<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.6.26 (Ruby 3.0.2) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-cui-savnet-anti-ddos-01" category="info" submissionType="IETF" xml:lang="en" version="3">
  <!-- xml2rfc v2v3 conversion 3.16.0 -->
  <front>
    <title abbrev="SAV-D">SAV-based Anti-DDoS Architecture</title>
    <seriesInfo name="Internet-Draft" value="draft-cui-savnet-anti-ddos-01"/>
    <author initials="Y." surname="Cui" fullname="Yong Cui">
      <organization>Tsinghua University</organization>
      <address>
        <postal>
          <region>Beijing</region>
          <code>100084</code>
          <country>China</country>
        </postal>
        <email>cuiyong@tsinghua.edu.cn</email>
        <uri>http://www.cuiyong.net/</uri>
      </address>
    </author>
    <author initials="J." surname="Wu" fullname="Jianping Wu">
      <organization>Tsinghua University</organization>
      <address>
        <postal>
          <region>Beijing</region>
          <code>100084</code>
          <country>China</country>
        </postal>
        <email>jianping@cernet.edu.cn</email>
      </address>
    </author>
    <author initials="L." surname="Hui" fullname="Linbo Hui">
      <organization>Zhongguancun Laboratory</organization>
      <address>
        <postal>
          <region>Beijing</region>
          <code>100094</code>
          <country>China</country>
        </postal>
        <email>huilb@zgclab.edu.cn</email>
      </address>
    </author>
    <author initials="L." surname="Zhang" fullname="Lei Zhang">
      <organization>Zhongguancun Laboratory</organization>
      <address>
        <postal>
          <region>Beijing</region>
          <code>100094</code>
          <country>China</country>
        </postal>
        <email>zhanglei@zgclab.edu.cn</email>
      </address>
    </author>
    <author initials="Y." surname="Hu" fullname="Yannan Hu">
      <organization>Zhongguancun Laboratory</organization>
      <address>
        <postal>
          <region>Beijing</region>
          <code>100094</code>
          <country>China</country>
        </postal>
        <email>huyn@zgclab.edu.cn</email>
      </address>
    </author>
    <date year="2023" month="March" day="13"/>
    <area>Routing</area>
    <workgroup>SAVNET Working Group</workgroup>
    <keyword>Source Address Validation</keyword>
    <keyword>DDoS Detection and Mitigation</keyword>
    <abstract>
      <t>Existing SAV schemes can not effectively defend against IP Spoofing DDoS under incremental deployment.
This document proposes SAV-D, an SAV-honeynet based distributed defense architecture to enhance SAV's defense.
The main idea of SAV-D is to collect and aggregate more threat data from existing SAV devices and then distribute crucial knowledge to widespread devices, thus significantly expanding defense across the entire network.</t>
    </abstract>
  </front>
  <middle>
    <section anchor="introduction">
      <name>Introduction</name>
      <t>Distributed Denial-of-Service (DDoS) attacks have been a persistent cyber threat, where IP spoofing DDoS is one of the major contributors.
Amplification DDoS typically exploit IP spoofing to generate large volumes of traffic with small requests, allowing attackers to overwhelm the target's resources while evading detection.
Some other DDoS attacks (e.g., TCP SYN Flooding <xref target="RFC4987"/>) also forge source IP addresses in order to drain the target's resources.</t>
      <t>To eliminate IP spoofing, several Source Address Validation (SAV) schemes have been proposed, such as SAVI<xref target="RFC7039"/>, uRPF<xref target="RFC3704"/> and EFP-uRPF<xref target="RFC8704"/>. 
However, the defense effectiveness of current SAV schemes highly depends on the SAV devices' deployment ratio.
A large number of spoofed packets can only be prevented with a significantly high deployment ratio, but the incremental deployment process is often slow.
According to CAIDA's Spoofer Project<xref target="CAIDA"/>, 28.7% of IPv4 autonomous systems (excluding NAT), and 34.3% of IPv6 autonomous systems are still spoofable by March 2023.
This indicates a limited SAV deployment, thus the defense effectiveness.</t>
      <t>In the above context, this document offers an SAV-based anti-DDoS architecture (SAV-D) that incorporates the following advances.</t>
      <ul spacing="normal">
        <li>SAV-honeynet based threat data collection. Each SAV device functions as a honeypot that does not directly drop spoofed packets but instead records the spoofing characteristics and sends them to a centralized control plane.</li>
        <li>Collaborative defense with both SAV and non-SAV devices. The control plane detects ongoing attacks and generates filtering rules.
