2006-1607: SENIOR DESIGN PROJECT: DDOS ATTACK, DETECTION AND DEFENSE SIMULATION



Similar documents
A Senior Design Project on Network Security

Denial of Service (DoS) Technical Primer

White Paper A SECURITY GUIDE TO PROTECTING IP PHONE SYSTEMS AGAINST ATTACK. A balancing act

A Decision Maker s Guide to Securing an IT Infrastructure

Enhanced Secure Dynamic DNS Update with Indirect Route*

Gaurav Gupta CMSC 681

Norton Personal Firewall for Macintosh

Strategies to Protect Against Distributed Denial of Service (DD

Abstract. Introduction. Section I. What is Denial of Service Attack?

Michigan Technological University. Development of System Administration & Network Security Curriculum

Secure Software Programming and Vulnerability Analysis

The Reverse Firewall: Defeating DDOS Attacks Emanating from a Local Area Network

IDS / IPS. James E. Thiel S.W.A.T.

How to build and use a Honeypot. Ralph Edward Sutton, Jr. DTEC 6873 Section 01

Survey on DDoS Attack Detection and Prevention in Cloud

Network Instruments white paper

IDS : Intrusion Detection System the Survey of Information Security

Firewalls and Intrusion Detection

Second-generation (GenII) honeypots

Stress Testing and Distributed Denial of Service Testing of Network Infrastructures

CS5008: Internet Computing

Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs

TLP WHITE. Denial of service attacks: what you need to know

Advancement in Virtualization Based Intrusion Detection System in Cloud Environment

Denial of Service (DoS)

Microsoft Technologies

Use of Honeypot and IP Tracing Mechanism for Prevention of DDOS Attack

How To Protect A Dns Authority Server From A Flood Attack

DESIGN OF NETWORK SECURITY PROJECTS USING HONEYPOTS *

Denial of Service Attacks, What They are and How to Combat Them

Frequent Denial of Service Attacks

Guide to DDoS Attacks December 2014 Authored by: Lee Myers, SOC Analyst

A Novel Approach for Evaluating and Detecting Low Rate SIP Flooding Attack

A Layperson s Guide To DoS Attacks

Network Security Demonstration - Snort based IDS Integration -

Security Type of attacks Firewalls Protocols Packet filter

Distributed Denial of Service Attack Tools

White Paper. Intelligent DDoS Protection Use cases for applying DDoS Intelligence to improve preparation, detection and mitigation

Strategies to Protect Against Distributed Denial of Service (DDoS) Attacks

DDoS Overview and Incident Response Guide. July 2014

Course Title: Penetration Testing: Security Analysis

NETWORK SECURITY (W/LAB) Course Syllabus

CHAPETR 3. DISTRIBUTED DEPLOYMENT OF DDoS DEFENSE SYSTEM

Firewalls & Intrusion Detection

A Critical Investigation of Botnet

CS 356 Lecture 17 and 18 Intrusion Detection. Spring 2013

Network Security Administrator

Network Traffic Monitoring With Attacks and Intrusion Detection System

Overview. Packet filter

BUILDING A SECURITY OPERATION CENTER (SOC) ACI-BIT Vancouver, BC. Los Angeles World Airports

SECURITY TERMS: Advisory Backdoor - Blended Threat Blind Worm Bootstrapped Worm Bot Coordinated Scanning

Linux Network Security

WHITE PAPER PROCESS CONTROL NETWORK SECURITY: INTRUSION PREVENTION IN A CONTROL SYSTEMS ENVIRONMENT

Banking Security using Honeypot

CS 356 Lecture 16 Denial of Service. Spring 2013

A Firewall Data Log Analysis of Unauthorized and Suspicious Traffic

Network/Internet Forensic and Intrusion Log Analysis

Survey on DDoS Attack in Cloud Environment

SHARE THIS WHITEPAPER. Top Selection Criteria for an Anti-DDoS Solution Whitepaper

DDoS-blocker: Detection and Blocking of Distributed Denial of Service Attack

SCADA System Security. ECE 478 Network Security Oregon State University March 7, 2005

School of Information Science (IS 2935 Introduction to Computer Security, 2003)

TCP SYN Flood - Denial of Service Seung Jae Won University of Windsor wons@uwindsor.ca

Industrial Network Security for SCADA, Automation, Process Control and PLC Systems. Contents. 1 An Introduction to Industrial Network Security 1

20-CS X Network Security Spring, An Introduction To. Network Security. Week 1. January 7

HONEYD (OPEN SOURCE HONEYPOT SOFTWARE)

SY system so that an unauthorized individual can take over an authorized session, or to disrupt service to authorized users.

