Keywords

1 Introduction

Distributed denial-of-service (DDoS) attacks, one of the numerous forms of illegal activities that take place online, can overwhelm even the biggest servers with too many requests, causing them to crash. Figure 1 represents a DDoS attack.

Fig. 1.
figure 1

DDoS attack

Current conflicts between Russia and Ukraine, which accounted for a major portion of all DDoS-related news in these nations in mid-January, had a big impact on the DDoS trend in 2022 [35]. The Internet sector, followed by cryptocurrency and later retail was the second most targeted. On March 1st, 2022, a DDoS attack on Kyiv Mayor Vitali Klitschko’s website, and several Ukrainian ministries’ websites were hacked [17]. The Ukrainian Ministry of Defence’s website, the online services of Oschadbank and Privat Bank, as well as the hosting company Mirohost, were all subject to DDoS attacks in the middle of February [29]. Customers of Privat Banks reported receiving phone SMS messages regarding inoperable ATMs around the same time, which appeared to be sent to cause panic. On the 2 of February, a new DDoS attack consumed Ukrainian government resources, and in late February and early March, the State Special Communications Service of Ukraine reported a mass of ongoing attacks [17].

DDoS attacks have grown in scale and regularity over the past few years. According to Kaspersky’s Securelist blog, a percent of all recorded DDoS attacks in Q1 2022 occurred in the US. China and Germany, which were affected by 9.96% and 4.85% of recorded attacks during the same period, were closely behind it [36] (Fig. 2).

Fig. 2.
figure 2

DDoS attack trends

2 Proposed Survey

The Internet’s architecture offers users the best-effort, packet-switched services. This leads to resource sharing amongst several users. As a result, one user’s actions could interfere with another user’s ability to access the services [21]. DDoS attack often seeks to obstruct authenticated users’ access to services by depleting the system’s resources. DDoS attack packets typically lack any glaring characteristics that would allow people to tell the difference between the bad stream from legitimate ones.

This paper shows a cutting-edge overview of DDoS attacks, defense strategies, and migration methods. This article gives a systematic analysis of DDoS attacks that include the classification of different sorts of DDoS attacks and their mitigation and preventative methods.

2.1 Motivation for DDoS Attacks

Check Point study shows that they track more than 1000 significant, diverse DDoS attacks every day globally [35]. These DDoS attacks can be directed at anyone, from an individual user at home to an entire government. The desire for financial gain is one of the main drivers behind attacks on these users [37]. However, pornographic or gambling websites can be tempting targets for a DDoS attack. Additionally, DDoS attacks frequently target governments and political organizations. DDoS attacks can also target financial markets and gaming websites, as demonstrated in Fig. 3.

In Cloudflare Lab quarterly report, we observe that most manufacturing, business services, and gaming are most affected by DDoS attacks [38].

Fig. 3.
figure 3

Attack by organizations

  • Show of power: This category of attackers performs DDoS attacks to show their skills.

  • Revenge: Another motive for DDoS attacks is when some irate (and less technically proficient) individuals carry them out as revenge for perceived oppression.

  • Cyberwarfare: This is another crucial attack motive that puts its targets in danger and has a big negative economic impact. An attack of this kind is often carried out by a few well-trained members of a military or terrorist organization.

  • Financial benefit: This category of DDoS attacks is thought to be the most dangerous, they aim to earn some financial benefit from the hacks.

2.2 Attack Strategies and Phases

Figure 4 shows the DDoS attack’s composition. A victim or target machine, numerous control masters, slaves, agents, and an attacker make up the components of a DDoS attack [13].

Fig. 4.
figure 4

DDoS attack components

  • Phase one: The hacker acquires a good number of infected machines during the early phase. These infected devices are referred to as the masters because they direct other compromised machines into the attacking army [16].

  • Phase two: The second step starts if enough devices have been enlisted in a compromised army. The term for this hacker army is a botnet. The attacker prepares for the attack by sending all essential information to the master armies in the second phase. The master armies then send the information to all slave armies.

  • Phase three: In the last stage, the army of the attacker launches and executes attacks [33].

2.3 Attack Methods

Understanding DDoS attack classification methods are essential for comprehending DDoS attack studies. This study’s goal is to investigate each attack taxonomy and give a complete, straightforward classification scheme. Figure 5 presents a classification scheme.

Fig. 5.
figure 5

Attack methods

  • Resource Depletion Attacks: These attacks’ purpose is to overload or crashes the system’s significant resources, including memory, sockets, and CPU [9]. Initially, the attacker makes use of certain protocols along the application, transport, and network levels. Spoofed packets are employed as a second method of attack.

