Internet DRAFT - draft-h-dots-mitigation-offload-expansion
draft-h-dots-mitigation-offload-expansion
DOTS Y. Hayashi
Internet-Draft NTT
Intended status: Experimental K. Nishizuka
Expires: April 18, 2019 NTT Communications
October 15, 2018
DDoS mitigation offload usecase and YANG module expansion in signal
channel
draft-h-dots-mitigation-offload-expansion-00
Abstract
This document describes a DDoS Mitigation offload usecase and an
expansion of the YANG module in the DOTS signal channel for
mitigating DDoS attack traffic correctly with general routers or
switches. The proposed usecase and YANG module enhance DOTS
capability to send attacker information and enable service providers
to mitigate DDoS attack traffic by using general routers or switches
in their intra-domain NW.
Status of This Memo
This Internet-Draft is submitted in full conformance with the
provisions of BCP 78 and BCP 79.
Internet-Drafts are working documents of the Internet Engineering
Task Force (IETF). Note that other groups may also distribute
working documents as Internet-Drafts. The list of current Internet-
Drafts is at https://datatracker.ietf.org/drafts/current/.
Internet-Drafts are draft documents valid for a maximum of six months
and may be updated, replaced, or obsoleted by other documents at any
time. It is inappropriate to use Internet-Drafts as reference
material or to cite them other than as "work in progress."
This Internet-Draft will expire on April 18, 2019.
Copyright Notice
Copyright (c) 2018 IETF Trust and the persons identified as the
document authors. All rights reserved.
This document is subject to BCP 78 and the IETF Trust's Legal
Provisions Relating to IETF Documents
(https://trustee.ietf.org/license-info) in effect on the date of
publication of this document. Please review these documents
carefully, as they describe your rights and restrictions with respect
Hayashi & Nishizuka Expires April 18, 2019 [Page 1]
Internet-Draft draft-h-dots-mitigation-offload-expansion October 2018
to this document. Code Components extracted from this document must
include Simplified BSD License text as described in Section 4.e of
the Trust Legal Provisions and are provided without warranty as
described in the Simplified BSD License.
Table of Contents
1. Introduction . . . . . . . . . . . . . . . . . . . . . . . . 2
2. Terminology . . . . . . . . . . . . . . . . . . . . . . . . . 3
3. DDoS Mitigation Offload Usecase . . . . . . . . . . . . . . . 3
4. Expansion of DOTS Signal Channel . . . . . . . . . . . . . . 6
4.1. Expansion of YANG Module of DOTS Signal Channel . . . . . 6
4.2. Expansion of Mapping Parameters to CBOR . . . . . . . . . 8
5. Security Considerations . . . . . . . . . . . . . . . . . . . 8
6. IANA Considerations . . . . . . . . . . . . . . . . . . . . . 8
7. Acknowledgement . . . . . . . . . . . . . . . . . . . . . . . 8
8. References . . . . . . . . . . . . . . . . . . . . . . . . . 8
8.1. Normative References . . . . . . . . . . . . . . . . . . 8
8.2. Informative References . . . . . . . . . . . . . . . . . 9
Authors' Addresses . . . . . . . . . . . . . . . . . . . . . . . 9
1. Introduction
Volume based distributed denial-of-service (DDoS) attacks such as DNS
amplification attacks are threats for internet service providers
because of their impact on network services. When such attacks
occur, service providers have to mitigate them immediately to protect
or recover their service. Therefore, for the service providers to
immediately protect their network services from DDoS attacks, DDoS
mitigation needs to be automated. To automate DDoS attack
mitigation, it is desirable that multi-vendor elements concerned with
DDoS attack detection, mitigation and so on collaborate.
On the other hand, the number of DDoS Mitigation Systems (DMS) that
can be deployed in a service providers network is limited due to
equipment cost. Thus, DMS's utilization rate can reach maximum
capacity soon when the volume of DDoS attacks is enormous. When the
rate reaches maximum capacity, the network needs to offload
mitigation action from the DMS to cost-effective network devices such
as switches and routers.
