Down the Black Hole: Dismantling Operational Practices of ...effective mitigation strategy. Only 27%...

70
Down the Black Hole: Dismantling Operational Practices of BGP Blackholing at IXPs Marcin Nawrocki , Jeremias Blendin, Christoph Dietzel, Thomas C. Schmidt, Matthias Wählisch

Transcript of Down the Black Hole: Dismantling Operational Practices of ...effective mitigation strategy. Only 27%...

Page 1: Down the Black Hole: Dismantling Operational Practices of ...effective mitigation strategy. Only 27% of Blackhole Events correlate with DDoS. ... automatic DDoS mitigation. But: Anomalies

Down the Black Hole: Dismantling Operational Practices of BGP

Blackholing at IXPs

Marcin Nawrocki, Jeremias Blendin, Christoph Dietzel,Thomas C. Schmidt, Matthias Wählisch

Page 2: Down the Black Hole: Dismantling Operational Practices of ...effective mitigation strategy. Only 27% of Blackhole Events correlate with DDoS. ... automatic DDoS mitigation. But: Anomalies

The Internet suffers

DDoSThe problem!

BlackholingThe solution?

2

Page 3: Down the Black Hole: Dismantling Operational Practices of ...effective mitigation strategy. Only 27% of Blackhole Events correlate with DDoS. ... automatic DDoS mitigation. But: Anomalies

Common (mis) belief

Blackholing is an effective measure

to mitigate DDoS

3

Page 4: Down the Black Hole: Dismantling Operational Practices of ...effective mitigation strategy. Only 27% of Blackhole Events correlate with DDoS. ... automatic DDoS mitigation. But: Anomalies

Common (mis) belief

Blackholing is an effective measure

to mitigate DDoS

4

?

?

Page 5: Down the Black Hole: Dismantling Operational Practices of ...effective mitigation strategy. Only 27% of Blackhole Events correlate with DDoS. ... automatic DDoS mitigation. But: Anomalies

Our results. In a nutshell.

Blackholing drops only 50% of unwanted traffic.

Fine-grained blacklisting of attack signatures is an effective mitigation strategy.

Only 27% of Blackhole Events correlate with DDoS.

Other use cases exist for Blackholing but are very rare.

5

Efficiency Use Cases

Page 6: Down the Black Hole: Dismantling Operational Practices of ...effective mitigation strategy. Only 27% of Blackhole Events correlate with DDoS. ... automatic DDoS mitigation. But: Anomalies

Agenda

RecapHow does BGP Blackholing work at IXPs?

Deployment StatusHow well deployed is Blackholing in the real world?

Future EnhancementsHow should we configure fine-grained filtering?

7

Page 7: Down the Black Hole: Dismantling Operational Practices of ...effective mitigation strategy. Only 27% of Blackhole Events correlate with DDoS. ... automatic DDoS mitigation. But: Anomalies

I. How does BGP Blackholing work at IXPs?

8

https://en.wikipedia.org/wiki/Black_hole#/media/File:Black_hole_-_Messier_87_crop_max_res.jpg

Page 8: Down the Black Hole: Dismantling Operational Practices of ...effective mitigation strategy. Only 27% of Blackhole Events correlate with DDoS. ... automatic DDoS mitigation. But: Anomalies

Remotely-Triggered Blackholing at IXPs

9

IXP

Routeserver

Peer AS1

Peer AS3

Peer AS2Peering platform

WebserverVictim AS

Page 9: Down the Black Hole: Dismantling Operational Practices of ...effective mitigation strategy. Only 27% of Blackhole Events correlate with DDoS. ... automatic DDoS mitigation. But: Anomalies

Remotely-Triggered Blackholing at IXPs

10

IXP

Routeserver

Peer AS1

Peer AS3

Peer AS2Peering platform

WebserverVictim AS

DDoS Traffic

Legitimate Traffic

Page 10: Down the Black Hole: Dismantling Operational Practices of ...effective mitigation strategy. Only 27% of Blackhole Events correlate with DDoS. ... automatic DDoS mitigation. But: Anomalies

Remotely-Triggered Blackholing at IXPs

11

IXP

Routeserver

Peer AS1

Peer AS3

Peer AS2Peering platform

WebserverVictim AS

Blackhole

BGP Signal:RTBH for 1.2.3.4/32

IP: 1.2.3.4

Page 11: Down the Black Hole: Dismantling Operational Practices of ...effective mitigation strategy. Only 27% of Blackhole Events correlate with DDoS. ... automatic DDoS mitigation. But: Anomalies

Remotely-Triggered Blackholing at IXPs

12

IXP

Routeserver

Peer AS1

Peer AS3

Peer AS2Peering platform

WebserverVictim AS

Blackhole

BGP Signal:RTBH for /32That's the simple case.