  • Protocol Exploit Attacks: The weaknesses in the various network layer protocols are used by known protocol-based attacks. This attack causes the victim to use all of its memory while carrying out various memory-demanding tasks [22, 23].

Flood Attack.

An example of resource depletion is a flood attack, in which a victim is attacked using the application layer protocol HTTP [19]. The HTTP GET and HTTP POST requests are specifically manipulated in this form of attack while a server or particular application is being communicated with (Fig. 6).

Fig. 6.
figure 6

Flood attack

TCP SYN Hack.

The client sends an SYN packet to a server in three-way handshaking to start the handshaking. The server responds by delivering an SYN+ ACK packet. Finally, the client sends back the final ACK packet which completes the handshake and establishes the TCP connection [7]. By taking advantage of this functionality, the attacker can overwhelm the server’s memory, which finally causes legitimate users to refuse connection attempts. The attacker starts a large number of connections but does not finish the handshaking procedure, flooding the victim’s memory (Fig. 7).

Fig. 7.
figure 7

TCP SYN attack

DNS Amplification Attack.

The goal of the most prevalent cyberattacks in the world is the network bandwidth of the victim. In this instance, the goal of the attacker is to leverage a DNS’s weak points to scale up an intrusion significantly [3]. This exploit is also an illustration of a reflection attack that floods a victim with a large number of UDP packets by using several open recursive DNS servers [3, 25, 33] (Fig. 8).

Fig. 8.
figure 8

DNS amplification attack

Infrastructure Attack.

The purpose of this attack is to seriously harm essential components of the Internet. As a result, it also targets the resources (memory, CPU) of the targeted system in addition to the network bandwidth [14]. Infrastructural attacks, for instance, target the DNS, particularly the root. A botnet sends standard UDP requests to the DNS server throughout a DNS flooding attack [2]. But because there are so many of them, the system becomes overwhelmed, and eventually, all of the resources are used up.

Zero-day Attack.

Using some undiscovered security flaws or vulnerabilities, a zero-day attack takes place on day 0 [27, 34]. A “zero-day” is the first day after an attack when the system’s vulnerabilities are discovered. For exposing zero-day vulnerabilities, many private software businesses or security organizations offer incentives and prizes [15] (Table 1).

Table 1. DDoS attacks summary

3 Prevention Methods

The best defensive strategy against DDoS attacks is to prevent them from happening (Fig. 9).

Fig. 9.
figure 9

DDoS prevention

3.1 Prevention Using Filters

Filtering strategies primarily shield a victim from attacks and keep an offender from being an unwitting victim. In essence, all filtering methods are used on the routers to guarantee that only authorized traffic can enter a system. This section will discuss several filtering strategies.

Route-based Packet Filtering.

Route-based Packet Filtering uses routing information to evaluate whether a packet will reach a route [26]. An IP packet with a source address that differs from a set range of addresses is rejected by the core routers since it seems faked to the router [4].

According to Kihong Park and Heejo Lee’s research, route-based packet filtering occurs on two timescales: packet forwarding based on table lookup at the fast time, and filter table update the slow one. As a result, its forwarding/discard function can be executed nearly at line speed subject to general processing overhead. That is, the core filtering function itself is not subject to a DoS attack [26].

Access Control Lists (ACL).

This method can only be used for a brief period of historical time because it requires a lot of computing power. Markus et al. provided a fresh approach to reducing DDoS attacks based on collected information in their research. Instead of trying to identify DDoS attacks, the system aims to automatically create filter rules for IP firewalls. By doing so, the server will be able to continue serving legitimate users even when it is being heavily attacked by Denial-of-Service Attacks. [12].

Ingress Filtering.

Egress filtering is the idea of firewalling traffic that originates on a local network but is going to a distant network. Like most other comparable for-profit and open-source solutions, pfSense includes a LAN rule that permits all traffic from the LAN to the Internet. However, this is not a good approach. Since most people anticipate it, it has been the de facto default in most firewall implementations. The common belief is that anything on the internal network is “trustworthy,” so why bother screening?[10] RFC 226768’s definition of ingress filtering permits network traffic that corresponds to a present range of the network’s domain prefix to enter [30]. As a result, if an attacker uses a spoof IP address that does not match the prefix, the routers will disregard it. These filtering algorithms guarantee protection from a sizable number of DDoS attacks that employ faked IP [11].

Source Address Validity Enforcement Protocol (SAVE).

The previously described RPF protocol has been improved with the SAVE protocol. It mandates that all destination routers linked to a source receive messages containing the most recent source information from the routers [20]. Each router then utilizes its forwarding table, which has been updated with the most recent data, to filter packets according to RPF’s techniques.