DDoS Open Threat Signaling (DOTS) is a protocol to standardize real-
time signaling, threat-handling requests, and data between the multi-
vendor elements [I-D.ietf-dots-use-cases]. This document describes
an automated DDoS Mitigation offload usecase inherited from a DOTS
usecase [I-D.ietf-dots-use-cases], which enables cost-effective DDoS
Mitigation in an intra-domain network. Furthermore, this document
describes an expansion of the YANG module in the DOTS signal channel
Hayashi & Nishizuka Expires April 18, 2019 [Page 2]
Internet-Draft draft-h-dots-mitigation-offload-expansion October 2018
[I-D.ietf-dots-signal-channel], which enables a service provider's
network to mitigate attack traffic correctly in the usecase.
2. Terminology
The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
"SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED", "MAY", and
"OPTIONAL" in this document are to be interpreted as described in
[RFC2119]
The readers should be familiar with the terms defined in
[I-D.ietf-dots-requirements] [I-D.ietf-dots-use-cases]
The terminology related to YANG data modules is defined in [RFC7950]
In addition, this document uses the terms defined below:
Mitigation offload: Getting rid of a DMS's mitigation action and
assigning the action to another entity when the utilization rate
of the DMS reaches an inacceptable level.
DDoS attackers: Devices that carry out DDoS attacks.
Utilization rate: A scale to measure load of an entity such as link
utilization rate and CPU utilization rate.
Top Talker: A top N list of attackers who attack the same target.
The list is ordered in terms of a two-tuple bandwidth such as bps
or pps.
3. DDoS Mitigation Offload Usecase
The purpose of this usecase is to protect intra-domain network from
volume-based DDoS attacks automatically, cost-effectively, and
vendor-independently. The usecase is inherited from the DDoS
Orchestration usecase in [I-D.ietf-dots-use-cases] and works on an
intra-domain network.
Figure 1 and Figure 2 show a component diagram and C-plane sequence
diagram of the usecase, respectively.
Hayashi & Nishizuka Expires April 18, 2019 [Page 3]
Internet-Draft draft-h-dots-mitigation-offload-expansion October 2018
+----------+
| network |C
| adminis |-+
| trator | |
+----------+ |
|
+----------+ | S+--------------+C S+-----------+
|telemetry/| +-->| |---->| DDoS |+
|monitoring|---->| Orchestrator |<----| mitigation||
|systems |C S| |S C| systems ||
+----------+ +--------------+ +-----------+|
| +----------+
| ex. BGP, BGP Flowspec
|
| +------------------+
+->| Routers/Switches |+
+------------------+|
+-----------------+
* C is for DOTS Client functionality
* S is for DOTS Server functionality
Figure 1: Component diagram of DDoS Mitigation offload usecase
This component diagram shown in Figure 1 differs from that of DDoS
Orchestration usecase in [I-D.ietf-dots-use-cases] in some respects.
First, the DDoS mitigation systems have a DOTS client function to
send mitigation requests to the orchestrator. Second, the
orchestrator sends a request to routers or switches to block attack
traffic.
Hayashi & Nishizuka Expires April 18, 2019 [Page 4]
Internet-Draft draft-h-dots-mitigation-offload-expansion October 2018
+-------+ +----------+ +------------+ +----------+ +----------+
|network| |telemetry/|+ | | |DDoS |+ |Routers |+
|adminis| |monitoring|| |Orchestrator| |Mitigation|| |Switches ||
|trator | |systems || | | |Systems || | ||
+-------+ +----------+| +------------+ +----------+| +---------+|
| +----------+ | +----------+ +---------+
| | DOTS: | | |
| | Mitigation | | |
| | Request | | |
| DOTS: |C------------>S| | |
| Mitigation | | ex. BGP: | |
| Request | | Redirect | |
|C------------------------->S| Attack Traffic | |
| | | to DMS | |
| | |---------------------------------->|
| | | | |
| | | DOTS: | |
| | | Mitigation Request | |
| | |S<-----------------C| |
| | | | |
| | | ex. BGP Flowspec | |
| | | Mitigate | |
| | | Attack Traffic | |
| | |---------------------------------->|
| | | | |
* C is for DOTS Client functionality
* S is for DOTS Server functionality
Figure 2: C-plane Sequence diagram of DDoS Mitigation offload usecase
In this usecase, when the telemetry/monitoring system detects a
volume-based DDoS attack in the network, it sends a DOTS mitigation
request to the orchestrator with target information such as target-
prefix. Then, the network administrator confirms the request and
sends a DOTS mitigation request to the orchestrator with the target
information.
