Ripple: A Programmable, Decentralized Link-Flooding Defense Against Adaptive Adversaries

Authors: 

Jiarong Xing, Wenqing Wu, and Ang Chen, Rice University

Abstract: 

Link-flooding attacks (LFAs) aim to cut off an edge network from the Internet by congesting core network links. Such an adversary can further change the attack strategy dynamically (e.g., target links, traffic types) to evade mitigation and launch persistent attacks.

We develop Ripple, a programmable, decentralized link-flooding defense against dynamic adversaries. Ripple can be programmed using a declarative policy language to emulate a range of state-of-the-art SDN defenses, but it enables the defenses to shapeshift on their own without a central controller. To achieve this, Ripple develops new defense primitives in programmable switches, which are configured by the policy language to implement a desired defense. The Ripple compiler generates a distributed set of switch programs to extract a panoramic view of attack signals and act against them in a fully decentralized manner, enabling successive waves of defenses against fast-changing attacks. We show that Ripple has low overheads, and that it can effectively recover traffic throughput where SDN-based defenses fail.

Open Access Media

USENIX is committed to Open Access to the research presented at our events. Papers and proceedings are freely available to everyone once the event begins. Any video, audio, and/or slides that are posted after the event are also free and open to everyone. Support USENIX and our commitment to Open Access.

BibTeX
@inproceedings {263862,
author = {Jiarong Xing and Wenqing Wu and Ang Chen},
title = {Ripple: A Programmable, Decentralized {Link-Flooding} Defense Against Adaptive Adversaries},
booktitle = {30th USENIX Security Symposium (USENIX Security 21)},
year = {2021},
isbn = {978-1-939133-24-3},
pages = {3865--3881},
url = {https://www.usenix.org/conference/usenixsecurity21/presentation/xing},
publisher = {USENIX Association},
month = aug
}

Presentation Video