These rules are then distributed to both SAV and non-SAV devices along the attack paths to manipulate malicious traffic.</li>
        <li>Threat information sharing with the victim-end. The control plane shares attack detection information and IP blocklists with victim-end defense systems to assist their mitigations.</li>
      </ul>
      <t>Through the mechanisms of honeynet, data aggregation and distribution, SV-D can fully leverage the value of SAV devices and threat data, resulting in a significant defense improvement.</t>
      <section anchor="requirements-language">
        <name>Requirements Language</name>
        <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
        <!-- # Body [REPLACE] -->

</section>
    </section>
    <section anchor="problem-statement">
      <name>Problem Statement</name>
      <t>The effectiveness of existing SAV schemes highly relies on the deployment ratio of devices, which is currently limited.
Adversaries often actively test their bots for plausibility, packet loss, and amplification benefits.
This testing can force the bots to migrate from SAV domains to non-SAV domains, resulting in fewer spoofed packets being blocked by SAV devices.
Additionally, uRPF and EFP-uRPF have issues with filtering accuracy in certain scenarios.
Some managers may hesitate to enable SAV due to the probability of filtering errors.
Moreover, SAV can prevent spoofed packets from being sent out, but it cannot provide protection for the deployers.
The lack of direct benefits may also impede the deployment process.
In this context, there is a strong need to improve the defense capabilities of current SAV practices.</t>
      <t>To achieve the goal, it is essential to consider the following limitations. 
Firstly, due to the attack testing, directly dropping spoofed packets can reduce the possibility of capturing threat data.
Secondly, in amplification DDoS, the reflected packets sent to victims have the authentic src-IP, making them unfilterable by SAV devices. 
Lastly, although today's SAV mechanism can filter spoofed packets at local devices, the important threat information they provide has yet to be fully utilized. 
If victims were made aware of the type of spoofing traffic targeting them, they could execute faster and more accurate countermeasures.</t>
    </section>
    <section anchor="sav-d-architecture">
      <name>SAV-D Architecture</name>
      <artwork><![CDATA[
+-----------------------------------------------------------------+
|                Control Plane (SAV Controller)                   |
+-----------------------------------------------------------------+
|  +----------------+   +------------------+   +---------------+  |
|  | Detecting DDoS |   | Generating Rules |   | Issuing Rules |  |
|  +----------------+   +------------------+   +---------------+  |
|                                                                 |
|  +----------------+   +------------------+                      |
|  |   Maintain IP  |   |  Sharing Threat  |                      |
|  |   Blocklists   |   |  Information     |     ...              |
|  +----------------+   +------------------+                      |
+---------------/\------------------------------++----------------+
                ||                              ||
                ||                              ||
+---------------++------------------------------\/----------------+
|  Data Plane (SAV Devices, Legacy Devices, Victims' Defense)     |
+-----------------------------------------------------------------+
|  +------------+    +-----------------+    +-------------+       |
|  | Monitoring |    | Receiving Rules |    |  Filtering  |  ...  |
|  +------------+    +-----------------+    +-------------+       |
+-----------------------------------------------------------------+

    Figure 1: The SAV-based Anti-DDoS Architecture
]]></artwork>
      <t>The proposed SAV-D is shown in Figure 1.
It introduces a centralized control plane (i.e., the controller) that connects SAV devices, legacy devices, and victims' defense systems.
The controllers can collect spoofing characteristics from widespread SAV devices (as honeypots) and aggregate them for further analysis.
From a whole viewpoint, the controller can detect ongoing attacks and generate filtering rules for both SAV and non-SAV devices.
These rules will be distributed to corresponding devices to perform filtering.
Additionally, the controller will share the attack information with the victims' defense system to assist in their defense operations.</t>
      <section anchor="sav-controller">
        <name>SAV Controller</name>
        <t>The controller is a logical entity that can be implemented as a distributed or centralized cluster system.
The placement of controllers may take several factors into consideration, including latency, resiliency, and load balancing to connected devices.</t>
        <ul spacing="normal">
          <li>To collect spoofing information, the controller will passively receive the data sent from the certified SAV devices.
