Defending against Flooding-Based Distributed Denial-of-Service Attacks: A Tutorial



Similar documents
Distributed Denial of Service (DDoS)

Firewalls and Intrusion Detection

CS 356 Lecture 16 Denial of Service. Spring 2013

Denial Of Service. Types of attacks

Strategies to Protect Against Distributed Denial of Service (DD

DDoS Overview and Incident Response Guide. July 2014

A TWO LEVEL ARCHITECTURE USING CONSENSUS METHOD FOR GLOBAL DECISION MAKING AGAINST DDoS ATTACKS

AN INFRASTRUCTURE TO DEFEND AGAINST DISTRIBUTED DENIAL OF SERVICE ATTACK. Wan, Kwok Kin Kalman

Network Security - DDoS

Denial of Service Attacks. Notes derived from Michael R. Grimaila s originals

A S B

Denial of Service. Tom Chen SMU

Dos & DDoS Attack Signatures (note supplied by Steve Tonkovich of CAPTUS NETWORKS)

Federal Computer Incident Response Center (FedCIRC) Defense Tactics for Distributed Denial of Service Attacks

How To Protect A Dns Authority Server From A Flood Attack

Acquia Cloud Edge Protect Powered by CloudFlare

CloudFlare advanced DDoS protection

SECURING APACHE : DOS & DDOS ATTACKS - I

TECHNICAL NOTE 06/02 RESPONSE TO DISTRIBUTED DENIAL OF SERVICE (DDOS) ATTACKS

co Characterizing and Tracing Packet Floods Using Cisco R

Outline. CSc 466/566. Computer Security. 18 : Network Security Introduction. Network Topology. Network Topology. Christian Collberg

Chapter 8 Security Pt 2

Distributed Denial of Service(DDoS) Attack Techniques and Prevention on Cloud Environment

Denial of Service (DoS)

Announcements. No question session this week

DISTRIBUTED DENIAL OF SERVICE OBSERVATIONS

DDoS Attack Trends and Countermeasures A Information Theoretical Metric Based Approach

Modern Denial of Service Protection

Denial of Service Attacks

Denial of Service Attacks

Security vulnerabilities in the Internet and possible solutions

Gaurav Gupta CMSC 681

A COMPREHENSIVE STUDY OF DDOS ATTACKS AND DEFENSE MECHANISMS

Network Security. Marcus Bendtsen Institutionen för Datavetenskap (IDA) Avdelningen för Databas- och Informationsteknik (ADIT)

Network Security. Dr. Ihsan Ullah. Department of Computer Science & IT University of Balochistan, Quetta Pakistan. April 23, 2015

Denial of Service Attacks and Countermeasures. Extreme Networks, Inc. All rights reserved. ExtremeXOS Implementing Advanced Security (EIAS)

Wharf T&T Limited DDoS Mitigation Service Customer Portal User Guide

Network Bandwidth Denial of Service (DoS)

Abstract. Introduction. Section I. What is Denial of Service Attack?

Strategies to Protect Against Distributed Denial of Service (DDoS) Attacks

SY system so that an unauthorized individual can take over an authorized session, or to disrupt service to authorized users.

How To Stop A Ddos Attack On A Network From Tracing To Source From A Network To A Source Address

DDoS Vulnerability Analysis of Bittorrent Protocol

Internet Firewall CSIS Packet Filtering. Internet Firewall. Examples. Spring 2011 CSIS net15 1. Routers can implement packet filtering

FIREWALLS. Firewall: isolates organization s internal net from larger Internet, allowing some packets to pass, blocking others

WHITE PAPER. FortiGate DoS Protection Block Malicious Traffic Before It Affects Critical Applications and Systems

Denial of Service Attacks: Classification and Response

A Defense Framework for Flooding-based DDoS Attacks

Denial of Service Attacks, What They are and How to Combat Them

CSE 3482 Introduction to Computer Security. Denial of Service (DoS) Attacks

Inferring Internet Denial-of

1. Firewall Configuration

Network Security. Chapter 9. Attack prevention, detection and response. Attack Prevention. Part I: Attack Prevention

How To Classify A Dnet Attack

DDoS Attack and Defense: Review of Some Traditional and Current Techniques

How To Understand A Network Attack

Guide to DDoS Attacks December 2014 Authored by: Lee Myers, SOC Analyst

Attack and Defense Techniques

Security: Attack and Defense

TDC s perspective on DDoS threats

Safeguards Against Denial of Service Attacks for IP Phones

Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs

CYBER ATTACKS EXPLAINED: PACKET CRAFTING

CSCE 465 Computer & Network Security

Seminar Computer Security

Survey on DDoS Attack Detection and Prevention in Cloud

An Anomaly-Based Method for DDoS Attacks Detection using RBF Neural Networks

MONITORING OF TRAFFIC OVER THE VICTIM UNDER TCP SYN FLOOD IN A LAN

1. Introduction. 2. DoS/DDoS. MilsVPN DoS/DDoS and ISP. 2.1 What is DoS/DDoS? 2.2 What is SYN Flooding?

Analysis of a DDoS Attack

Protecting Web Servers from DoS/DDoS Flooding Attacks A Technical Overview. Noureldien A. Noureldien College of Technological Sciences Omdurman, Sudan

