Skip to content

paulmarc/DDPS-documentation

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

12 Commits
 
 
 
 
 
 
 
 

Repository files navigation

DeiC Distributed Denial of Service Attack Prevention System, DDPS

DDPS stands for DeiC DDoS Protection Service and it has been built for the Danish research network, DeIC. The full vision statement is available as part of the original project proposal (in danish)

DDPS is conceived as an automated system for DDoS mitigation: it detects attacks and automatically triggers mitigation.
The mitigation is based on the creation of rules by a detection engine which can filter out unwanted traffic (see below).
Additionally, end-users may add, edit, or cancel mitigation rules as well as view archived rules and statistical information.
Based on BGP Flowspec, it is intended to be used in a system where detection is placed as close as possible to the target and mitigation is placed as close as possible to the source(s) of the attack in order to limit in particular the impact of volumetric attacks.

The project is hosted on github.com and split in a number of sub-projects. This is the documentation hub. Links to the sub-projects are:

Short technology overview

A DDoS mitigation system based on BGP Flowspec requires that some rules enter the system, and that other rules are sent to and enforced by peering partners and upstream providers. The drawing illustrates the different components: to the left is a customer site where the detection engine (using fastnetmon) monitors traffic to a group of networks and logs traffic statistics to a local influx database.
When an attack is detected, a set of mitigation rules are generated and sent to DDPS via an encrypted channel. The rules are added to an database and announced as flowspec rules in the BGP session. This means that they are both sent to upstream networks and disseminated across the network to edge routers. The rules are enforced on edge on the routers thereby mitigating the attack. Rules are later withdrawn.

The rules have to match the BGP community we are responsible for: they have to match our network only. The system has been designed to do that from the entrance point to the exit point: customers can only make rules for their own network which is a subset of ours, and the system can only send rules upstream which matches our network as such.

Rules are made up of the 12 fields defined in RFC5575 and RFC7674 with a start and expire time together with some customer information.

Rules are added to the system from two sources:

  • a policy editor operated by the customer
  • an automatic detection engine based on fastnetmon

Rules are uploaded to the database server and added to a postgres database. A daemon queries the database for new and expired rules. The daemon converts the rules to BGP flowspec announce and withdraw rules and inserts them in two exabgp instances from where they are sent to our edge routers, peers and upstream provider.

Contact and Contributing

If you would like help implementing DDPS then please have a look at the contributing page. If you would like to contact the team behind DDPS then send an email to [email protected]

Find out more

License

DDPS is copyright 2015-2017 DeiC, Denmark

Licensed under the Apache License, Version 2.0 (the "License"); you may not use this software except in compliance with the License.

Unless required by applicable law or agreed to in writing, software distributed under the License is distributed on an "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the License for the specific language governing permissions and limitations under the License.

About

No description, website, or topics provided.

Resources

License

Stars

Watchers

Forks

Packages

No packages published