| Literature DB >> 34884075 |
Nivedita Mishra1, Sharnil Pandya1, Chirag Patel2, Nagaraj Cholli3, Kirit Modi4, Pooja Shah5, Madhuri Chopade5, Sudha Patel6, Ketan Kotecha7.
Abstract
Distributed denial-of-service (DDoS) attacks are significant threats to the cyber world because of their potential to quickly bring down victims. Memcached vulnerabilities have been targeted by attackers using DDoS amplification attacks. GitHub and Arbor Networks were the victims of Memcached DDoS attacks with 1.3 Tbps and 1.8 Tbps attack strengths, respectively. The bandwidth amplification factor of nearly 50,000 makes Memcached the deadliest DDoS attack vector to date. In recent times, fellow researchers have made specific efforts to analyze and evaluate Memcached vulnerabilities; however, the solutions provided for security are based on best practices by users and service providers. This study is the first attempt at modifying the architecture of Memcached servers in the context of improving security against DDoS attacks. This study discusses the Memcached protocol, the vulnerabilities associated with it, the future challenges for different IoT applications associated with caches, and the solutions for detecting Memcached DDoS attacks. The proposed solution is a novel identification-pattern mechanism using a threshold scheme for detecting volume-based DDoS attacks. In the undertaken study, the solution acts as a pre-emptive measure for detecting DDoS attacks while maintaining low latency and high throughput.Entities:
Keywords: DDoS attacks; Memcached; amplification attacks; botnet; momentum botnet
Mesh:
Year: 2021 PMID: 34884075 PMCID: PMC8659833 DOI: 10.3390/s21238071
Source DB: PubMed Journal: Sensors (Basel) ISSN: 1424-8220 Impact factor: 3.576
Figure 1Classification of DDoS attacks.
Figure 2Representation of the bandwidth amplification factor of various protocols.
Analysis of architectural changes presented in the literature.
| Reference | Year | Problem Statement | Architectural Change | Achievement |
|---|---|---|---|---|
| Lim et al. [ | 2013 | Increased load on the network and database. | Authors introduced thin servers with smart pipes by coupling embedded low-power cores to the Memcached server, enabling GET requests to be processed in hardware. | Power–performance trade-off. |
| Lu et al. [ | 2014 | Single-point failure mechanism of Memcached. | Authors proposed R-Memcached, where caches are replicated in the Memcached server. | Consistency among cache replicas. |
| Blott et al. [ | 2015 | Limited value-store capacity in in-memory key-value stores such as Memcached. | A Hybrid of DRAM and serial-attached flash drive was proposed for increasing the value-store capacity. | High throughput and scalability. |
| Zaidenberg et al. [ | 2015 | Data-discarding algorithm for Memcached. | In this work, five new algorithms were presented in place of the least-recently-used (LRU) algorithm for discarding data in Memcached. | Improved hit rate. |
| Singh et al. [ | 2018 | Flaws in Memcached architecture and operations. | The authors identified flaws of Memcached architecture, and the prevention of DDoS attacks was also discussed. | Security steps for avoiding DDoS attacks. |
| Proposed work | 2021 | DDoS attack using Memcached. | Communication between Memcached servers is proposed in the undertaken study for detecting volume-based attacks. | High security from DDoS attacks while maintaining throughput latency. |
Figure 3Working of the Memcached server.
Figure 4Representation of Memcached attack threat model.
Figure 5Representation of a Memcached DDoS attack using a botnet.
Figure 6Process flow diagram of launching a DDoS attack using Memcached.
Detailed vulnerability description of Memcached.
| Vulnerability Reference | Description |
|---|---|
| CVE-2020-10931 | Insufficient authentication of user input is why this vulnerability exists in memcached.c when a binary protocol header is parsed in the try_read_command_binary() function. DoS attacks can be performed using this vulnerability. |
| CVE-2019-11596 | “lru mode” and “lru temp_ttl” commands were found to be dereferencing the NULL pointer in Memcached versions before 1.5.14, making it prone to denial of service. |
| CVE-2019-15026 | In Memcached version 1.5.16, while using UNIX sockets in memcached.c, a buffer over-read was found in conn_to_str, causing a denial of service. |
| CVE-2018-1000115 | This is the vulnerability caused due to open UDP port at 11211. In UDP support up to Memcached version 1.5.5, network message volume could not be controlled sufficiently, making it vulnerable to denial-of-service attacks. An amplification factor of 50,000 could be achieved using this. |
Comparative analysis of proposed work with baseline techniques.
| Author | Year | Applied Technique for Intrusion Detection in DDoS Attacks | IDS Applied for Detecting Attack Type | Remarks |
|---|---|---|---|---|
| Alamri et al. [ | 2020 | Bandwidth control mechanism and XGBoost algorithm | DDoS attacks in Software-Defined Network | Trigger-based detection is applied using an adaptive-bandwidth-profile-based threshold where flawed flows are penalized for preventing bandwidth depletion. |
| Singh et al. [ | 2020 | Threshold and entropy-based detection mechanism | Discriminating flash-crowd events from DDoS attacks | DDoS attacks on edge routers are detected using entropy and a threshold-based system. |
| Baskar et al. [ | 2021 | Real-time traffic-monitoring algorithm using a multi-threshold system | Low-rate DDoS attacks | Low-rate DDoS attacks are detected using a multi-threshold traffic-analysis approach. |
| Jisa et al. [ | 2021 | Threshold-based algorithm using network traffic parameter | Discriminating flash-crowd events from DDoS attacks | Dynamic threshold algorithm is introduced with less processing time for DDoS attack detection. |
| Proposed work | 2021 | Context-aware computing-based threshold mechanism | Memcached-based DDoS attacks | DDoS attacks using Memcached as an attack vector are mitigated efficiently by introducing architectural change in Memcached and using a context-aware threshold mechanism. |
Figure 7Architectural diagram for proposed setup, (a) before the threshold , (b) after the threshold .
Figure 8A detailed process flow of the proposed solution for DDoS attacks using Memcached servers.
Figure 9Case study of proposed solution for (a) Memcached server 1 with threshold value n, (b) Memcached server 2 with threshold value n, (c) Memcached server 3 with threshold value n, and (d) cumulative result for raising the alarm with cumulative threshold value n.
Figure 10A graphical representation of proposed Memcached solution for multiple threshold levels, a1, a2, b1, b2, and c.