The collected spoofing information should include but not limited to timestamp, 5-tuple (i.e., src-IP, dst-IP, src-port, dst-port, and protocol), TCP flag, packet size, and amounts.
This information will be readily stored in a database for further analysis.</li>
          <li>To analyze the aggregated statistics, the controller retrieves the spoofing information periodically (e.g., every 10 seconds).
The spoofed packets are analyzed based on their src-IP to detect reflection attacks with certain algorithms.
A large volume of spoofed packets using a specific protocol (e.g., NTP, DNS) is a clear indication that the src-IP is being targeted by reflection attacks.
The detection results include the attack target, type, duration, malicious IP lists, etc.</li>
          <li>Generating filtering rules based on detection results is a straightforward process.
Before the reflection, the filtering rules are based on src-IP and ports.
After reflection, the src-IP is the server's address, and the dst-IP is the victim's address.
Considering the reflected packets are often much larger than legitimate packets, filtering rules could be generated based on dst-IP, ports, and packet size.</li>
          <li>Communicating with relevant devices consists of two folds.
One fold is distributing filtering rules to SAV and legacy devices and receiving feedback from SAV devices.
The other fold is to provide the victim's defense system with attack detection information, which is essential to efficiently stop the attack traffic.</li>
        </ul>
      </section>
      <section anchor="sav-device">
        <name>SAV Device</name>
        <t>The SAV devices refer to routers or switches that are capable of validating the source IP address, including SAVI, uRPF, etc.
Compared to simply dropping spoofed packets, SAV devices are required to selectively allow spoofed packets through if they do not match the filtering rules.
This mechanism can be considered as a SAV-honeynet that records threat data related to spoofing.</t>
        <ul spacing="normal">
          <li>The SAV device must register it to the controller when being installed, in which a unique identification number and other information (e.g., location, management IP address) may needed.
Whenever a spoofed packet is detected, the SAV device will record its timestamp, 5-tuple, TCP flag, packet size, and so on. 
However, only if the spoofed packet matches existing filtering rules, will the packet be dropped.
After a certain interval, the recorded data will be compressed and sent to the controller.</li>
          <li>Modern devices are generally capable of filtering based on packet length and counting the number of filtered packets.
Upon receiving filtering rules from the controller, the SAV device must install them into its data plane.
The SAV device also needs to record the number of packets filtered by each rule.
If a rule filters no packet during some periods, the rule will be automatically removed to save the rule's space.</li>
        </ul>
      </section>
      <section anchor="legacy-device">
        <name>Legacy Device</name>
        <t>The commercial routers that are widely deployed in production are considered to be legacy devices.
Access Control List (ACL) is universally supported in today's routers for packet filtering.
Legacy devices can achieve extensive filtering by simply connecting their management interface to the controller and receiving the rules. 
Since ACLs may vary across legacy devices, filtering rules must be adapted to meet the specific requirements of each device.
The legacy routers can join the SAV-D system by registering it to the controller with information similar to the SAV router.
Once registered, the legacy routers can receive the filtering rules from the controller in a safe and trusted channel.
These rules will be installed into the data plane.
Similar to SAV devices, if a rule filters no packet during some period, the rule will be automatically removed.</t>
      </section>
      <section anchor="victims-defense">
        <name>Victims' Defense</name>
        <t>The SAV deployers can request access to the attack detection information related to themselves.
The information includes various details such as the attack target, type, duration, and malicious IP lists.
These details can serve as auxiliary signals to boost the detection time.
In addition, SAV-D can provide real-time updated IP blocklists, which can be efficiently used for blocking malicious traffic.
In an ideal situation, the defense system could provide an interface to directly receive the information and automatically perform corresponding filtering policies.
This mechanism could improve the effectiveness of DDoS defense and incentivize more SAV deployment.</t>
      </section>
      <section anchor="connection-example">
        <name>Connection Example</name>
        <artwork><![CDATA[
            +-------------------------------+           
+-------+   |  +-------+         +-------+  |  +-------+
| SR 1  +---+  | SC 1  +----+----+ SC 2  |  +--+ SR 3  |
+-------+   |  +-------+    |    +-------+  |  +-------+
            |               |               |           
+-------+   |           +---+---+           |  +-------+
| SR 2  +---+           | SC 3  |           +--+ SR 4  |
+-------+   |           +-------+           |  +-------+
            +-------------------------------+           
SR: SAV router
SC: SAV controller

      Figure 2: Connection Example of SAV Devices  
]]></artwork>
        <t>Figure 2 depicts a connection example of SAV-D system.
