engine within a network, a plurality of traffic rate parameters from a plurality of DDoS attack mitigation appliances; determining, by the DDoS threshold recommendation engine, a type of a set of appliances for the plurality of traffic rate parameters received; combining rates of individual types of traffic parameters from the plurality of traffic rate parameters, multiplying by a rate multiplier to avoid false positives and determining a maximum combined expected packet rate; and feeding back to the plurality of DDoS attack mitigation appliances the traffic thresholds.
Description
BRIEF DESCRIPTION OF THE DRAWINGS
[0011]
[0012]
[0013]
[0014]
[0015]
[0016]
DETAILED DESCRIPTION
[0017] A system and methods are described for recommending granular thresholds in complex network deployment of a plurality of DDoS attack mitigation appliances. According to one embodiment, in a load balanced network with active-active appliances, granular traffic rates of two appliances are combined to recommend the thresholds on two appliances. In yet another embodiment, the traffic of the two or more appliances may be such that one of the appliances has no traffic at all some time, as in case of disaster recovery center appliances and upon disaster suddenly gets all the traffic. In such a scenario, the recommended thresholds cannot use the behavior when traffic is zero—but must use the combined traffic of a plurality of non-disaster-recovery appliances facing the total traffic during normal times. One of ordinary skill in the art will recognize many different possibilities, within the spirit of the present disclosure.
[0018]
[0019] A method can implement the components of
[0020]
[0021]
[0022] In case of Fragmented packets in the exemplary situation in table 301, the Maximum Expected Rate is still 2,613 which is below Minimum Recommended Granular Threshold of 5,000. Thus, a recommendation of 5,000 PPS is appropriate for these packets.
[0023] In a similar way, UDP packet threshold can be set to 2,811,615 according to this technique.
[0024] Those skilled in the art will appreciate that use of maximum here is only an exemplary technique. Other schemes such as 95th percentile to avoid sudden bursts can be used too. Similarly using last 7 days is an example, other periods such as last 1 month or last 1 year or last 24 hours can be used depending on what data is available and what is important to the system administrator.
[0025] An exemplary DDoS attack mitigation works on an integrated combination of a plurality of such traffic thresholds and violation of any one or more of such thresholds is considered an active traffic anomaly and is mitigated by limiting the rate of such anomalous packets selectively. Those skilled in the art are aware that the volume of traffic increase during an attack is manifold compared to baseline traffic. It is therefore not an issue of accuracy of these thresholds to exact per second value but about reasonable of these values. The attack rates are significantly higher compared to baseline rates. Those skilled in the art are aware that in an exemplary situation, the baseline traffic may be in 100 Mbps but the attack rates may be in 5 Gbps. In yet another deployment, the baseline may be around 5 Gbps and attack may be in 20 Gbps range.
[0026]
[0027] A DDoS threshold recommendation engine 105 can provide network support to each of the DDoS attack mitigation appliances. In one implementation, residence on the protected network provides direct communication with network devices. In another implementation on the Internet, cloud-based support gathers experience from across many different protected networks. Rates are sent from 402,404 and thresholds are returned to 402,404.
[0028]
[0029] The other 3 graphs 504, 505 and 506 illustrate maximum traffic observed for 3 granular parameters, viz. SYN packets, fragmented packets, and UDP packets in inbound direction via the appliance 404.
[0030] In this exemplary situation, SYN packet rate over last 7 days, according to 501 never exceeded 481,284 PPS any time. Similarly, Fragmented packets never arrived faster than 8,672 PPS over the last 7 days. Similarly, UDP packet rate never exceeded 919,523 PPS on appliance 403.
[0031] In this exemplary situation, SYN packet rate over last 7 days, according to 504 never exceeded 480,615 PPS any time. Similarly, Fragmented packets never arrived faster than 8,842 PPS over the last 7 days. Similarly, UDP packet rate never exceeded 8,982 PPS on appliance 404.
