Malice Aforethought [D]DoS on Today's Internet



Similar documents
CS 356 Lecture 16 Denial of Service. Spring 2013

Provider-Based Deterministic Packet Marking against Distributed DoS Attacks

Distributed Denial of Service (DDoS)

co Characterizing and Tracing Packet Floods Using Cisco R

How To Protect A Dns Authority Server From A Flood Attack

1. Introduction. 2. DoS/DDoS. MilsVPN DoS/DDoS and ISP. 2.1 What is DoS/DDoS? 2.2 What is SYN Flooding?

Security vulnerabilities in the Internet and possible solutions

SECURING APACHE : DOS & DDOS ATTACKS - I

FIREWALLS. Firewall: isolates organization s internal net from larger Internet, allowing some packets to pass, blocking others

Seminar Computer Security

Defending against Flooding-Based Distributed Denial-of-Service Attacks: A Tutorial

Chapter 8 Security Pt 2

A novel approach to detecting DDoS attacks at an early stage

Network Security. Chapter 9. Attack prevention, detection and response. Attack Prevention. Part I: Attack Prevention

A S B

Content Distribution Networks (CDN)

DDoS Protection. How Cisco IT Protects Against Distributed Denial of Service Attacks. A Cisco on Cisco Case Study: Inside Cisco IT

Strategies to Protect Against Distributed Denial of Service (DD

Distributed Denial of Service(DDoS) Attack Techniques and Prevention on Cloud Environment

The Reverse Firewall: Defeating DDOS Attacks Emanating from a Local Area Network

Survey on DDoS Attack Detection and Prevention in Cloud

Yahoo Attack. Is DDoS a Real Problem?

Denial Of Service. Types of attacks

Dr. Arjan Durresi Louisiana State University, Baton Rouge, LA DDoS and IP Traceback. Overview

Automated Mitigation of the Largest and Smartest DDoS Attacks

Security of IPv6 and DNSSEC for penetration testers

Comparing Two Models of Distributed Denial of Service (DDoS) Defences

Denial of Service. Tom Chen SMU

CS5008: Internet Computing

MONITORING OF TRAFFIC OVER THE VICTIM UNDER TCP SYN FLOOD IN A LAN

How To Protect Your Network From A Ddos Attack On A Network With Pip (Ipo) And Pipi (Ipnet) From A Network Attack On An Ip Address Or Ip Address (Ipa) On A Router Or Ipa

Acquia Cloud Edge Protect Powered by CloudFlare

A Relative Study for Detection and Prevention of DDoS Attacks

Denial of Service Attacks. Notes derived from Michael R. Grimaila s originals

Automated Mitigation of the Largest and Smartest DDoS Attacks

Network Security: Network Flooding. Seungwon Shin GSIS, KAIST

DDoS Protection Technology White Paper

CloudFlare advanced DDoS protection

Frequent Denial of Service Attacks

An Efficient Filter for Denial-of-Service Bandwidth Attacks

Announcements. No question session this week

Attack and Defense Techniques

Denial of Service Attacks, What They are and How to Combat Them

Design and Experiments of small DDoS Defense System using Traffic Deflecting in Autonomous System

Denial of Service Attacks

A Novel Packet Marketing Method in DDoS Attack Detection

SECURITY FLAWS IN INTERNET VOTING SYSTEM

TDC s perspective on DDoS threats

Keywords Attack model, DDoS, Host Scan, Port Scan

DoS: Attack and Defense

Modern Denial of Service Protection

V-ISA Reputation Mechanism, Enabling Precise Defense against New DDoS Attacks

SY system so that an unauthorized individual can take over an authorized session, or to disrupt service to authorized users.

Application of Netflow logs in Analysis and Detection of DDoS Attacks

Federal Computer Incident Response Center (FedCIRC) Defense Tactics for Distributed Denial of Service Attacks

A Novel Technique for Detecting DDoS Attacks at Its Early Stage

Survey on DDoS Attack in Cloud Environment

Vulnerability Analysis of Hash Tables to Sophisticated DDoS Attacks

Safeguards Against Denial of Service Attacks for IP Phones

Complete Protection against Evolving DDoS Threats

CMPT 471 Networking II

1. Firewall Configuration

Chapter 28 Denial of Service (DoS) Attack Prevention

A TWO LEVEL ARCHITECTURE USING CONSENSUS METHOD FOR GLOBAL DECISION MAKING AGAINST DDoS ATTACKS

An Anomaly-Based Method for DDoS Attacks Detection using RBF Neural Networks

Security: Attack and Defense

HOW TO PREVENT DDOS ATTACKS IN A SERVICE PROVIDER ENVIRONMENT

Denial of Service Attacks

CSE 3482 Introduction to Computer Security. Denial of Service (DoS) Attacks

Active Internet Traffic Filtering to Denial of Service Attacks from Flash Crowds

Introduction about DDoS. Security Functional Requirements

A HYBRID APPROACH TO COUNTER APPLICATION LAYER DDOS ATTACKS

Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs

How To Classify A Dnet Attack

Dos & DDoS Attack Signatures (note supplied by Steve Tonkovich of CAPTUS NETWORKS)