There are SAV routers distributed throughout the network, and they <bcp14>MUST</bcp14> communicate with the SAV controller in order to collaborate.
This document suggests that each SAV router stores several records of the SAV controller for backup.
Each SAV router <bcp14>MUST</bcp14> try to connect to its nearest SAV controller at all times.
If the SAV router loses contact with the present controller, it <bcp14>MUST</bcp14> seek the next closest controller.
Such a mechanism can assist SAV routers in maintaining connections to the best of their abilities.</t>
        <t>The SAV controller appears as a single entity to the external.
Realizing the full functionality of the SAV controller <bcp14>MAY</bcp14> require many computing and storage resources.
As a result, the SAV controller can be built as clustered or distributed servers, where consistency and scalability are the primary concerns.
Each SAV controller can communicate with many SAV routers and perform the corresponding functions.</t>
      </section>
    </section>
    <section anchor="workflow">
      <name>Workflow</name>
      <t>The proposed SAV-D architecture can collaboratively defend the IP spoofing DDoS in a distributed pattern.
The typical procedures are described as follows.</t>
      <t>(i). The SAV routers validate and record the characteristics of spoofed packets, and periodically send this data to the logically centralized controller, where the global spoofing information is aggregated.</t>
      <t>(ii). Based on the aggregated statistics, the controller can accurately detect whether there are ongoing IP spoofing attacks with the help of predefined algorithms.</t>
      <t>(iii). Based on the detection results, the controller can generate defense policies for both SAV and non-SAV devices. The policies mainly involve filtering rules on 5-tuple and packet size.</t>
      <t>(iv). For detected attacks, the defense policies will be distributed to all SAV and legacy devices.
Moreover, the detection results will also be sent to the victim's defense system.</t>
      <t>(v). The filtering rules will be installed on relevant devices to block the malicious packets.
If a rule filters no packet during some period, the rule will be automatically removed.</t>
    </section>
    <section anchor="scalability">
      <name>Scalability</name>
      <t>When there are large amounts of devices introduced into the SAV-D, the control plane could be implemented with hierarchical structure, where multiple sub-level controllers are in charge of the devices inside AS domains. 
The single top-level controller can exchange information (i.e., IP spoofing statistics and filtering rules) with these sub-level controllers.
Additionally, a large number of attacks and filtering rules could introduce another scalability problem.
One possible solution is to prioritize the mitigations of these attacks, where severe attacks will be tackled first so that the number of filtering rules will be limited to moderate scope.</t>
    </section>
    <section anchor="IANA">
      <name>IANA Considerations</name>
      <t>This document includes no request to IANA.</t>
    </section>
    <section anchor="Security">
      <name>Security Considerations</name>
      <t>Adversaries may send forged IP spoofing statistics to the control plane or send forged filtering rules to SAV and legacy devices, which could cause severe harm to legitimate traffic.
To avoid this situation, the information transmissions of SAV-D could be encrypted with certification.
There could also be attacks directly on the SAV-D controllers.
As common systems, security systems (e.g., firewalls) are essential to protect the controllers.
