Denial of Service and Anomaly Detection



Similar documents
Distributed Denial of Service (DDoS)

Detecting Flooding Attacks Using Power Divergence

How To Prevent DoS and DDoS Attacks using Cyberoam

Defending against Flooding-Based Distributed Denial-of-Service Attacks: A Tutorial

An Anomaly-Based Method for DDoS Attacks Detection using RBF Neural Networks

An Efficient Filter for Denial-of-Service Bandwidth Attacks

Automated Mitigation of the Largest and Smartest DDoS Attacks

Inferring Internet Denial-of

Dr. Arjan Durresi Louisiana State University, Baton Rouge, LA DDoS and IP Traceback. Overview

Development of a Network Intrusion Detection System

Denial of Service. Tom Chen SMU

DDoS Protection Technology White Paper

Large-Scale IP Traceback in High-Speed Internet

co Characterizing and Tracing Packet Floods Using Cisco R

SECURING APACHE : DOS & DDOS ATTACKS - I

Network Security. Dr. Ihsan Ullah. Department of Computer Science & IT University of Balochistan, Quetta Pakistan. April 23, 2015

1. Firewall Configuration

Firewalls and Intrusion Detection

A Defense Framework for Flooding-based DDoS Attacks

Denial of Service Attacks. Notes derived from Michael R. Grimaila s originals

Analysis and Detection of DDoS Attacks in the Internet Backbone using Netflow Logs

Project 4: (E)DoS Attacks

Denial of Service Attacks, What They are and How to Combat Them

FIREWALLS. Firewall: isolates organization s internal net from larger Internet, allowing some packets to pass, blocking others

Wharf T&T Limited DDoS Mitigation Service Customer Portal User Guide

Analysis of a DDoS Attack

Application of Netflow logs in Analysis and Detection of DDoS Attacks

CS 356 Lecture 16 Denial of Service. Spring 2013

Question: 3 When using Application Intelligence, Server Time may be defined as.

Provider-Based Deterministic Packet Marking against Distributed DoS Attacks

Denial Of Service. Types of attacks

Chapter 7 Protecting Against Denial of Service Attacks

Traffic Behavior Analysis with Poisson Sampling on High-speed Network 1

DDos. Distributed Denial of Service Attacks. by Mark Schuchter

Denial of Service (DoS)

Transport Layer Protocols

Security Toolsets for ISP Defense

Signal Processing Methods for Denial of Service Attack Detection

Detecting Network Anomalies. Anant Shah

Low-rate TCP-targeted Denial of Service Attack Defense

Federal Computer Incident Response Center (FedCIRC) Defense Tactics for Distributed Denial of Service Attacks

Acquia Cloud Edge Protect Powered by CloudFlare

ADRISYA: A FLOW BASED ANOMALY DETECTION SYSTEM FOR SLOW AND FAST SCAN

Automated Mitigation of the Largest and Smartest DDoS Attacks

Measuring IP Performance. Geoff Huston Telstra

Denial of Service (DoS) Technical Primer

Internet Activity Analysis Through Proxy Log

CloudFlare advanced DDoS protection

Strategies to Protect Against Distributed Denial of Service (DD

Intrusion Forecasting Framework for Early Warning System against Cyber Attack

Denial of Service Attacks

Introduction about DDoS. Security Functional Requirements

Configuring TCP Intercept (Preventing Denial-of-Service Attacks)

Dos & DDoS Attack Signatures (note supplied by Steve Tonkovich of CAPTUS NETWORKS)

Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs

DoS/DDoS Attacks and Protection on VoIP/UC

TCP in Wireless Mobile Networks

CS5008: Internet Computing

Denial of Service Attacks and Countermeasures. Extreme Networks, Inc. All rights reserved. ExtremeXOS Implementing Advanced Security (EIAS)

Passive Queue Management

PROFESSIONAL SECURITY SYSTEMS

A TWO LEVEL ARCHITECTURE USING CONSENSUS METHOD FOR GLOBAL DECISION MAKING AGAINST DDoS ATTACKS

Implementing Large-Scale Autonomic Server Monitoring Using Process Query Systems. Christopher Roblee Vincent Berk George Cybenko

Implementing Secure Converged Wide Area Networks (ISCW)

Network Measurement. Why Measure the Network? Types of Measurement. Traffic Measurement. Packet Monitoring. Monitoring a LAN Link. ScienLfic discovery

Secure Network Access System (SNAS) Indigenous Next Generation Network Security Solutions

Data Sheet. V-Net Link 700 C Series Link Load Balancer. V-NetLink:Link Load Balancing Solution from VIAEDGE

Bandwidth based Distributed Denial of Service Attack Detection using Artificial Immune System

2.2 Methods of Distributed Denial of Service Attacks. 2.1 Methods of Denial of Service Attacks

Using Fuzzy Logic Control to Provide Intelligent Traffic Management Service for High-Speed Networks ABSTRACT:

Distributed Denial of Service(DDoS) Attack Techniques and Prevention on Cloud Environment

Distributed Denial of Service Attack Tools

Configuring Simulator 3 for IP

Secure Software Programming and Vulnerability Analysis

Modern Denial of Service Protection

DDoS Overview and Incident Response Guide. July 2014

Intrusion Detection System: Security Monitoring System

Chapter 8 Network Security

Malice Aforethought [D]DoS on Today's Internet

IDS / IPS. James E. Thiel S.W.A.T.