Development of a Network Intrusion Detection System

OVERVIEW OF DDOS ALGORITHMS: A SURVEY

Queuing Algorithms Performance against Buffer Size and Attack Intensities

Content Distribution Networks (CDN)

An Efficient Filter for Denial-of-Service Bandwidth Attacks

JUNOS DDoS SECURE. Advanced DDoS Mitigation Technology

CS5008: Internet Computing

CHAPETR 3. DISTRIBUTED DEPLOYMENT OF DDoS DEFENSE SYSTEM

SECURITY FLAWS IN INTERNET VOTING SYSTEM

Denial of Service (DoS) attacks and countermeasures. Pier Luigi Rotondo IT Specialist IBM Rome Tivoli Laboratory

Depth-in-Defense Approach against DDoS

Yahoo Attack. Is DDoS a Real Problem?

DDoS Protection Technology White Paper

Botnets. Botnets and Spam. Joining the IRC Channel. Command and Control. Tadayoshi Kohno

Firewall Firewall August, 2003

How To Defend Against A Distributed Denial Of Service Attack (Ddos)

About Firewall Protection

How To Block A Ddos Attack On A Network With A Firewall

20-CS X Network Security Spring, An Introduction To. Network Security. Week 1. January 7

DNS amplification attacks

RID-DoS: Real-time Inter-network Defense Against Denial of Service Attacks. Kathleen M. Moriarty. MIT Lincoln Laboratory.

Introduction of Intrusion Detection Systems

Transcription:

Defending against Flooding-Based Distributed Denial-of-Service Attacks: A Tutorial Rocky K. C. Chang The Hong Kong Polytechnic University Presented by Scott McLaren 1

Overview DDoS overview Types of attacks Solutions to DDoS attacks Internet Firewall Comparisons Conclusions 2

DDoS Attacks Do not rely on particular network protocols or system weaknesses Exploit huge resources of the Internet Many attackers, one victim Traffic jams or crashes the victim, or its Internet connection Yahoo!, ebay, Amazon, were attacked by DDoS attacks in February 2000 3

DDoS Attacks Are most common form of attacks on the Internet today Most go unreported A recent study observed more than more than 12,000 DoS (DDos?) attacks during a three-week period Actual number is probably much higher 4

DDoS Attacks Already a major problem Attacks are made easy by user- friendly tools Still a lack of effective defense Aborting attack in progress Tracing back to attack sources Expected to become more severe and serious Cyber Warfare Disable strategic business, government, public utility and military sites Blackmail Companies have appeared in the last 2 years to offer solutions 5

Direct Attacks An attacker sends a large number of attack packets directly to a victim Spoofed addresses in packets, so responses go un- ACKed to R until timeout 6

SYN flooding If port is listening, victim responds with SYN- ACK packets Source addresses are spoofed, responses go to other hosts Victim retransmits SYN-ACK packet several times Half-open connections consume all the resources for pending connections, prevents new requests 7

Attacks by protocol Protocol TCP UDP ICMP Percentage 94% 2% 2% TCP attacks are mainly SYN-ACK based, RST packets, or ICMP error messages 8

Attack Process Attacker sets up attack network Attacking host is compromised by attacker Attacking host implanted with master and agent programs Trinoo, Tribe Flood Network 2000, Stacheldraht 9

Reflector Attacks Intermediary nodes (routers & servers) are used to launch attack Attacker sends packets with source address set to victim s Reflectors send response to victim 10

Attack Process Based on reflector generating messages in response to other messages Any protocol that supports automatic message generation can be used SYN- ACK or RST packets When SYN- ACK used, reflector behaves like victim of SYN flooding due to ½ open connections Clog network link 11

Types of Reflector Attacks Packets with inactive destination ports result in ICMP port unreachable messages Packets with small TTL result in ICMP time exceeded messages Bandwidth amplification Attack packet results in reflected packet much larger in size (DNS replies) 12

Analyzing Reflector Attacks Cannot be observed by backscatter analysis, because victims do not send back any packets Number of reflector attacks unknown Reflected packets are normal packets, so they cannot be filtered based on address spoofing or route-based mechanism 13