After that, the orchestrator requests the routers or switches to
redirect attack traffic to the DMS by a configuration protocol such
as a routing protocol like BGP [RFC4271] on the basis of the target
information. Then the DMS analyzes attack traffic in detail and
detects not only target but also attacker information, such as top-
talker, and mitigates the attack traffic on the basis of the detected
information.
Hayashi & Nishizuka Expires April 18, 2019 [Page 5]
Internet-Draft draft-h-dots-mitigation-offload-expansion October 2018
When the volume-based attack becomes intense, DMS's utilization rate
can reach maximum capacity. Then the DMS sends a DOTS mitigation
request to the orchestrator as an offload request with the detection
information. After that, the orchestrator requests the routers or
switches to block attack traffic to the DMS by dissemination of flow
specification rules protocols such as BGP flowspec [RFC5575] on the
basis of the detected information.
4. Expansion of DOTS Signal Channel
It is desirable that the routers or switches mitigate attack traffic
correctly after the DMS sends a DOTS Mitigation Request as an offload
request in the usecase described in Section 3. For mitigating attack
traffic correctly, this document proposes expanding DOTS signal
channel [I-D.ietf-dots-signal-channel] so that it can send not only
target information but also representative attacker information such
as top talker. Note that it is difficult to send all attacker
information because there is an enormous number of attackers when a
volume-based DDoS attack occurs.
This section describes expansion of the YANG module [RFC7950] and
mapping parameters to CBOR [RFC7049] of the DOTS Signal Channel.
4.1. Expansion of YANG Module of DOTS Signal Channel
Figure 3 shows an expanded YANG Module of the DOTS Signal Channel.
Note that the "augment" statement allows a module to insert
additional nodes into existing data models. The module defines a new
grouping "attacker" and adds the grouping to an existing Signal
Channel module by using an "augment" statement.
module ietf-dots-signal-channel-mitigation-offload-expansion {
yang-version 1.1;
namespace "urn:ietf:params:xml:ns:yang:
ietf-dots-signal-channel:mitigation-offload-expansion";
import ietf-dots-signal-channel {
prefix signal;
}
import ietf-inet-types {
prefix inet;
}
organization
"IETF DDoS Open Threat Signaling (DOTS) Working Group";
Hayashi & Nishizuka Expires April 18, 2019 [Page 6]
Internet-Draft draft-h-dots-mitigation-offload-expansion October 2018
contact
"WG Web: <https://datatracker.ietf.org/wg/dots/>
WG List: <mailto:dots@ietf.org>
Editor: Yuhei Hayashi
<mailto:hayashi.yuhei@lab.ntt.co.jp>
description
"This module contains the YANG definition for expanding signaling
messages exchanged between a DOTS client and a DOTS server.
Copyright (c) 2018 IETF Trust and the persons identified as
authors of the code. All rights reserved.
Redistribution and use in source and binary forms, with or
without modification, is permitted pursuant to, and subject
to the license terms contained in, the Simplified BSD License
set forth in Section 4.c of the IETF Trust's Legal Provisions
Relating to IETF Documents
(http://trustee.ietf.org/license-info).
This version of this YANG module is part of RFC XXXX; see
the RFC itself for full legal notices.";
revision 2018-07-30 {
description
"Initial revision.";
reference
"RFC XXXX: ietf-dots-signal-channel";
}
/*
* Groupings
*/
grouping attacker {
description
"Specifies the attackers of the mitigation request.";
leaf-list attacker-top-talker-prefix {
type inet:ip-prefix;
description
"IPv4/IPv6 prefix identifying the top-talker in attackers.";
}
}
/*
* Main Container for DOTS Signal Channel Expansion
*/
augment "/signal:dots-signal/signal:scope/"{
uses attacker;
}
Hayashi & Nishizuka Expires April 18, 2019 [Page 7]
Internet-Draft draft-h-dots-mitigation-offload-expansion October 2018
}
Figure 3: Expansion of YANG Module of DOTS Signal Channel
4.2. Expansion of Mapping Parameters to CBOR
Figure 4 shows expansion of Mapping Parameters to CBOR [RFC7049]
related to Figure 3.