In addition, hot-standby controllers can also significantly improve security and availability.</t>
    </section>
  </middle>
  <back>
    <references>
      <name>References</name>
      <references>
        <name>Normative References</name>
        <reference anchor="RFC3704">
          <front>
            <title>Ingress Filtering for Multihomed Networks</title>
            <author fullname="F. Baker" initials="F." surname="Baker">
              <organization/>
            </author>
            <author fullname="P. Savola" initials="P." surname="Savola">
              <organization/>
            </author>
            <date month="March" year="2004"/>
            <abstract>
              <t>BCP 38, RFC 2827, is designed to limit the impact of distributed denial of service attacks, by denying traffic with spoofed addresses access to the network, and to help ensure that traffic is traceable to its correct source network.  As a side effect of protecting the Internet against such attacks, the network implementing the solution also protects itself from this and other attacks, such as spoofed management access to networking equipment.  There are cases when this may create problems, e.g., with multihoming.  This document describes the current ingress filtering operational mechanisms, examines generic issues related to ingress filtering, and delves into the effects on multihoming in particular.  This memo updates RFC 2827.  This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="84"/>
          <seriesInfo name="RFC" value="3704"/>
          <seriesInfo name="DOI" value="10.17487/RFC3704"/>
        </reference>
        <reference anchor="RFC8704">
          <front>
            <title>Enhanced Feasible-Path Unicast Reverse Path Forwarding</title>
            <author fullname="K. Sriram" initials="K." surname="Sriram">
              <organization/>
            </author>
            <author fullname="D. Montgomery" initials="D." surname="Montgomery">
              <organization/>
            </author>
            <author fullname="J. Haas" initials="J." surname="Haas">
              <organization/>
            </author>
            <date month="February" year="2020"/>
            <abstract>
              <t>This document identifies a need for and proposes improvement of the unicast Reverse Path Forwarding (uRPF) techniques (see RFC 3704) for detection and mitigation of source address spoofing (see BCP 38). Strict uRPF is inflexible about directionality, the loose uRPF is oblivious to directionality, and the current feasible-path uRPF attempts to strike a balance between the two (see RFC 3704). However, as shown in this document, the existing feasible-path uRPF still has shortcomings. This document describes enhanced feasible-path uRPF (EFP-uRPF) techniques that are more flexible (in a meaningful way) about directionality than the feasible-path uRPF (RFC 3704). The proposed EFP-uRPF methods aim to significantly reduce false positives regarding invalid detection in source address validation (SAV). Hence, they can potentially alleviate ISPs' concerns about the possibility of disrupting service for their customers and encourage greater deployment of uRPF techniques. This document updates RFC 3704.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="84"/>
          <seriesInfo name="RFC" value="8704"/>
          <seriesInfo name="DOI" value="10.17487/RFC8704"/>
        </reference>
        <reference anchor="RFC4987">
          <front>
            <title>TCP SYN Flooding Attacks and Common Mitigations</title>
            <author fullname="W. Eddy" initials="W." surname="Eddy">
              <organization/>
            </author>
            <date month="August" year="2007"/>
            <abstract>
              <t>This document describes TCP SYN flooding attacks, which have been well-known to the community for several years.  Various countermeasures against these attacks, and the trade-offs of each, are described.  This document archives explanations of the attack and common defense techniques for the benefit of TCP implementers and administrators of TCP servers or networks, but does not make any standards-level recommendations.  This memo provides information for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4987"/>
          <seriesInfo name="DOI" value="10.17487/RFC4987"/>
        </reference>
        <reference anchor="RFC7039">
          <front>
            <title>Source Address Validation Improvement (SAVI) Framework</title>
            <author fullname="J. Wu" initials="J." surname="Wu">
              <organization/>
            </author>
            <author fullname="J. Bi" initials="J." surname="Bi">
              <organization/>
            </author>
            <author fullname="M. Bagnulo" initials="M." surname="Bagnulo">
              <organization/>
            </author>
            <author fullname="F. Baker" initials="F." surname="Baker">
              <organization/>
            </author>
            <author fullname="C. Vogt" initials="C." role="editor" surname="Vogt">
              <organization/>
            </author>
            <date month="October" year="2013"/>
            <abstract>
              <t>Source Address Validation Improvement (SAVI) methods were developed to prevent nodes attached to the same IP link from spoofing each other's IP addresses, so as to complement ingress filtering with finer-grained, standardized IP source address validation.  This document is a framework document that describes and motivates the design of the SAVI methods.  Particular SAVI methods are described in other documents.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7039"/>
          <seriesInfo name="DOI" value="10.17487/RFC7039"/>
        </reference>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner">
              <organization/>
            </author>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification.  These words are often capitalized. This document defines these words as they should be interpreted in IETF documents.  This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba">
              <organization/>
            </author>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol  specifications.  This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the  defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
      </references>
      <references>
        <name>Informative References</name>
        <reference anchor="CAIDA" target="https://spoofer.caida.org/summary.php">
          <front>
            <title>State of IP Spoofing</title>
            <author>
              <organization/>
            </author>
            <date year="2023" month="March"/>
          </front>
        </reference>
      </references>
    </references>
    <section numbered="false" anchor="Acknowledgements">
      <name>Acknowledgements</name>
      <t>TBD</t>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