Hop-count Filtering.

This method doesn’t ensure complete detection, but it can reject the majority of the spoof IP packets that make up the attack flow. The HCF Mechanism uses the IP header information, which is difficult to fabricate, to distinguish between faked and genuine packets [8]. To stop an attack, the filter discards packets that it recognizes as being part of a flow of faked packets.

History-based Filtering.

To distinguish between legitimate traffic and malicious traffic, an efficient method (history-based IP filtering (HIF)) was proposed [24]. This method examines several DDoS attack features as well as regular traffic to extract traits that reveal information about the DDoS attack’s occurrence. An attack is anything that deviates from the regular traffic profile.

3.2 Secure Overlay

The aim behind this method is to build an overlay network over the main IP network [32]. This overlay network serves as the gateway for outside networks to connect to the secured network. It is expected that safety can be attained if a network utilizes a distributed firewall or hides its IP addresses [18, 31].

3.3 Honeypots

An intriguing DDoS protection method is a honeypot. A honeypot is a network-attached system that hackers use to identify and research the tactics and types of attacks they utilize [9, 33]. On the internet, it serves as a potential target and alerts the defenders to any unauthorized attempts to access the information system. The actual system is thus kept secure [39]. The problem with this approach is skilled attackers can quickly recognize it because it can be distinguished from production systems [21].

3.4 Load Balancing

Dividing network traffic among several servers is known as load balancing. It ensures that a single server will not be overloaded. Load balancing increases the responsiveness of an application by distributing the work evenly (Fig. 10).

Fig. 10.
figure 10

Load balancing

3.5 Additional Security Patches

To prevent the system from being compromised by DDoS attacks, it is important to update software security patches regularly. The following are additional strategies to mitigate DDoS attacks.

Changing IP Addresses.

Using this strategy, the computer system switches its IP address to a different one. Since the previous one could potentially be the target of DDoS attacks. However, there are other administrative costs associated with this. This strategy is effective as long as the attacker is not knowledgeable of the new IP address

Disabling Unusual Services.

This is a DDoS defense technique. DDoS attacks could happen to some services, like character generator and UDP echo. By blocking these services, a system can be shielded from some DDoS attacks. Telnet and SSH remote access options to network servers should be disabled (Table 2).

Table 2. DDoS prevention using filters

4 DDoS Mitigation Methods

This section is crucial for defending against numerous DDoS attacks. However, despite new attack signatures and updates, DDoS attacks continue to pose a concern. As a result, there are numerous research efforts taking place in the area of DDoS mitigation, which is the next step of defense.

4.1 Detection of DDoS Attacks

It is fairly simple to detect an attack because it significantly reduces service or system performance. Sometimes a response necessitates tracing the origin of the attack, while other times it necessitates spotting the malevolent activity.

Signature-based Detection.

To distinguish between legitimate traffic and malicious traffic, signature-based detection methods use known DDoS attacks to determine the attack signatures [24]. As a result, they are effective in identifying known DDoS attacks. But these detection systems fail to pick up on any variations in currently occurring attacks. This section of the paper will discuss some well-known signature-based detection mechanisms.

Log Analysis.

Because they offer real-time information and statistics about your web traffic, log analysis tools are helpful software solutions for DDoS monitoring and detection. Spikes in activity suggestive of a DDoS attack can be found using tools like SolarWinds Loggly, and Splunk for instance [28]. To do this, Loggly uses an anomaly- detection program that scans servers for an excessive quantity of 503 errors.

Spectral Analysis.

The methods described here use spectrum analysis to separate attack flow from regular traffic. For instance, attack flow is identified using the packets’ power spectral density detection based on anomalies [1]. Attacks with new signatures and freshly discovered attacks can both be handled by anomaly -based detection mechanisms [6].

SNORT.

SNORT is a highly popular tool for detecting network intrusions. It is a simple rule-based tool for detecting a variety of attacks and probes [5]. It has coupled anomaly-based security with signature-based detection to broaden the scope of attacks it can identify. However, because SNORT relies on precise pattern matching, it may cause a bottleneck in the system’s performance due to the high volume of traffic and Internet speed.

5 Conclusion

Based on their successes and failures, this study examined well-known preventative and mitigation approaches for DDoS attacks. Additionally, it provided an overview of various attack kinds, filtering strategies, and attack detection approaches. It outlined the benefits and drawbacks of various forms of DDoS defense strategies. However, further research is necessary to fight new and undiscovered attacks with new signatures.