+----------------------+-------------+-----+---------------+--------+
| Parameter Name | YANG | CBOR| CBOR Major | JSON |
| | Type | Key | Type & | Type |
| | | | Information | |
+----------------------+-------------+-----+---------------+--------+
| ... | ... | ...| ... | ... |
| attacker-top-talker | leaf-list | XX | 4 array | Array |
| -prefix | inet: | | | |
| | ip-prefix | | 3 text string | String |
+----------------------+-------------+-----+---------------+--------+
Figure 4: Expansion of Mapping Parameters to CBOR
5. Security Considerations
TBD
6. IANA Considerations
TBD
7. Acknowledgement
TBD
8. References
8.1. Normative References
[RFC2119] Bradner, S., "Key words for use in RFCs to Indicate
Requirement Levels", BCP 14, RFC 2119,
DOI 10.17487/RFC2119, March 1997,
<https://www.rfc-editor.org/info/rfc2119>.
Hayashi & Nishizuka Expires April 18, 2019 [Page 8]
Internet-Draft draft-h-dots-mitigation-offload-expansion October 2018
[RFC4271] Rekhter, Y., Ed., Li, T., Ed., and S. Hares, Ed., "A
Border Gateway Protocol 4 (BGP-4)", RFC 4271,
DOI 10.17487/RFC4271, January 2006,
<https://www.rfc-editor.org/info/rfc4271>.
[RFC5575] Marques, P., Sheth, N., Raszuk, R., Greene, B., Mauch, J.,
and D. McPherson, "Dissemination of Flow Specification
Rules", RFC 5575, DOI 10.17487/RFC5575, August 2009,
<https://www.rfc-editor.org/info/rfc5575>.
[RFC7049] Bormann, C. and P. Hoffman, "Concise Binary Object
Representation (CBOR)", RFC 7049, DOI 10.17487/RFC7049,
October 2013, <https://www.rfc-editor.org/info/rfc7049>.
[RFC7950] Bjorklund, M., Ed., "The YANG 1.1 Data Modeling Language",
RFC 7950, DOI 10.17487/RFC7950, August 2016,
<https://www.rfc-editor.org/info/rfc7950>.
8.2. Informative References
[I-D.ietf-dots-requirements]
Mortensen, A., Moskowitz, R., and R. K, "Distributed
Denial of Service (DDoS) Open Threat Signaling
Requirements", draft-ietf-dots-requirements-15 (work in
progress), August 2018.
[I-D.ietf-dots-signal-channel]
K, R., Boucadair, M., Patil, P., Mortensen, A., and N.
Teague, "Distributed Denial-of-Service Open Threat
Signaling (DOTS) Signal Channel Specification", draft-
ietf-dots-signal-channel-25 (work in progress), September
2018.
[I-D.ietf-dots-use-cases]
Dobbins, R., Migault, D., Fouant, S., Moskowitz, R.,
Teague, N., Xia, L., and K. Nishizuka, "Use cases for DDoS
Open Threat Signaling", draft-ietf-dots-use-cases-16 (work
in progress), July 2018.
Authors' Addresses
Yuhei Hayashi
NTT
3-9-11, Midori-cho
Musashino-shi , Tokyo 180-8585
Japan
Email: hayashi.yuhei@lab.ntt.co.jp, yuuhei.hayashi@gmail.com
Hayashi & Nishizuka Expires April 18, 2019 [Page 9]
Internet-Draft draft-h-dots-mitigation-offload-expansion October 2018
Kaname Nishizuka
NTT Communications
GranPark 16F 3-4-1 Shibaura, Minato-ku
Tokyo 108-8118
Japan
Email: kaname@nttv6.jp
Hayashi & Nishizuka Expires April 18, 2019 [Page 10]