Internet DRAFT - draft-cui-anti-ddos-problem-statement

draft-cui-anti-ddos-problem-statement







IETF                                                              Y. Cui
Internet-Draft                                       Tsinghua University
Intended status: Informational                                     L. Li
Expires: 25 April 2024                                          L. Zhang
                                                 Zhongguancun Laboratory
                                                         23 October 2023


        Problem Statement:Collaborative Defense of DDoS Attacks
                draft-cui-anti-ddos-problem-statement-02

Abstract

   This document presents a problem statement on collaborative
   mitigation of Distributed Denial-of-Service (DDoS) attacks.
   The evolving trends of DDoS attacks, including their types,
   intensities, and attack methods, pose formidable challenges to
   existing defense systems.  This problem statement examines the
   current defense landscape, highlighting the distributed deployment of
   defense systems across various network positions and the imbalances
   in defense capabilities.  Collaboration is crucial for effective DDoS
   attack mitigation, considering that a considerable number of attacks
   are spread across operators.  The existing collaborative framework,
   DOTS, shows promise but requires addressing these challenges to
   enhance its efficacy.  The existing collaborative framework DOTS
   demonstrates potential, but there are still numerous challenges in
   its practical application.  This document aims to address these key
   issues that impact the implementation of collaborative technologies.

Status of This Memo

   This Internet-Draft is submitted in full conformance with the
   provisions of BCP 78 and BCP 79.

   Internet-Drafts are working documents of the Internet Engineering
   Task Force (IETF).  Note that other groups may also distribute
   working documents as Internet-Drafts.  The list of current Internet-
   Drafts is at https://datatracker.ietf.org/drafts/current/.

   Internet-Drafts are draft documents valid for a maximum of six months
   and may be updated, replaced, or obsoleted by other documents at any
   time.  It is inappropriate to use Internet-Drafts as reference
   material or to cite them other than as "work in progress."

   This Internet-Draft will expire on 25 April 2024.






Cui, et al.               Expires 25 April 2024                 [Page 1]

Internet-Draft   Problem Statement:Collaborative Defense    October 2023


Copyright Notice

   Copyright (c) 2023 IETF Trust and the persons identified as the
   document authors.  All rights reserved.

   This document is subject to BCP 78 and the IETF Trust's Legal
   Provisions Relating to IETF Documents (https://trustee.ietf.org/
   license-info) in effect on the date of publication of this document.
   Please review these documents carefully, as they describe your rights
   and restrictions with respect to this document.  Code Components
   extracted from this document must include Revised BSD License text as
   described in Section 4.e of the Trust Legal Provisions and are
   provided without warranty as described in the Revised BSD License.

Table of Contents

   1.  Introduction  . . . . . . . . . . . . . . . . . . . . . . . .   2
     1.1.  Requirements Language . . . . . . . . . . . . . . . . . .   2
   2.  DDoS Attacks  . . . . . . . . . . . . . . . . . . . . . . . .   3
   3.  Current Defense Landscape . . . . . . . . . . . . . . . . . .   3
   4.  The Necessity of Collaboration  . . . . . . . . . . . . . . .   4
   5.  Existing Collaborative Methods  . . . . . . . . . . . . . . .   4
   6.  Current Collaboration Challenges  . . . . . . . . . . . . . .   4
   7.  IANA Considerations . . . . . . . . . . . . . . . . . . . . .   5
   8.  Security Considerations . . . . . . . . . . . . . . . . . . .   5
   9.  Normative References  . . . . . . . . . . . . . . . . . . . .   5
   Acknowledgements  . . . . . . . . . . . . . . . . . . . . . . . .   6
   Authors' Addresses  . . . . . . . . . . . . . . . . . . . . . . .   6

1.  Introduction

   Distributed Denial of Service (DDoS) attacks have become a pervasive
   threat, causing significant disruptions to online services and
   networks.  Collaborative mitigation strategies are needed to
   effectively counter these attacks.  This problem statement aims to
   address the challenges and issues associated with collaborative
   defense against DDoS attacks.

1.1.  Requirements Language

   The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
   "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED", "MAY", and
   "OPTIONAL" in this document are to be interpreted as described in
   BCP 14 [RFC2119] [RFC8174] when, and only when, they appear in all
   capitals, as shown here.