BGP policies apply in the real world.

Page 12: Down the Black Hole: Dismantling Operational Practices of ...effective mitigation strategy. Only 27% of Blackhole Events correlate with DDoS. ... automatic DDoS mitigation. But: Anomalies

Remotely-Triggered Blackholing and BGP Policies

13

IXP

Routeserver

Peer AS1

Peer AS3

Peer AS2Peering platform

Webserver

BGP Signal:RTBH for 1.2.3.4/32

Victim AS

BGP Rejection Policy

Page 13: Down the Black Hole: Dismantling Operational Practices of ...effective mitigation strategy. Only 27% of Blackhole Events correlate with DDoS. ... automatic DDoS mitigation. But: Anomalies

Remotely-Triggered Blackholing and BGP Policies

14

IXP

Routeserver

Peer AS1

Peer AS3

Peer AS2Peering platform

WebserverVictim AS

BGP Rejection Policy

Blackhole

Page 14: Down the Black Hole: Dismantling Operational Practices of ...effective mitigation strategy. Only 27% of Blackhole Events correlate with DDoS. ... automatic DDoS mitigation. But: Anomalies

II. How well deployed is BGP Blackholing in the real world?

15

https://www.deutschlandfunk.de/media/thumbs/9/94864ed50859e6db43efb6c572614a3av1_max_755x424_b3535db83dc50e27c1bb1392364c95a2.jpg?key=2814f7

Page 15: Down the Black Hole: Dismantling Operational Practices of ...effective mitigation strategy. Only 27% of Blackhole Events correlate with DDoS. ... automatic DDoS mitigation. But: Anomalies

Our measurement approach

One of the worlds-largest IXPs as a central vantage point

Wholistic view: >100 days, all related data - no exceptions!

16

Page 16: Down the Black Hole: Dismantling Operational Practices of ...effective mitigation strategy. Only 27% of Blackhole Events correlate with DDoS. ... automatic DDoS mitigation. But: Anomalies

Our measurement approach

One of the worlds-largest IXPs as a central vantage point

Wholistic view: >100 days, all related data - no exceptions!

BGP data

• All RTBH messages from all route-servers

• RTBH announcements identifiable by BGP community and next-hop-IP

17

BGP Signal:RTBH for 1.2.3.4/32

Page 17: Down the Black Hole: Dismantling Operational Practices of ...effective mitigation strategy. Only 27% of Blackhole Events correlate with DDoS. ... automatic DDoS mitigation. But: Anomalies

Our measurement approach

One of the worlds-largest IXPs as a central vantage point

Wholistic view: >100 days, all related data - no exceptions!

Flow data

• All packets from/to prefixes, which have been blackholed at least once

• All packets which traverse the public switch-fabric (Sampling: 1/10000)

• Dropped packets identifiable by special MAC-address

18

DDoS Traffic

Legitimate Traffic

Page 18: Down the Black Hole: Dismantling Operational Practices of ...effective mitigation strategy. Only 27% of Blackhole Events correlate with DDoS. ... automatic DDoS mitigation. But: Anomalies

Our measurement approach

One of the worlds-largest IXPs as a central vantage point

Wholistic view: >100 days, all related data - no exceptions!

Flow data

• All packets from/to prefixes, which have been blackholed at least once

• All packets which traverse the public switch-fabric (Sampling: 1/10000)

• Dropped packets identifiable by special MAC-address

BGP data

• All RTBH messages from all route-servers

• RTBH announcements identifiable by BGP community and next-hop-IP

19

We verified: Time is in sync!

Page 19: Down the Black Hole: Dismantling Operational Practices of ...effective mitigation strategy. Only 27% of Blackhole Events correlate with DDoS. ... automatic DDoS mitigation. But: Anomalies

Do all IXP member accept RTBH announcements ?

