Symmetric and asymmetric DDoS protection - what is the difference?

What is a symmetric and asymmetric connection scheme for protection against DDoS attacks? What are the advantages and disadvantages of each of them? Which protection is best for your project? You will find the answers to these questions under the cut.


Along the way, we'll talk about symmetry in telecommunication networks in general. You will find out how asymmetric the Internet is, where this asymmetry comes from, and in general it is good or bad. As a bonus - quick fix for the two most common problems when connecting network protection. And after reading, you can definitely understand what I tried to portray on the KDPV.


thumb


What is symmetry?


Everyone understands what is β€œsymmetrical” at the level of β€œsensations,” but they cannot just immediately articulate what this means. Let's try. If something is called symmetrical, they mean that it does not change under the influence of certain transformations - symmetry transformations. The most obvious example is geometric symmetry.


90 , . : " 90 ". β€” . β€” "", . . .


β€” . . β€” . : . , , . , , β€” .
sym



, . , Facebook Facebook . ? : , , , ..


β€” . . " " . . , . . β€” , . 1891 β€” . XX () ( ). , , "" . .


(), .

, .


switchboard



, , 27 , 1% . , .


β€” , .

IP- (IP / ID ). . UDP β€” , . TCP , - , .


, . . ( ) , .


. . , .


traffic


:


  • β€”

- .


, .

, , , .


, " " β€” RFC β€” :


  • Forward direction β€” , .
  • Reverse direction β€” β€” , .
  • Upstream link β€” , β€” downstream links.

. hot-potato routing. , , , . hot-potato β€” β€” "" .


?


, . "Observing routing asymmetry in Internet traffic". Tier-2, Tier-1, .


, "". (Flow) β€” IP , IP , , ID . , .


  1. .
  2. .
  3. , , .. , UDP.
    , :

links


  • β€” flows β€” / * 100
  • β€” packets β€” (1-|Nab-Nba|/|Nab+Nba|)*100%, Nab β€” , Nba β€” .
  • β€” bytes β€” (1-|Nab-Nba|/|Nab+Nba|)*100%, Nab β€” , Nba β€” .

, , . edge-.


.


"How Asymmetric Is the Internet?" , ( β€” IP- ).


  1. 4000 RIPE Atlas. β€” , . .
  2. Traceroute . Traceroute , .. , . .

asnumber


  1. , 12.6% ( , 5 β€” 10%).
  2. , . , :

diff
y β€” , ( ) A --> --> . x β€” . , β€” 1. , . β€” .


, ?


  • ,

. DDoS.



DDoS- , , , : . - , , . , β€” , .


schemes
, . . ? .
, .


: , , , ?
:…
: ?
:…
: !
: ...


- . , , , " " .


: , , , ?
: . . .
: ?
: , , .
: !
: .


, , , , . DDoS-.


: SYN flood


, TCP. , (3-way handshake).


  1. SYN , .
  2. , SYN-ACK . SYN , A+1, B, .
  3. ACK B+1, TCP .

, ( ).


SYN flood β€” DDoS-, β€” . SYN (spoofed) IP . SYN-ACK ACK', … . TCP .


hatiko


? , β€” SYN cookie SYN proxy.


SYN cookie . , SYN (IP , TCP ..), , B SYN-ACK . SYN-ACK TCP cookie. (3 3-way handshake), B+1, ACK . .


ookie . , ACK . , . , , ACK cookie, SYN cookie. . , .


synproxy
spoofing spoofing'o. , . β€” , , .


(UDP, QUIC, ICMP) TCP. . IP , .


, .


, , .


edge-, " " . , . : ( ).


, edge-, . :


protection
, . , . edge ? β€” "", , ! .


, ? , 3. , . β€” . , .. 3 . 1 2 .


, , , β€” . , . , , 1, 2. . , , , , . , , " ".


DDoS


DDoS, , β€” . BGP, . . . , β€” . , , .


  1. β€” BGP. peering' .
  2. . , , , , . , , , troubleshooting' c . , " ". , .
  3. , , , .. , . , TCP. RTT (. Round Trip Time). .
  4. . - . , , 100% . .

2-4 , DDoS .


, . DDoS 100% . mitigation β€” , β€” . , - . " " , .


?


95% , , DDoS , . , . ( DDoS ) β€” , . , , , .


. , BGP.


drake


DDoS-GUARD , , . .


BONUS: ,



, - uRPF strict loose. ? uRPF (Unicast Reverse Path Forwarding) . , , , source IP.


uRPF IP- . strict , c , IP, . spoof' IP . , , . loose IP- , .


/ GRE / IPIP-


MTU . :


  • Maximal Transmission Unit (MTU) β€” Protocol Data Unit (PDU).
  • PDU β€” + payload.
  • Maximal Segment Size (MSS) β€” payload.
    () PDU payload PDU . , MTU , payload.

MTU 1476, MSS – 1436 ( 1400) ( Don't fragment). - .


. MSS , . MSS : Juniper, Cisco, Mikrotik.


All Articles