Cui, et al.               Expires 25 April 2024                 [Page 2]

Internet-Draft   Problem Statement:Collaborative Defense    October 2023


2.  DDoS Attacks

   A Distributed Denial-of-Service (DDoS) attack is a method where
   multiple hosts are controlled to simultaneously target and disrupt
   the services, hindering legitimate users' access.  DDoS attacks can
   be categorized into three main types based on their effects: resource
   exhaustion-based, link exhaustion-based, and network exhaustion-based
   attacks.  Due to their low cost and significant impact, DDoS attacks
   have become increasingly popular, with attackers continuously
   improving their techniques and intensifying their attacks.  The
   following trends characterize the evolution of DDoS attacks:

   *  Increase in peak and average attack traffic, reaching terabit-
      level peak volume.

   *  Rapid surge in attack traffic, capable of escalating to 800 Gbps
      within seconds.

   *  Emergence of combination attacks as the mainstream approach, where
      attackers employ multiple attack methods concurrently or
      sequentially.

   *  Continual emergence of new attack techniques, such as leveraging
      novel vulnerabilities or using innovative means to exploit
      weaknesses in defense systems.  These evolving DDoS attack trends
      pose significant challenges to current DDoS mitigation systems.

3.  Current Defense Landscape

   DDoS defense systems have been deployed at various nodes in the
   global network topology.  From a network topology perspective, the
   deployment locations of DDoS defense systems can be classified as
   follows:

   *  International ingress/egress points: These critical nodes handle
      the exchange of network packets between different countries and
      regions.  Typically, they deploy DDoS mitigation capabilities like
      blackhole routing and BGP Flowspec.

   *  ISP backbone and metropolitan networks: These networks possess
      abundant resources and robust mitigation capabilities to handle
      high-volume attacks.  However, due to the substantial volume of
      network traffic, traffic analysis can be time-consuming.

   *  Software service providers: As the last line of defense, these
      providers have detection capabilities for various attacks.
      However, limited resources are allocated for mitigation due to
      cost constraints.  The internet is a highly complex and extensive



Cui, et al.               Expires 25 April 2024                 [Page 3]

Internet-Draft   Problem Statement:Collaborative Defense    October 2023


      network composed of numerous LANs (Local Area Networks).
      Different LANs have different owners, varying in scale and DDoS
      defense resource allocations.

4.  The Necessity of Collaboration

   DDoS attacks have become an international threat, often traversing
   multiple LANs and involving various network operators, spanning
   different regions and countries.  A global view of the internet is
   crucial for understanding the propagation behavior of malicious
   traffic.  Moreover, in terms of DDoS attack mitigation, protecting
   the front-end of the malicious traffic propagation chain is more
   effective.  This is because malicious traffic not only disrupts the
   services of target victims but can also impact critical links along
   the path, such as international ingress/egress points and
   interconnections between different ISPs.  Additionally, with the
   increasing intensity and evolving tactics of DDoS attacks, relying
   solely on the defense capabilities at one network location is
   inadequate.  Thus, collaboration among multiple defense systems
   upstream and downstream in the network is necessary.  Based on the
   analysis above, we identify the following information that needs to
   be communicated through collaboration:

   *  Attack details, including ongoing and historical attacks.

   *  Malicious IP addresses or URIs.

   *  Threat intelligence.

5.  Existing Collaborative Methods

   The DOTS framework[RFC8612] provides a foundation for collaborative
   defense DDoS attacks by facilitating threat signaling and coordinated
   mitigation actions.  It enables the exchange of attack-related
   information, enhances situational awareness, and enables effective
   response coordination among involved parties.  [RFC8811] describes
   the technical framework of DOTS.  [RFC8782] and [RFC8816] describe
   the communication methods between DOTS clients and servers.
   [RFC8903], [RFC9005], and others provide use cases for using DOTS and
   its communication methods.

6.  Current Collaboration Challenges

   Through an analysis of practical issues encountered in DOTS
   applications, we have identified the following key challenges in
   current collaboration efforts:





Cui, et al.               Expires 25 April 2024                 [Page 4]

Internet-Draft   Problem Statement:Collaborative Defense    October 2023


   *  Lack of consensus on attack definitions: Currently, there is no
      unified standard for categorizing and naming DDoS attacks.  This
      lack of consensus regarding attack definitions may lead to
      misunderstandings between mitigators and requesters when
      transmitting collaborative information.  Establishing attack
      definitions would help both parties better define collaboration
      requirements and available capabilities.