20

Page 20: Down the Black Hole: Dismantling Operational Practices of ...effective mitigation strategy. Only 27% of Blackhole Events correlate with DDoS. ... automatic DDoS mitigation. But: Anomalies

Successful mitigation depends on the announced RTBH prefix length

21

Page 21: Down the Black Hole: Dismantling Operational Practices of ...effective mitigation strategy. Only 27% of Blackhole Events correlate with DDoS. ... automatic DDoS mitigation. But: Anomalies

Successful mitigation depends on the announced RTBH prefix length

22

Page 22: Down the Black Hole: Dismantling Operational Practices of ...effective mitigation strategy. Only 27% of Blackhole Events correlate with DDoS. ... automatic DDoS mitigation. But: Anomalies

Successful mitigation depends on the announced RTBH prefix length

23

/32-RTBHs have a mean drop rate of 50%.But they cover 99% of the to-be-blackholed traffic.

Page 23: Down the Black Hole: Dismantling Operational Practices of ...effective mitigation strategy. Only 27% of Blackhole Events correlate with DDoS. ... automatic DDoS mitigation. But: Anomalies

How fast do IXP members react to DDoS events?

24

Page 24: Down the Black Hole: Dismantling Operational Practices of ...effective mitigation strategy. Only 27% of Blackhole Events correlate with DDoS. ... automatic DDoS mitigation. But: Anomalies

Measurement challengeMultiple RTBHs cover the same attack

25

Page 25: Down the Black Hole: Dismantling Operational Practices of ...effective mitigation strategy. Only 27% of Blackhole Events correlate with DDoS. ... automatic DDoS mitigation. But: Anomalies

Measurement challengeMultiple RTBHs cover the same attack

26

Page 26: Down the Black Hole: Dismantling Operational Practices of ...effective mitigation strategy. Only 27% of Blackhole Events correlate with DDoS. ... automatic DDoS mitigation. But: Anomalies

Measurement challengeMultiple RTBHs cover the same attack

27

Multiple RTBHs!

Page 27: Down the Black Hole: Dismantling Operational Practices of ...effective mitigation strategy. Only 27% of Blackhole Events correlate with DDoS. ... automatic DDoS mitigation. But: Anomalies

Measurement challengeMultiple RTBHs cover the same attack

28

Time-based clustering of RTBHs

Page 28: Down the Black Hole: Dismantling Operational Practices of ...effective mitigation strategy. Only 27% of Blackhole Events correlate with DDoS. ... automatic DDoS mitigation. But: Anomalies

Measurement challengeMultiple RTBHs cover the same attack

29

What happens before RTBH Events?

Page 29: Down the Black Hole: Dismantling Operational Practices of ...effective mitigation strategy. Only 27% of Blackhole Events correlate with DDoS. ... automatic DDoS mitigation. But: Anomalies

Analysis of 72 hours before an RTBH Event

Use a sliding window algorithm (EWMA) to infer whether one of the monitored features exhibits an anomalous peak:

i. number of packets

ii. number of unique destination ports

iii. number of flows

iv. number of unique source IP addresses

v. number of non-TCP flows

30

Page 30: Down the Black Hole: Dismantling Operational Practices of ...effective mitigation strategy. Only 27% of Blackhole Events correlate with DDoS. ... automatic DDoS mitigation. But: Anomalies

Analysis of 72 hours before an RTBH Event

31

TCP SYN Attacks

GRE Floods

Amplification Attacks

Use a sliding window algorithm (EWMA) to infer whether one of the monitored features exhibits an anomalous peak:

i. number of packets

ii. number of unique destination ports

iii. number of flows

iv. number of unique source IP addresses

v. number of non-TCP flows

Page 31: Down the Black Hole: Dismantling Operational Practices of ...effective mitigation strategy. Only 27% of Blackhole Events correlate with DDoS. ... automatic DDoS mitigation. But: Anomalies

Most anomalies occur up to 10 minutes before an RTBH Event

32

Page 32: Down the Black Hole: Dismantling Operational Practices of ...effective mitigation strategy. Only 27% of Blackhole Events correlate with DDoS. ... automatic DDoS mitigation. But: Anomalies

Most anomalies occur up to 10 minutes before an RTBH Event

33

This short reaction time indicates automatic DDoS mitigation.

Page 33: Down the Black Hole: Dismantling Operational Practices of ...effective mitigation strategy. Only 27% of Blackhole Events correlate with DDoS. ... automatic DDoS mitigation. But: Anomalies

But: Anomalies before RTBH are uncommon!