Vulnerability Analysis of Hash Tables to Sophisticated DDoS Attacks

Syllabus: IST451. Division of Business and Engineering. Penn State Altoona

DDoS Protection Technology White Paper

HoneyBOT User Guide A Windows based honeypot solution

Keyword: Cloud computing, service model, deployment model, network layer security.

HOW TO PREVENT DDOS ATTACKS IN A SERVICE PROVIDER ENVIRONMENT

SECURITY FLAWS IN INTERNET VOTING SYSTEM

Dos & DDoS Attack Signatures (note supplied by Steve Tonkovich of CAPTUS NETWORKS)

Integrated Network Vulnerability Scanning & Penetration Testing SAINTcorporation.com

ARP Storm Detection and Prevention Measures

CNA 432/532 OSI Layers Security

CYBER ATTACKS EXPLAINED: PACKET CRAFTING

A Novel Distributed Denial of Service (DDoS) Attacks Discriminating Detection in Flash Crowds

Networking: EC Council Network Security Administrator NSA

Course Title: ITAP 3471: Web Server Management

Index Terms Denial-of-Service Attack, Intrusion Prevention System, Internet Service Provider. Fig.1.Single IPS System

1. Introduction. 2. DoS/DDoS. MilsVPN DoS/DDoS and ISP. 2.1 What is DoS/DDoS? 2.2 What is SYN Flooding?

Firewall Firewall August, 2003

IDS and Penetration Testing Lab ISA656 (Attacker)

How To Protect Your Network From Attack From A Hacker On A University Server

Detection of Distributed Denial of Service Attack with Hadoop on Live Network

Modern Denial of Service Protection

Why Leaks Matter. Leak Detection and Mitigation as a Critical Element of Network Assurance. A publication of Lumeta Corporation

The Critical Importance of Three Dimensional Protection (3DP) in an Intrusion Prevention System

Pretend or Prevent? Intranet. Internet Router IDS Hub Firewall. Overview. Recognizing attacks. Intercepting attacks. White Paper

Goals. Understanding security testing

Transcription:

2006-1607: SENIOR DESIGN PROJECT: DDOS ATTACK, DETECTION AND DEFENSE SIMULATION Yu Cai, Michigan Technological University Dr. Yu Cai is an assistant professor at School of Technology in Michigan Technological University. His research interests include network protocols, distributed systems and cyber security. He received his Ph.D. in Computer Science from University of Colorado in 2005. He is a memeber of IEEE and ACM. Guy Hembroff, Michigan Technological University Mr. Guy Hembroff is an Assistant Professor within Michigan Tech University's School of Technology Department. His research interests are within the areas of cyber security, network protocols, encryption methods, health-care security, and biometrics. He has six years of industrial experience as a systems engineer and advanced network engineer. Mr. Hembroff is currently pursuing his Ph.D. degree in Computer Information Science. American Society for Engineering Education, 2006 Page 11.1115.1