Attack Packets Required Modeled as a G/D/ /N queue G general arrival process D lifetime for each ½ open connection N ½ open connections allowed by victim Infinite server queuing model yields the minimal rate of SYN packets required to exhaust server s resources 14

Server Comparison BSD retransmission timeout at 6, 24, 48s, gives up after total of 75s Linux 3, 6, 12s, etc. Up to 7 retransmissions, gives up after 309s Windows 2000 Advanced Server retransmits SYN packets at most twice, gives up after 9s 15

Server Comparison If SYN packet is 84 bytes long, a 56 kb/s connection will stall Linux and BSD, N 6,000 A 1 Mb/s connection will stall all three with N 10,000 Direct ICMP ping flooding attack requires 5,000 agents for a T1 link Reflector attack requires 5,000 reflectors, but agents are much fewer if each agents sends requests to multiple reflectors 16

Solutions to DDoS Problems Attack prevention and preemption Before the attack Attack detection and filtering During the attack Attack source traceback and identification During and after the attack 17

Attack Prevention and Preemption Signatures and scanning procedures exist to detect agent implants Monitor network traffic for known attack messages between attackers and masters Cyber-informants and cyber-spies Some users just don t care No incentive for ISPs or enterprise networks do not have incentive to monitor for attack packets 18

Attack Source Traceback and Identification Trackback identifying the actual source of packets, without relying on header information Two approaches Router records information about packets Router sends addition information to destinations, via the packets or ICMP messages Cannot be used to stop an ongoing attack Packet s origin cannot always be traced (firewalls and NAT) Ineffective in reflector attacks Packets come from legitimate sources in Used to collect evidence for post- attack law enforcement 19

Attack Detection and Filtering False positive ratio (FPR) Packets classified as attack packets that are actually normal, divided by total normal packets False negative ratio (FNR) Packets classified as normal that are actually attack packets, divided by total attack packets Packet filtering drops attack and normal packets Effectiveness measured by normal packet survival ratio (NPSR) 20

Attack Detection and Filtering 21

Attack Detection and Filtering Source Networks can filter packets Victim s Networks can detect attack Victim s Upstream ISP Requested to filter attack packets (by phone) Ideally an intrusion alert protocol would be used Further Upstream ISP Networks would have to cooperate and install packet filters when intrusion alerts are received 22

Internet Firewall Detect DDoS attack in the Internet core Could maintain a victim s normal service during an attack 23

Route-based Packet Filtering Extends ingress packet filtering to core Checks if packet comes from correct link, according to inscribed source and destination If packet is from unexpected source it is dropped Route changes can cause false positives Packet filters in 18% of ASs in Internet can significantly reduce spoofed packets BGP messages would require source addresses, increasing message size and time Currently there are > 10,000 ASs, so 1800 filters would have to be in place 24

Distributed Attack Detection Approach Extends intrusion detection system to core Detects based on network anomalies and misuses observed by detection systems (DSs) Anomaly detection determines normal and deviant traffic patterns Misuse detection identifies attack signatures 25

Detection Systems Placed in strategic locations Nonintrusively monitor traffic Exchange attack information from local observations Stateful to presence or absence of DDoS attacks Need a separate channel to communicate Number of DSs is much smaller than RPF, DSs does not rely on routing information More DSs would result in a larger delay response 26

Detection System Design Process packets at very high speeds Need a high-speed packet classifier Local and global detection H 1 presence of a DDoS attack H 0 a null hypothesis When H 1 occurs, alerts sent to other DSs Each DS analyzes its results and other DSs results to make a global detection decision Attack confidence level If DS is confirmed, filters are installed, optionally notifies upstream routers 27

Detection System Design Install filters only on suspected switch interfaces DSs must always be connected, physically and have usable paths Questions remain best topology, how to reconnect DSs, how does DSs send alerts when it is under attack Communication Protocols Intrusion Detection Exchange Protocol Intrusion Detection Message Exchange Format 28

Quickest Detection Studied in signal processing, quality control, and wireless channel monitoring DS periodically computes instantaneous traffic intensity Objective is to minimize the expected delay in detection, based on thresholds 29

Limitations and problems Need to determine thresholds for local and global thresholds and traffic modeling There is a delay to reach global detection, DS network does not detect short attacks DS network should be designed for attacks > 5 min (75% of all attacks in a recent study) Flash crowds result in false alarms Unpredictable major news stories Predictable but nonrepetitive sports Predictable and repetitive opening of stock market Use a different traffic model when flash crowd occurs Degradation of Service Attacks (DeS) Short bursts of attack packets 30

Comparison 31

Conclusion Current defense in inadequate Still many insecure areas on the Internet More effective detect-and-filter approaches must be developed 32

What's the big deal? Argues for the use of an Internet Firewall Compares and contrasts route-based packet filtering and distributed attack detection 33

Questions 34