34

Traffic ≤ 72 hours Anomaly ≤ 10 min % RTBH Events

✓ ✓ 27%

✓ ✗ 27%

✗ - 46%

Page 34: Down the Black Hole: Dismantling Operational Practices of ...effective mitigation strategy. Only 27% of Blackhole Events correlate with DDoS. ... automatic DDoS mitigation. But: Anomalies

WHY?

35

Page 35: Down the Black Hole: Dismantling Operational Practices of ...effective mitigation strategy. Only 27% of Blackhole Events correlate with DDoS. ... automatic DDoS mitigation. But: Anomalies

Other use-cases?

36

Prefix Squatting Protection

Prevent hijacking of address space that is assigned but not announced.

Prefix squatting is easy to deploy because there is no competitive announcement.

Deploy censorship by blackholing traffic to content servers.

Block malicious clients, e.g., port & vulnerability scanners.

ContentBlocking

Page 36: Down the Black Hole: Dismantling Operational Practices of ...effective mitigation strategy. Only 27% of Blackhole Events correlate with DDoS. ... automatic DDoS mitigation. But: Anomalies

Prefix Squatting Protection

37

Pre

fix

Len

gth

[b

its]

RTB

H E

ven

ts (l

og1

0)

Page 37: Down the Black Hole: Dismantling Operational Practices of ...effective mitigation strategy. Only 27% of Blackhole Events correlate with DDoS. ... automatic DDoS mitigation. But: Anomalies

Other use-cases?

38

Prefix Squatting Protection

Prevent hijacking of address space that is assigned but not announced.

Prefix squatting is easy to deploy becausethere is no competitive announcement.

Deploy censorship by blackholing traffic to content servers.

Block malicious clients, e.g., port & vulnerability scanners.

ContentBlocking

New use-cases are infrequent.70% of RTBH Events still inexplicable.

Page 38: Down the Black Hole: Dismantling Operational Practices of ...effective mitigation strategy. Only 27% of Blackhole Events correlate with DDoS. ... automatic DDoS mitigation. But: Anomalies

Vantage point bias?

1. Packet sampling and private-network-interconnections hide traffic.

39https://de.wikipedia.org/wiki/Datei:Iceberg.jpg

Page 39: Down the Black Hole: Dismantling Operational Practices of ...effective mitigation strategy. Only 27% of Blackhole Events correlate with DDoS. ... automatic DDoS mitigation. But: Anomalies

Vantage point bias?

1. Packet sampling and private-network-interconnections hide traffic.

2. ASes might announce RTBHs at all point-of-presence despite local attacks.

40https://de.wikipedia.org/wiki/Datei:Iceberg.jpg

Page 40: Down the Black Hole: Dismantling Operational Practices of ...effective mitigation strategy. Only 27% of Blackhole Events correlate with DDoS. ... automatic DDoS mitigation. But: Anomalies

Vantage point bias?

1. Packet sampling and private-network-interconnections hide traffic.

2. ASes might announce RTBHs at all point-of-presence despite local attacks.

But: Related work [IMC'18] using distributedmeasurements reached similar results!

41https://de.wikipedia.org/wiki/Datei:Iceberg.jpgJonker et al, A First Joint Look at DoS Attacks and BGP Blackholing, IMC 2018

Page 41: Down the Black Hole: Dismantling Operational Practices of ...effective mitigation strategy. Only 27% of Blackhole Events correlate with DDoS. ... automatic DDoS mitigation. But: Anomalies

III. How should we configure fine-grained filtering?

43

https://st.depositphotos.com/1021779/4520/i/950/depositphotos_45205477-stock-photo-three-ducklings-in-a-pond.jpg

Page 42: Down the Black Hole: Dismantling Operational Practices of ...effective mitigation strategy. Only 27% of Blackhole Events correlate with DDoS. ... automatic DDoS mitigation. But: Anomalies

RTBH - Pro and Con

RTBHs drop DDoS traffic early in the network.

RTBHs complete the attack, the victim is unreachable.

44

THE GOOD THE UGLY

Page 43: Down the Black Hole: Dismantling Operational Practices of ...effective mitigation strategy. Only 27% of Blackhole Events correlate with DDoS. ... automatic DDoS mitigation. But: Anomalies

RTBH - Pro and Con

RTBHs drop DDoS traffic early in the network.

RTBHs complete the attack, the victim is unreachable.

45

THE GOOD THE UGLY

Fine-grained filtering would keep a service reachable.

