Distributed Denial of Service Attacks & Defenses



Similar documents
How To Protect Your Network From A Ddos Attack On A Network With Pip (Ipo) And Pipi (Ipnet) From A Network Attack On An Ip Address Or Ip Address (Ipa) On A Router Or Ipa

CS 356 Lecture 16 Denial of Service. Spring 2013

Firewalls and Intrusion Detection

How To Block A Ddos Attack On A Network With A Firewall

Announcements. No question session this week

Defending DDoS Attacks Using Traffic Differentiation and Distributed Deployment

Denial of Service Attacks

ATTACKS ON CLOUD COMPUTING. Nadra Waheed

Provider-Based Deterministic Packet Marking against Distributed DoS Attacks

Protecting Mobile Devices From TCP Flooding Attacks

Towards Autonomic DDoS Mitigation using Software Defined Networking

Dr. Arjan Durresi Louisiana State University, Baton Rouge, LA DDoS and IP Traceback. Overview

Network Bandwidth Denial of Service (DoS)

Defending against Flooding-Based Distributed Denial-of-Service Attacks: A Tutorial

Denial of Service Attacks

Network Security. Chapter 9. Attack prevention, detection and response. Attack Prevention. Part I: Attack Prevention

MASSIF: A Highly Scalable SIEM

MONITORING OF TRAFFIC OVER THE VICTIM UNDER TCP SYN FLOOD IN A LAN

Distributed Denial of Service (DDoS)

Distributed Denial of Service(DDoS) Attack Techniques and Prevention on Cloud Environment

Stress Testing and Distributed Denial of Service Testing of Network Infrastructures

Low-rate TCP-targeted Denial of Service Attack Defense

A Defense Framework for Flooding-based DDoS Attacks

Should the IETF do anything about DDoS attacks? Mark Handley

Referring to the above question, the end-to-end delay (transmission delay plus propagation delay) is

Using Fuzzy Logic Control to Provide Intelligent Traffic Management Service for High-Speed Networks ABSTRACT:

Federal Computer Incident Response Center (FedCIRC) Defense Tactics for Distributed Denial of Service Attacks

Port Hopping for Resilient Networks

DDoS Protection. How Cisco IT Protects Against Distributed Denial of Service Attacks. A Cisco on Cisco Case Study: Inside Cisco IT

Acquia Cloud Edge Protect Powered by CloudFlare

WhitePaper. Mitigation and Detection with FortiDDoS Fortinet. Introduction

High-Speed TCP Performance Characterization under Various Operating Systems

CloudFlare advanced DDoS protection

A S B

CapMan: Capability-based Defense against Multi-Path Denial of Service (DoS) Attacks in MANET

How To Protect A Dns Authority Server From A Flood Attack

BlackRidge Technology Transport Access Control: Overview

Denial of Service. Tom Chen SMU

Secure Software Programming and Vulnerability Analysis

Security Technology White Paper

Performance Evaluation of DVMRP Multicasting Network over ICMP Ping Flood for DDoS

Security vulnerabilities in the Internet and possible solutions

CS 640 Introduction to Computer Networks. Network security (continued) Key Distribution a first step. Lecture24

Final exam review, Fall 2005 FSU (CIS-5357) Network Security

TDC s perspective on DDoS threats

Prevention, Detection, Mitigation

DDoS Attack and Defense: Review of Some Traditional and Current Techniques

SECURITY FLAWS IN INTERNET VOTING SYSTEM

Denial of Service Attacks and Resilient Overlay Networks

DISTRIBUTED DENIAL OF SERVICE OBSERVATIONS

Depth-in-Defense Approach against DDoS

DDoS Overview and Incident Response Guide. July 2014

Quality of Service using Traffic Engineering over MPLS: An Analysis. Praveen Bhaniramka, Wei Sun, Raj Jain

DoS: Attack and Defense

Malicious Programs. CEN 448 Security and Internet Protocols Chapter 19 Malicious Software

Router Based Mechanism for Mitigation of DDoS Attack- A Survey

Queuing Algorithms Performance against Buffer Size and Attack Intensities

SECURING APACHE : DOS & DDOS ATTACKS - I

Abstract. Introduction. Section I. What is Denial of Service Attack?

This document is licensed for use, redistribution, and derivative works, commercial or otherwise, in accordance with the Creative Commons

Security in Structured P2P Systems

Frequent Denial of Service Attacks

Flexible Deterministic Packet Marking: An IP Traceback Scheme Against DDOS Attacks

Strategies to Protect Against Distributed Denial of Service (DD

packet retransmitting based on dynamic route table technology, as shown in fig. 2 and 3.

DDoS attacks on electronic payment systems. Sean Rijs and Joris Claassen Supervisor: Stefan Dusée

A TWO LEVEL ARCHITECTURE USING CONSENSUS METHOD FOR GLOBAL DECISION MAKING AGAINST DDoS ATTACKS

RID-DoS: Real-time Inter-network Defense Against Denial of Service Attacks. Kathleen M. Moriarty. MIT Lincoln Laboratory.