Denial of Service attacks: analysis and countermeasures. Marek Ostaszewski

CS 640 Introduction to Computer Networks. Network security (continued) Key Distribution a first step. Lecture24

DDoS Protection on the Security Gateway

How Cisco IT Protects Against Distributed Denial of Service Attacks

DDoS Attack Trends and Countermeasures A Information Theoretical Metric Based Approach

The Coremelt Attack. Ahren Studer and Adrian Perrig. We ve Come to Rely on the Internet

How To Block A Ddos Attack On A Network With A Firewall

Secure Software Programming and Vulnerability Analysis

Understanding & Preventing DDoS Attacks (Distributed Denial of Service) A Report For Small Business

DDoS Overview and Incident Response Guide. July 2014

Towards Autonomic DDoS Mitigation using Software Defined Networking

Firewalls and Intrusion Detection

Network Security in Practice

Transcription:

Malice Aforethought [D]DoS on Today's Internet Henry Duwe and Sam Mussmann http://bit.ly/cs538-ddos

What is DoS? "A denial of service (DoS) attack aims to deny access by legitimate users to shared services or resources." [Gligor 1984] Two main flavors: Exploit vulnerabilities (ping-of-death) Use massive amounts of traffic to occupy resources

A Short History of DoS Observed on the Internet as early as 1990. Tier-1 attacks involve only the attacker(s) and victim. Bandwidth flood UDP flood SYN flood Tier-2 attacks begin in mid-1990s. Smurf Attack Reflection Attack http://www.uniforum.chi.il.us/slides/ddos/index.html http://goo.gl/5vbcq

A Short History of DoS Tier-3 attacks use slave computers, called DDoS First well-documented case in August 1999 on a University of Minnesota system First well-publicized case occurred in February of 2000 Attack techniques are constantly evolving Malicious TCP window sizes (see Sockstress on wikipedia) Banana Attack http://www.garykessler.net/library/ddos.html http://goo.gl/jgpjs

Why is the Internet susceptible to DoS? Packet Switching End-to-end principle Multipath routing Decentralized Internet management Everything that makes the Internet awesome

Outline 1. Introduction to DoS 2. Scalable Attack Detection in the Network (Primary Paper) 3. Kill-Bots (Detection on the victim) 4. A Novel Approach to Early Attack Detection (Detection from backscatter) 5. Fixing the Incentive Chain (Economic metasolution)

Where can we detect and defend against attacks?

On Scalable Attack Detection in the Network. Ramana Rao Kompella, Sumeet Singh, and George Varghese. 2004. 4th ACM SIGCOMM conference on Internet measurement

TCP Scan detection Consider detecting TCP scans in the case where there's only one flow. Most connections during a TCP scan will not receive a SYN/ACK packet, and thus will never complete (FIN packet). Increment a counter when we see a SYN packet. Decrement the counter when we see a FIN packet. If counter grows beyond some bound, we can recognise malicious behavior (a reasonable value for this bound is three times the standard deviation of a non-malicious flow).

TCP Scan Detection Consider the case where we have two flows. Imagine one is scanning a number of hosts in your network and the other is connecting to a number of HTTP servers in your network. One counter for each source IP address. This is the current state-of-the-art. (Snort, Bro) But what when we have thousands or millions of flows?

Key {Problem,Question,Contribution} Current solutions require per-flow state to detect behavioral attacks. Can we use aggregation to reduce the state required to detect behavioral attacks? Yes. Two new problems: Behavioral Aliasing -- False Positive Behavioral Spoofing -- False Negative

What kind of attacks will this detect? Partial Completion (or Claim-and-Hold) attacks e.g. TCP SYN flood Scanning Attacks TCP port scan Bandwidth Attacks These are already easily covered by current techniques

TCP Scan Detection with Partial Completion Filters Instead of one entry per source IP, hash the source IP and put all the flows with the same hash in the same bucket. If an attacker is scanning, a lot of good traffic will be mixed in that hash bucket. Hash the source IP with 3 different functions, and then increment/decrement the counter for each of those buckets. We'll keep the buckets for H 1 (), H 2 (), H 3 () separate and call these separations "stages". We can detect that a flow is attacking us if all of its counters (one for each stage) are above a bound.