   *  Absence of attack type-based collaborative data models: While DOTS
      provides parameters for describing attack details, the importance
      of specific attack detail parameters varies depending on the type
      of DDoS attack.  For example, source IP address is crucial for
      reflection-based attacks but may not be necessary for flooding
      attacks.  To enhance collaboration efficiency, it is essential to
      define collaborative data models based on attack types, including
      attack details and mitigation specifics.

   *  Lack of specific scenario guidance for collaborative information
      transmission: Mitigation requesters often lack a comprehensive
      understanding of defense capabilities at different network
      locations.  Providing guidance for collaborative information
      transmission methods based on specific collaboration scenarios
      allows mitigators to understand when to initiate mitigation
      requests and which mitigation capabilities they should offer.  In
      conclusion, addressing these challenges will improve the
      effectiveness of collaborative DDoS mitigation and provide better
      protection against the growing threat of DDoS attacks.

7.  IANA Considerations

   This document includes no request to IANA.

8.  Security Considerations

9.  Normative References

   [RFC8612]  Mortensen, A., Reddy, T., and R. Moskowitz, "DDoS Open
              Threat Signaling (DOTS) Requirements", RFC 8612,
              DOI 10.17487/RFC8612, May 2019,
              <https://www.rfc-editor.org/rfc/rfc8612>.

   [RFC8811]  Mortensen, A., Ed., Reddy.K, T., Ed., Andreasen, F.,
              Teague, N., and R. Compton, "DDoS Open Threat Signaling
              (DOTS) Architecture", RFC 8811, DOI 10.17487/RFC8811,
              August 2020, <https://www.rfc-editor.org/rfc/rfc8811>.






Cui, et al.               Expires 25 April 2024                 [Page 5]

Internet-Draft   Problem Statement:Collaborative Defense    October 2023


   [RFC8782]  Reddy.K, T., Ed., Boucadair, M., Ed., Patil, P.,
              Mortensen, A., and N. Teague, "Distributed Denial-of-
              Service Open Threat Signaling (DOTS) Signal Channel
              Specification", RFC 8782, DOI 10.17487/RFC8782, May 2020,
              <https://www.rfc-editor.org/rfc/rfc8782>.

   [RFC8816]  Rescorla, E. and J. Peterson, "Secure Telephone Identity
              Revisited (STIR) Out-of-Band Architecture and Use Cases",
              RFC 8816, DOI 10.17487/RFC8816, February 2021,
              <https://www.rfc-editor.org/rfc/rfc8816>.

   [RFC8903]  Dobbins, R., Migault, D., Moskowitz, R., Teague, N., Xia,
              L., and K. Nishizuka, "Use Cases for DDoS Open Threat
              Signaling", RFC 8903, DOI 10.17487/RFC8903, May 2021,
              <https://www.rfc-editor.org/rfc/rfc8903>.

   [RFC9005]  Litkowski, S., Sivabalan, S., Tantsura, J., Hardwick, J.,
              and C. Li, "Path Computation Element Communication
              Protocol (PCEP) Extension for Associating Policies and
              Label Switched Paths (LSPs)", RFC 9005,
              DOI 10.17487/RFC9005, March 2021,
              <https://www.rfc-editor.org/rfc/rfc9005>.

   [RFC2119]  Bradner, S., "Key words for use in RFCs to Indicate
              Requirement Levels", BCP 14, RFC 2119,
              DOI 10.17487/RFC2119, March 1997,
              <https://www.rfc-editor.org/rfc/rfc2119>.

   [RFC8174]  Leiba, B., "Ambiguity of Uppercase vs Lowercase in RFC
              2119 Key Words", BCP 14, RFC 8174, DOI 10.17487/RFC8174,
              May 2017, <https://www.rfc-editor.org/rfc/rfc8174>.

Acknowledgements

Authors' Addresses

   Yong Cui
   Tsinghua University
   Beijing, 100084
   China
   Email: cuiyong@tsinghua.edu.cn
   URI:   http://www.cuiyong.net/


   Linzhe Li
   Zhongguancun Laboratory
   Beijing, 100094
   China



Cui, et al.               Expires 25 April 2024                 [Page 6]

Internet-Draft   Problem Statement:Collaborative Defense    October 2023


   Email: lilz@zgclab.edu.cn


   Lei Zhang
   Zhongguancun Laboratory
   Beijing, 100094
   China
   Email: zhanglei@zgclab.edu.cn











































Cui, et al.               Expires 25 April 2024                 [Page 7]