Page 44: Down the Black Hole: Dismantling Operational Practices of ...effective mitigation strategy. Only 27% of Blackhole Events correlate with DDoS. ... automatic DDoS mitigation. But: Anomalies

Whitelisting vs. blacklisting of ports

46

IXP

Routeserver

Peer AS1

Peer AS3

Peer AS2Peering platform

WebserverVictim AS

Blackhole

IP: 1.2.3.4Legitimate Traffic: Port 80 and 443

Page 45: Down the Black Hole: Dismantling Operational Practices of ...effective mitigation strategy. Only 27% of Blackhole Events correlate with DDoS. ... automatic DDoS mitigation. But: Anomalies

Challenge

We cannot whitelist client traffic, because client traffic is highly variable.

47

Page 46: Down the Black Hole: Dismantling Operational Practices of ...effective mitigation strategy. Only 27% of Blackhole Events correlate with DDoS. ... automatic DDoS mitigation. But: Anomalies

RadVizProjection

48

Visualizing multidimensional port information allows a classification into clients and servers

https://de.wikipedia.org/wiki/Datei:Jahn-Bergturnfest_2006_tug_of_war.jpg

Page 47: Down the Black Hole: Dismantling Operational Practices of ...effective mitigation strategy. Only 27% of Blackhole Events correlate with DDoS. ... automatic DDoS mitigation. But: Anomalies

RadVizProjection

49

number of different source ports

number of different destination ports

https://de.wikipedia.org/wiki/Datei:Jahn-Bergturnfest_2006_tug_of_war.jpg

Visualizing multidimensional port information allows a classification into clients and servers

Page 48: Down the Black Hole: Dismantling Operational Practices of ...effective mitigation strategy. Only 27% of Blackhole Events correlate with DDoS. ... automatic DDoS mitigation. But: Anomalies

Many blackholed IP addresses exhibit high port fluctuations

50

Page 49: Down the Black Hole: Dismantling Operational Practices of ...effective mitigation strategy. Only 27% of Blackhole Events correlate with DDoS. ... automatic DDoS mitigation. But: Anomalies

Many blackholed IP addresses exhibit high port fluctuations

51

Most of the protected IP addresses are clients.

Page 50: Down the Black Hole: Dismantling Operational Practices of ...effective mitigation strategy. Only 27% of Blackhole Events correlate with DDoS. ... automatic DDoS mitigation. But: Anomalies

Cross-validation using PeeringDB

52

Page 51: Down the Black Hole: Dismantling Operational Practices of ...effective mitigation strategy. Only 27% of Blackhole Events correlate with DDoS. ... automatic DDoS mitigation. But: Anomalies

Cross-validation using PeeringDB

53

Most clients located in DSL networks.PeeringDB supports our classification.

Page 52: Down the Black Hole: Dismantling Operational Practices of ...effective mitigation strategy. Only 27% of Blackhole Events correlate with DDoS. ... automatic DDoS mitigation. But: Anomalies

Potentials of fine-grained whitelisting?

Clients are often affected by BGP Blackholing.

Whitelisting of regular, expected traffic patterns is not an option.

54

Page 53: Down the Black Hole: Dismantling Operational Practices of ...effective mitigation strategy. Only 27% of Blackhole Events correlate with DDoS. ... automatic DDoS mitigation. But: Anomalies

Can we easily improve by blacklisting attack traffic?

55

Page 54: Down the Black Hole: Dismantling Operational Practices of ...effective mitigation strategy. Only 27% of Blackhole Events correlate with DDoS. ... automatic DDoS mitigation. But: Anomalies

Most RTBH traffic is UDP traffic

• >90% of RTBH Events (with packets and a preceding anomaly) contain almost exclusively UDP amplification traffic

• Multi-vector attacks are common, but usually do not utilize more than three amplification vectors:

56

Page 55: Down the Black Hole: Dismantling Operational Practices of ...effective mitigation strategy. Only 27% of Blackhole Events correlate with DDoS. ... automatic DDoS mitigation. But: Anomalies

Fine-Grained Blacklisting

Fine-grained filtering based on source-ports is very effective and potentially saves legitimate traffic!

Filter example: CharGEN/19, DNS/53, NTP/123

57

Page 56: Down the Black Hole: Dismantling Operational Practices of ...effective mitigation strategy. Only 27% of Blackhole Events correlate with DDoS. ... automatic DDoS mitigation. But: Anomalies

Summary. Advices for operators.