IP Forwarding Anomalies and Improving their Detection using Multiple Data Sources

Chapter 8 Security Pt 2

Guide to DDoS Attacks December 2014 Authored by: Lee Myers, SOC Analyst

This document is licensed for use, redistribution, and derivative works, commercial or otherwise, in accordance with the Creative Commons

Announcements. No question session this week

DRDoS Attacks: Latest Threats and Countermeasures. Larry J. Blunk Spring 2014 MJTS 4/1/2014

Abstract. Introduction. Section I. What is Denial of Service Attack?

to-end Packet Loss Estimation for Grid Traffic Monitoring

Transcription:

Denial of Service and Anomaly Detection Vasilios A. Siris Institute of Computer Science (ICS) FORTH, Crete, Greece vsiris@ics.forth.gr SCAMPI BoF, Zagreb, May 21 2002 Overview! What the problem is and why it is difficult! Where and why naïve schemes fail! Consider two algorithms " Adaptive Threshold " CUSUM (CUmulative SUM)! Application to SYN attack detection! Experimental results! Conclusions and future work 1

Denial of Service (DoS) attacks! Aim is to prevent users from receiving service, with some minimum performance! Achieved by consuming resources " Bandwidth " Memory " Router forwarding capacity " Other services: DNS! Technique: flooding Importance of DoS attacks! Recent surveys: " 40% of all attacks are DoS (2002 CSI/FBI) " 90% of all DoS attacks are TCP attacks (2001 Moore et al)! Cost of attack = many or $ " Several millions to billions $ estimated loss from Feb 2000 attack at Yahoo, CNN, Amazon, etc! Attacks are increasing " DNS route server attack in Oct. 2002 " DOLnet s attack in Dec. 2002 " 55% Web attacks are DoS (2002 CSI/FBI) 2

The DoS problem Detection Prevention/ Reaction Identification of attackers! Our focus on detection of DoS attacks " Early and reliable detection of attacks " Detection of low intensity attacks Distributed DoS attack daemon Measurement points X victim daemon hosts compromised aggregated traffic daemon traffic volume remains low attacker 3

Approaches to anomaly detection! Alarm when behavior deviates from normal! Specify normal behavior (operational model) " Thresholds: e.g. load < 0.7! Learn normal behavior " Mean and standard deviation statistics " Time series analysis: advantage is that they take into account time correlations Change point detection (hypothesis testing) " Other approaches: bayesian statistics, neural nets! DoS attacks one example of anomaly " Link/device failures Non-adaptive approaches not robust! Fixed threshold tests (e.g. normal < 0.7) will fail due to normal/regular traffic variations! Why not consider an adaptive threshold? 4

Detection of some attacks simpler no attack with attack 0 5.5 11.1 8:00 13:30 19:06 Detection of some attacks simpler no attack with attack attack Relatively simple 5

Some attacks are more subtle no attack with attack Some attacks are more subtle no attack with attack attack 6

What and when to measure! Variable measured: " Aggregate traffic volume (in fixed time intervals) " Traffic volume per flow (in fixed time intervals) " # of requests, e.g. TCP, http, " Inter-arrival time of requests " Duration of requests (average or bin) " Pkt size (average or bin)! Statistic: Mean, variance, covariance, hurst! When to measure: order of seconds " 10 seconds in our experiments Algorithms investigated! Adaptive threshold " Adaptively measure mean rate " Alarm when rate more than some percentage (e.g. > 150% of mean)! CUSUM (CUmulative SUM) " Adaptively measure mean rate " Sum the volume sent above some average factor " Alarm when volume more than some threshold 7

Adaptive Threshold (AT)! Let y t be time series of measurements " E.g. # of SYN packets in an interval T µ t " By adaptively measuring mean can adjust to periodic (non-stationary) changes! Mean measured over some past window L! Alarm condition If y > βµ t t Alarm at t! Parameters: " T (measurement interval), L (averaging interval), β>1 (threshold) Adaptive Threshold k (AT-k)! More robust if alarm set when threshold exceeded for # k of consecutive intervals! Alarm condition! Parameters: t 1{ yi > βµ > i i= t k If } k then ALARM at t " T (measurement interval), L (averaging interval), β (threshold), k (# of intervals threshold exceeded) 8