Senior Design Project: DDoS Attack, Detection and Defense Simulation Abstract Distributed denial-of-service (DDoS) attack is a rapidly growing threat to today s Internet. Significant research works have been done in this area. It is vital to incorporate the latest research works in academic program to provide training and education to students and professionals for cyber security. In this paper, we present the design and implementation of a senior design project named DDoS Attack, Detection and Defense Simulation. We aim to build a test bed and configure the network environment to simulate the real-world DDoS attack, detection and defense. We study several DDoS attack tools, as well as some commonly-used DDoS detection and defense software. We perform extensive tests, collect and analyze the experimental data, and draw our conclusions. This is an on-going project. Some preliminary results have been reported here. The purpose of this project is to help students to apply their technical skills and knowledge on a real world project, and gain better understanding and more hands-on experience on Internet security, especially DDoS attack, detection and defense mechanisms. 1. Introduction Network security is a topic gaining tremendous interests in today s Information Technology world. The increasing frequency and severity of network attacks in recent years reveal some fundamental security issues of Internet environment. Significant efforts from university and industry have been made to improve computer and network security. It is vital to incorporate the latest research results in higher education and academic programs to provide training and education to college students and cyber security professionals. College seniors in Computer Network & System Administration (CNSA) program [1] at Michigan Technological University are required to complete a capstone senior design project during their final year. The senior design project affords students the opportunity to apply their individual technical skills and knowledge on a real world project, as well as develop their problem solving skills, communication skills, and teamwork skills. DDoS attack has become a rapidly growing threat to today s Internet. A large number of DDoS detection and defense mechanisms have been proposed to combat the problem. In this paper, we present the design and implementation of an Information Technology senior design project named DDoS Attack, Detection and Defense Simulation. In this project, we aim to set up test bed and configure the network environment to simulate the real-world DDoS attack, detection and defense mechanism. We test several DDoS attack software, as well as some leading DDoS detection and defense products and tools. The purpose of this project is to help student gain better understanding and more hands-on experience on Internet security, especially DDoS attack, detection and defense mechanisms. Page 11.1115.2

2. Background A DDoS attack is one in which a multitude of compromised computer systems attack a selected target, thereby causing denial of service for legitimate users of the targeted system. The flood of incoming traffic to the target system essentially forces it to shut down, thereby denying service to users. Figure 1 shows a typical DDoS attack [2]. A hacker begins a DDoS attack by exploiting vulnerability in a computer system and making it the DDoS "master". From the master system, the intruder identifies and communicates with other systems that can be compromised also. The intruder loads DDoS attack tools on those compromised systems. The intruder can instruct the controlled machines to launch one of many flood attacks against a specified target. The inundation of packets to the target causes a denial of service. Some DDoS attacks utilize Internet worms to automate the process of exploiting and compromising computer systems, as well as launching DDoS attacks. In general, DDoS defense research can be roughly categorized into four areas: intrusion prevention, intrusion detection, intrusion response, and intrusion tolerance. Intrusion prevention focuses on stopping attacks before attack packets reach the target victim. Intrusion detection explores the various techniques used to detect attack incidents as they occur. Intrusion response investigates various techniques to handle an attack once the attack is discovered. Intrusion tolerance responds to attacks by minimizing the attack impact. Handler (Middleman) www.victim.com Bandwidth Client (Attack Commander) Internet/ISP Bandwidth Handler (Middleman) Mastermind Intruder Figure1 A typical DDoS attack Page 11.1115.3

3. Project Design and Implementation This project is divided into three phases. The first phase of this project is to build a DDoS attack network and simulate the DDoS attacks. We test some existing DDoS attack tools, like StacheldrahtV4 [3]. We also develop several simple DDoS attack programs by ourselves. For example, programs that can launch ping flood attack or UDP attack. On the victim network, we use Apache web server [6] and RealPlayer Multimedia Server [7]. The students can observe how DDoS attacks affect the normal users and normal traffic. The second phase of this project is to set up DDoS Intrusion Detection and Defense systems. We use Snort [8], as well as several other leading products in market. We perform extensive tests and compare these DDoS defense products. We design our own defense mechanism by integrating Snort with Firewall and router to enable effective rate-limiting and QoS provisioning. This requires students to have good understanding on TCP/IP, iptable [9], firewall and router. The last part of this project is to further the studies on DDoS attacks. For example, there is a new type of DDoS attack called degrading DDoS attacks, or non-disruptive DDoS attacks. This type of DDoS attack consumes a large portion of victim network resources but does not stop the network services completely. The traditional DDoS defense mechanisms react poorly to degrading DDoS attacks. We also try to combine Internet worms with DDoS attacks. For example, Code Red worm [4] and SQL Slammer worm [5]. Phase III is probably too challenging and may go beyond the capability of college seniors from a technological university. We decide to make phase III optional, but strongly encourage students to further their studies. Student will get extra credit if they can make progress in this research area. Figure 2 DDoS Attack, Detection and Defense Test-bed Page 11.1115.4