1. Check BGP policies.Accept more specific prefixes, in particular /32, in case of RTBH announcements.

2. Check routing tables for RTBH 'zombies'.Routing tables may contain many unnecessary/inexplicable RTBH entries. Contact peers to understand the RTBH use cases.

3. Consider fine-grained filtering.Majority of DDoS attacks are still not complex. Simple port-based blacklisting (ACLs, BGP Flowspec) can be very effective.

58

Page 57: Down the Black Hole: Dismantling Operational Practices of ...effective mitigation strategy. Only 27% of Blackhole Events correlate with DDoS. ... automatic DDoS mitigation. But: Anomalies

BACKUP SLIDES

Page 58: Down the Black Hole: Dismantling Operational Practices of ...effective mitigation strategy. Only 27% of Blackhole Events correlate with DDoS. ... automatic DDoS mitigation. But: Anomalies

Prefix Lengths and Traffic Share

60

Page 59: Down the Black Hole: Dismantling Operational Practices of ...effective mitigation strategy. Only 27% of Blackhole Events correlate with DDoS. ... automatic DDoS mitigation. But: Anomalies

AS Drop Consistency

61

Page 60: Down the Black Hole: Dismantling Operational Practices of ...effective mitigation strategy. Only 27% of Blackhole Events correlate with DDoS. ... automatic DDoS mitigation. But: Anomalies

RTBH Propagation Filter

62

Page 61: Down the Black Hole: Dismantling Operational Practices of ...effective mitigation strategy. Only 27% of Blackhole Events correlate with DDoS. ... automatic DDoS mitigation. But: Anomalies

Maximum RTBH Distance Δ

63

Page 62: Down the Black Hole: Dismantling Operational Practices of ...effective mitigation strategy. Only 27% of Blackhole Events correlate with DDoS. ... automatic DDoS mitigation. But: Anomalies

Attack Visibility and Sampling

• Median DDoS attack size in mid 2018 was 1287 Mbps

• Dividing by a MTU of 1500 Bytes, this corresponds up to 100k packets per second

• We expect to observe attacks despite sampling!

64

Page 63: Down the Black Hole: Dismantling Operational Practices of ...effective mitigation strategy. Only 27% of Blackhole Events correlate with DDoS. ... automatic DDoS mitigation. But: Anomalies

List of Amplification Protocols

65

Page 64: Down the Black Hole: Dismantling Operational Practices of ...effective mitigation strategy. Only 27% of Blackhole Events correlate with DDoS. ... automatic DDoS mitigation. But: Anomalies

Share of UDP Amplification Traffic

66

Page 65: Down the Black Hole: Dismantling Operational Practices of ...effective mitigation strategy. Only 27% of Blackhole Events correlate with DDoS. ... automatic DDoS mitigation. But: Anomalies

Sources of amplification attacks

67

Page 66: Down the Black Hole: Dismantling Operational Practices of ...effective mitigation strategy. Only 27% of Blackhole Events correlate with DDoS. ... automatic DDoS mitigation. But: Anomalies

EWMA and Anomaly Amplification Factor

68

Page 67: Down the Black Hole: Dismantling Operational Practices of ...effective mitigation strategy. Only 27% of Blackhole Events correlate with DDoS. ... automatic DDoS mitigation. But: Anomalies

Port Variance vs Port Stability

69

Page 68: Down the Black Hole: Dismantling Operational Practices of ...effective mitigation strategy. Only 27% of Blackhole Events correlate with DDoS. ... automatic DDoS mitigation. But: Anomalies

Challenges of Quantifying Collateral Damage

1. Servers and clients are victims of DDoS

2. Passive inference of services is biased by scans and spoofed traffic

3. Very sparse data outside of RTBH Events

4. Attack traffic might be also present outside of RTBH Events

5. Legitimate traffic pattern change during an attack

70

Page 69: Down the Black Hole: Dismantling Operational Practices of ...effective mitigation strategy. Only 27% of Blackhole Events correlate with DDoS. ... automatic DDoS mitigation. But: Anomalies

Collateral Damage for Servers

Page 70: Down the Black Hole: Dismantling Operational Practices of ...effective mitigation strategy. Only 27% of Blackhole Events correlate with DDoS. ... automatic DDoS mitigation. But: Anomalies

Classification Result

72