Adaptive Threshold: intuition # Alarm set If # > k y t! Assuming fixed mean µ t Threshold = βµ t time CUSUM algorithm! Based on hypothesis testing! Current hypothesis (no attack): θ 0! Alternative hypothesis θ 1 : µ 1 = βµ 0 σ 1 = σ 0! pθ ( y ) 1 i si = ln pθ ( y ) 0 i t S t = s i Smin = min Sk i= 0 0< k t Alarm condition If S t Smin > h then ALARM at t! Parameters: β (surplus), h (alarm threshold) 9

CUSUM algorithm: another view! Mean µ estimated using EWMA! Surplus: µ 1 = µ 1'+ µ = βµ (e.g. µ 1 = 1. 5 µ ) g t = g t 1 µ + + 1 ' µ µ y 1 2 t σ 2 +! Alarm condition If > h! Parameters: g t then ALARM at " β>1 (surplus), h (alarm threshold) t CUSUM algorithm: another view! Mean µ estimated using EWMA! Surplus: µ 1 = µ 1'+ µ = βµ (e.g. µ 1 = 1. 5 µ ) g t = g t 1 µ + + 1 ' µ µ y 1 2 t σ 2 +! Alarm condition If > h! Parameters: g t then ALARM at " β>1 (surplus), h (alarm threshold) t 10

CUSUM algorithm: intuition gi = 0 Alarm set g k > f y t volume = g i µ + µ 1 2 time! Assuming µ + µ 1 constant 2! Accumulates excess traffic (memory)! TCP SYN flooding! ICMP flooding! UDP flooding! SMURF attack Types of DoS attacks 11

Application to SYN attack detection Sender Receiver SYN x SYN y, ACK x+1 ACK y+1 Senders SYN SYN SYN, ACK Receiver FYN z ACK z+1 FYN r ACK r! Exploits TCP s three way handshake! Half-open connections consume resources! Source IP addresses spoofed Performance measures! Attack detection ratio! False alarm ratio (false positives)! Detection delay! Robustness! How tunable the algorithm is " Tradeoff between detection ratio, false alarm ratio and detection delay! Evaluate above for different attack types " Intensity of attack (amplitude) " How fast it reaches peak amplitude 12

Experiments! Considered real trace without attacks ~ 11 hours " # of SYN pkts in 10 second intervals! 50 runs, 95% confidence interval! Synthetic attacks " Intensity of attack (peak) " Time to reach peak " Inter-arrival: exponential, 400 sec peak + randomness time to reach peak Adaptive Threshold k trace trace + attacks attacks alarms 8:00 13:30 19:06! Intense attack: rate ~ 250% mean 13

CUSUM trace trace + attacks attacks alarms! Intense attack: rate ~ 250% mean Adaptive Threshold k trace trace + attacks attacks alarms! small attack: rate ~ 10% mean 14

CUSUM trace trace + attacks attacks alarms! small attack: rate ~ 10% mean CUSUM threshold! Attack amplitude: 150% mean! Time to reach peak: 90 sec 15

Adaptive Threshold - k k (consecutive intervals of excess load)! Attack amplitude: 150% mean! Time to reach peak: 90 sec AT-k versus CUSUM AT-k CUSUM False alarm ratio better False alarm ratio better Detection probability Detection probability! Attack amplitude: 150% mean! Time to reach peak: 90 sec 16

AT-k versus CUSUM AT-k CUSUM False alarm ratio False alarm ratio Detection probability Detection probability! Attack amplitude: 50% mean! Time to reach peak: 90 sec Adaptive Threshold - k k (consecutive intervals of excess load)! Attack amplitude: 50% mean! Time to reach peak: 90 sec 17

CUSUM Attack peak at 90 sec Attack peak at 10 sec False alarm ratio False alarm ratio better Detection delay Detection delay! Attack amplitude: 50% mean Experiment results! Performance depends on attack characteristics! For some (intense) attack types straightforward procedures can be effective! But simple procedures are not robust for different attacks! Sound statistical methods are robust and not necessarily complex! Intuition on how to tune parameters important 18

Future work! Application to other measures & statistics! Combination of alarms! Application to QoS measurements " Measurements: delay, jitter, throughput " Up to now: alert when measurements exceed guarantees " Idea: apply anomaly detection to measurements => early detection of QoS violations Denial of Service and Anomaly Detection Vasilios A. Siris Institute of Computer Science (ICS) FORTH, Crete, Greece vsiris@ics.forth.gr SCAMPI BoF, Zagreb, May 21 2002 19