Partial Completion Filters

How do we use them? TCP SYN flood increment on SYN decrement on FIN hash Destination IP/Port Spoof-resistant TCP SYN flood hash Source IP/Port on reverse path TCP Scan increment on SYN decrement on FIN hash Source IP

Where can we put them? In theory, anywhere in the network! In practice, it's easier if we put them towards the edge of the network. Economically, we're more motivated to put them near the victim. We can do both detection and defense if we're on the attacker's path.

Outline 1. Introduction to DoS 2. Scalable Attack Detection in the Network (Primary Paper) 3. Kill-Bots (Detection on the victim) 4. A Novel Approach to Early Attack Detection (Detection from backscatter) 5. Fixing the Incentive Chain (Economic metasolution)

Discussion 1. What is legitimate traffic? What sort of traffic should be prioritized, etc. How is legitimate traffic identified? 2. Who is responsible for defeating DDoS? Who is in the best tactical position? Who is hurt the most? 3. How should vulnerable entities be best protected?

Botz-4-Sale: Surviving DDoS Attacks That Mimic Flash Crowds [Kandula et al. '05] Goal: Maximize Goodput (legitimate client throughput) Idea: Distinguish human (legitimate) traffic from zombie traffic Reverse Turing tests Don't allocate connection space until authenticated Drop zombie traffic

Kill-Bots Implementation Kill-Bots runs at the kernel level of a protected server Modified Bloom filter for IP addresses Two stage authentication: 1. Issue reverse Turing test (no access to TCBs or socket buffers), building Bloom filter 2. Once Bloom filter stabilizes, no Turing tests

Kill-Bots Admission Control Don't allow authentication to consume all resources Authenticate only as many clients as can be served Dynamically determine authentication probability based on server idle time Beneficial even in non DDoS situations Results

Kill-Bots Issues Not all legitimate traffic originates from a human sitting at a browser Sort of solved... Potential to be really, really annoying IP aliasing Sort of solved... Bloom filter false positives (human classified as zombie) Are false negatives an issue? Others?

Outline 1. Introduction to DoS 2. Scalable Attack Detection in the Network (Primary Paper) 3. Kill-Bots (Detection on the victim) 4. A Novel Approach to Early Attack Detection (Detection from backscatter) 5. Fixing the Incentive Chain (Economic metasolution)

A novel approach to detecting DDoS Attacks at an Early Stage [Xiao et al. '06] Assume a normal SYN flood attack What about all the SYN/ACK packets? Backscatter An innocent client can detect these early in an attack

Implementation Edge routers contain modified Bloom filter Outgoing SYN --> increment counter Incoming ACK/SYN --> decrement counter Decrement a 0 --> Suspicious Alarm (SA) Multiple SAs close together indicates attack, notify victim server

Issues Raised Attack specific Who is responsible for DDoS protection? Edge routers could help stop IP spoofing already, but don't Economic incentives

Outline 1. Introduction to DoS 2. Scalable Attack Detection in the Network (Primary Paper) 3. Kill-Bots (Detection on the victim) 4. A Novel Approach to Early Attack Detection (Detection from backscatter) 5. Fixing the Incentive Chain (Economic metasolution)

Defeating DDoS by Fixing the Incentive Chain [Huang et al. '07] Cooperative filtering and cooperative caching greatly reduce effect of DDoS attacks Rarely used Require ISPs to use precious resources (and potentially reduce performance) Require unscalable numbers of bilateral agreements

Fixing Incentive Chain Usage-based price schemes Users pay flat fee and have volatile usage ISPs overprovision bandwidth --> who cares if DDoS attacks use extra bandwidth? E.g., by how much congestion a user causes :)

Fixing Incentive Chain Capacity Provision Networks (CPNs) CPN owner deals with large numbers of ISPs ICPs contract with CPN owner for cooperative caching during DDoS attack

Discussion 1. What is legitimate traffic? What sort of traffic should be prioritized, etc. How is legitimate traffic identified? 2. Who is responsible for defeating DDoS? Who is in the best tactical position? Who is hurt the most? 3. How should vulnerable entities be best protected?

Sources Yun Huang, Xianjun Geng, and Andrew B. Whinston. 2007. Defeating DDoS attacks by fixing the incentive chain. ACM Trans. Internet Technol. 7, 1, Article 5 (February 2007) Srikanth Kandula, Dina Katabi, Matthias Jacob, and Arthur Berger. 2005. Botz-4-sale: surviving organized DDoS attacks that mimic flash crowds. In Proceedings of the 2nd conference on Symposium on Networked Systems Design \& Implementation - Volume 2 (NSDI'05), Vol. 2. USENIX Association, Berkeley, CA, USA, 287-300. Bin Xiao, Wei Chen, and Yanxiang He. 2006. A novel approach to detecting DDoS Attacks at an Early Stage. J. Supercomput. 36, 3 (June 2006), 235-248.