Figure 2 shows the test bed built for the DDoS attack, detection and defense simulation. The machine configuration is as follows: PIII 667MHz, 256MB RAM, and100mb Ethernet connection. We build several virtual machines to expand the test bed. The operating systems are Linux Fedora Core 4 [11] and Windows server 2003. StacheldrahtV4 is used as the DDoS attack tool. 4. Preliminary Result This is an on-going project. We report some preliminary results as follows. The data is collected by using TCPdump [12]. The figures are drawn using GNUplot [13]. Figure 3 shows the normal traffic condition without DDoS attacks. X axis is the time in second; Y axis is the amount of traffic in packet/second. It is observed that the amount of traffic is around 40 packets per second, except for the initialization stage. It is normal to have larger data transmission rate at the initialization stage. Figure 3: Traffic condition before DDoS attack Figure 4: Traffic condition after DDoS attack Page 11.1115.5

Figure 4 shows the traffic condition after DDoS attacks. The attacks are launched at 150 second. It is observed that the normal traffic is interrupted. The traffic is either being almost stopped, or becoming bursty and unpredictable. Figure 5 show the traffic condition after DDoS detection and defense. The Intrusion Detection System (IDS) on end server raises intrusion alert and notify the firewall system. The firewall takes appropriate actions based on the intrusion alert and traffic condition. For example, firewall can drop packets from certain IP addresses, or rate-limit traffic from certain sources. It is observed that the traffic is brought back to normal after the intrusion detection and defense. Figure 5: traffic condition after DDoS defense 5. Project Management and Assessment This is a project for two senior students. They work as a team. Each team member must play a active role in designing, building, testing and troubleshooting the project. Every week students are required to submit a progress report and meet with the project advisor (faculty) for one hour. There is a monthly presentation meeting where different senior project teams will meet together and give a 15 minutes presentation to the advisor and their peers. Students are required to use Microsoft Project [10] to manage the progress of the project. At the end of the spring semester, students need to submit their final project report and take the oral project defense. The department uses the senior project as an assessment tool to evaluate students academic achievements. Students final grades are based upon the following factors. Quality of the project Quality of the report Project defense Documentation Monthly presentation and weekly report Peer evaluation Page 11.1115.6

6. Conclusion In this paper, we present the design and implementation of a senior design project named DDoS Attack, Detection and Defense Simulation. We build test bed, install the software, configure the network environment, and perform extensive tests. Some preliminary results are reported. The purpose of this project is to help student gain better understanding and more hands-on experience on Internet security. Bibliography 1. CNSA at MTU. http://www.tech.mtu.edu/cnsa/ 2. Angela Cearns, Design of an Autonomous anti-ddos Network. Master thesis, University of Colorado at Colorado Springs, 2002. 3. StacheldrahtV4, http://cs.uccs.edu/~scold/ddos 4. Code Red Worm, http://www.symantec.com/avcenter/venc/data/codered.worm.html 5. SQL Slammer Worm, http://securityresponse.symantec.com/avcenter/venc/data/w32.sqlexp.worm.html 6. Apache, http://www.apache.org 7. Realplayer, http://www.realplayer.com 8. Snort, http://www.snort.org 9. Iptable, http://iptables-tutorial.frozentux.net/iptables-tutorial.html 10. Microsoft Project, http://www.microsoft.com/office/project/prodinfo/default.mspx 11. Fedora Core 4, http://fedora.redhat.com/ 12. TCPdump, http://www.ethereal.com/docs/man-pages/tcpdump.8.html 13. GNUplot, http://www.gnuplot.info/ Page 11.1115.7