NEW TECHNIQUES FOR THE DETECTION AND TRACKING OF THE DDOS ATTACKS

Question: 3 When using Application Intelligence, Server Time may be defined as.

An Anomaly-Based Method for DDoS Attacks Detection using RBF Neural Networks

A Practical Method to Counteract Denial of Service Attacks

How to launch and defend against a DDoS

SOFTWARE ENGINEERING 4C03. Computer Networks & Computer Security. Network Firewall

The Coremelt Attack. Ahren Studer and Adrian Perrig. We ve Come to Rely on the Internet

Lecture 23: Firewalls

20-CS X Network Security Spring, An Introduction To. Network Security. Week 1. January 7

1. Introduction. 2. DoS/DDoS. MilsVPN DoS/DDoS and ISP. 2.1 What is DoS/DDoS? 2.2 What is SYN Flooding?

Network Security. Dr. Ihsan Ullah. Department of Computer Science & IT University of Balochistan, Quetta Pakistan. April 23, 2015

co Characterizing and Tracing Packet Floods Using Cisco R

PACKET SIMULATION OF DISTRIBUTED DENIAL OF SERVICE (DDOS) ATTACK AND RECOVERY

Chapter 8 Security Pt 2

Bandwidth based Distributed Denial of Service Attack Detection using Artificial Immune System

Transcription:

Distributed Denial of Service Attacks & Defenses Guest Lecture by: Vamsi Kambhampati Fall 2011

Distributed Denial of Service (DDoS) Exhaust resources of a target, or the resources it depends on Resources: CPU, Memory, Bandwidth Legitimate clients cannot access the target server Should we care? For researchers: interesting problem; difficult to solve. For others: monetary loss, infrastructure security.

Example: Bandwidth Exhaustion DDoS Attack attacker congested router legitimate client attacker destination attacker packets dropped legitimate packets also dropped

Well-behaved and misbehaving flow at router congested router congestion at router rate pkts/sec Legitimate flow Attacker flow time

Well-behaved and misbehaving traffic at router misbehaving aggregate gains throughput congested router rate pkts/sec well-behaved aggregate looses throughput time

Well-behaved and misbehaving traffic at destination destination rate pkts/sec misbehaving traffic does not slow down when destination requests well-behaved traffic slows down when destination requests time

What is the problem? Well-behaved (i.e., legitimate) traffic follows protocol rules Misbehaving traffic does not follow protocol rules Internet lacks distributed enforcement of protocol rules

Defending DDoS Attacks Filtering Ingress filtering, Traceback, Pushback Network capabilities Stateless Internet flow filtering (SIFF) Traffic validation architecture (TVA) Proof of work Congestion puzzles, Defense by offense Location hiding Secure overlay services (SOS), i3

DDoS defense with traceback packet routers insert edge information destination constructs path from edge information destination

DDoS defense with pushback pushback to contributing router identify aggregate responsible for congestion contributing router congested router destination

Network Capabilities Fundamental change to the Internet, so that sender must have authorization from receiver to send traffic Receiver decides what traffic it wants to receive or not receive Network enforces receiver s decision

Phase 1: Request Capabilities pre-capabilities SYN SYN SYN source destination

Pre-Capabilities Cryptographically generated at each router R Each router can independently verify its own precapability Timestamp + Hash(SrcIP, DstIP, time, R secret ) SrcIP, DstIP tie the capability to a flow R secret : secret key only known to the router (the same secret is used for all pre-capabilities) R secret changed twice per timestamp roll over

Phase 2: Authorizing a source attacker source destination SYN host-capability

Host-Capability Cryptographically generated at the destination using pre-capabilities Timestamp + Hash(pre-capabilities, N, T) N is the number of packets authorized per capability T is the time period for which the capability is valid Routers track N, and T

Phase 3: Send Traffic attacker BOGUS source destination DATA verify pre-capability verify host-capability

Traffic Classes Traffic classes Request Request packets (such as TCP SYN) Regular Packets with capabilities Demoted Packets with invalid capabilities Legacy Separate bandwidth allocated to regular and request traffic at each router

Denial of Capabilities (DoC) Attacker sends flood of request packets Legitimate requests get lost before reaching the destination TVA solution: Path identifiers (Pi)

Path Identifiers Routers insider Pi bits into request packets Kind of like pre-capabilities Next downstream router fair-queues on the Pi bits inserted at upstream routers Number of Pi queues = number of upstream routers

Simulation Topology 10 legitimate clients destination 10Mbps, 10ms bottleneck link 10ms 10ms 1 ~ 100 attackers colluder

Simulation Results (1) Legitimate clients are unaffected As number of attackers increase, legitimate clients suffer Legacy traffic floods

Simulation Results (2) Request traffic floods

Summary DDoS attacks are a major threat to the Internet Capabilities make fundamental changes to the Internet to defend DDoS attacks Sender needs authorization from receiver to send traffic Capabilities setup is challenging Denial of Capability attacks