[0032]
[0033] As explained in earlier section, we can derive the suggested Granular Threshold for appliance 403 as 1,443,852 for SYN Packets, 26,016 for fragmented packets, and 2,758,569 as depicted in Table 601.
[0034] In a similar way, as explained in earlier section, we can derive the suggested Granular Threshold for appliance 404 as 1,441,845 for SYN Packets, 26,526 for fragmented packets, and 26,946 as depicted in Table 602.
[0035] According to an embodiment of this invention, since the two appliances 403 and 404 share the total traffic under various scenarios such as load balancing, routing changes, disaster recovery, high availability, keeping their thresholds based on just their traffic behavior is not the most appropriate technique. According to an embodiment of this invention, the appliances will not exceed the cumulative traffic at any given moment under the above scenarios. Thus, if the traffic of two appliances with due cushion is summed up, the thresholds can be predicted based on that new value. Table 603 shows such a scheme according to an embodiment of this invention. In the exemplary situation, rates of SYN, fragmented packets, and UPD packets from 601 and 602 and the cumulative values are used as a baseline. The resultant thresholds are deployed on both the appliances. These new thresholds ensure that whether traffic moves from one to the other fully or partially or in a random way, both the appliances are generally ready to mitigate the rate anomalies based on the new thresholds.
[0036] In yet another embodiment of the invention, the plurality of the appliances is not limited to two appliances but could be higher.
[0037] In yet another embodiment of the invention, the thresholds are not limited to those mentioned above but could be those parameters that could be obtained from packets and sessions of the packets through packet classification and other techniques known to those in the art.
[0038] In another embodiment of the invention, the direction of the anomalies is not limited to inbound packets, but could be outbound as well—as those who are skilled in the art are aware that there are outbound attacks as well.
[0039] Components described above are meant only to exemplify various possibilities. In no way should the aforementioned exemplary computer system limit the scope of the present disclosure.
[0040] Embodiments of the present disclosure include various steps, which have been described above. A variety of these steps may be performed by hardware components or may be tangibly embodied on a computer-readable storage medium in the form of machine-executable instructions, which may be used to cause a general-purpose or special-purpose processor programmed with instructions to perform these steps. Alternatively, the steps may be performed by a combination of hardware, software, and/or firmware.
[0041] Although embodiments of the present invention and their various advantages have been described in detail, it should be understood that the present invention is not limited to or defined by what is shown or discussed herein.
[0042] Moreover, as one skilled in the art will appreciate, any digital computer systems can be configured or otherwise programmed to implement the methods and apparatuses disclosed herein, and to the extent that a particular digital computer system is configured to implement the methods and apparatuses of this invention, it is within the scope and spirit of the present invention. Once a digital computer system is programmed to perform particular functions pursuant to computer-executable instructions from program software that implements the present invention, it in effect becomes a special purpose computer particular to the present invention. The techniques necessary to achieve this are well known to those skilled in the art and thus are not further described herein.
[0043] Computer executable instructions implementing the methods and techniques of the present invention can be distributed to users on a computer-readable medium and are often copied onto a hard disk or other storage medium. When such a program of instructions is to be executed, it is usually loaded into the random-access memory of the computer, thereby configuring the computer to act in accordance with the techniques disclosed herein. All these operations are well known to those skilled in the art and thus are not further described herein. The term “computer-readable medium” encompasses distribution media, intermediate storage media, execution memory of a computer, and any other medium or device capable of storing for later reading by a computer a computer program implementing the present invention.
[0044] Accordingly, drawings, tables, and description disclosed herein illustrate technologies related to the invention, show examples of the invention, and provide examples of using the invention and are not to be construed as limiting the present invention. Known methods, techniques, or systems may be discussed without giving details, so to avoid obscuring the principles of the invention. As it will be appreciated by one of ordinary skill in the art, the present invention can be implemented, modified, or otherwise altered without departing from the principles and spirit of the present invention. Therefore, the scope of the present invention should be determined by the following claims and their legal equivalents.